Author of the publication

A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments.

, , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3530-3540 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Management Approaches in Fog Computing: a Comprehensive Review., , and . J. Grid Comput., 18 (1): 1-42 (2020)Personality classification based on profiles of social networks' users and the five-factor model of personality., , and . HCIS, (2018)Energy-efficient cooperative resource allocation and task scheduling for Internet of Things environments., , , , , and . Internet Things, (October 2023)Cloud manufacturing service composition in IoT applications: a formal verification-based approach., and . Multim. Tools Appl., 81 (19): 26759-26778 (2022)PriNergy: a priority-based energy-efficient routing method for IoT systems., , , , and . J. Supercomput., 76 (11): 8609-8626 (2020)A systematic literature review on formal verification of software-defined networks., , , , and . Trans. Emerg. Telecommun. Technol., (2020)Software as a service based CRM providers in the cloud computing: Challenges and technical issues., , and . J. Serv. Sci. Res., 9 (2): 219-237 (2017)A state-of-the-art survey of malware detection approaches using data mining techniques., and . HCIS, (2018)Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research., , and . Int. J. Commun. Syst., (2018)Behavioral modeling and formal verification of a resource discovery approach in Grid computing., and . Expert Syst. Appl., 41 (8): 3831-3849 (2014)