Author of the publication

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.

, , , , and . ACSAC, page 813-828. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Holographic Zoom System With Large Focal Depth Based on Adjustable Lens., , , and . IEEE Access, (2020)Method of Speckle Noise Suppression for Holographic Zoom Display Based on Layered-Pixel-Scanning Algorithm., , , , and . IEEE Access, (2020)The Bipartite Network Study of the Library Book Lending System., and . Complex (1), volume 4 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 773-782. Springer, (2009)Design of Products Non-contact Detection System., , and . ITITS (2), volume 455 of Advances in Intelligent Systems and Computing, page 503-508. (2015)Optimal scheduling of power system using harmony search algorithm., and . FSKD, page 941-945. IEEE, (2015)Transforming Fuzzy Spatiotemporal Data From Relational Databases to XML., and . IEEE Access, (2018)A systematic approach to occupancy modeling in ambient sensor-rich buildings., , , and . Simulation, 90 (8): 960-977 (2014)On isolation of simple multiple zeros and clusters of zeros of polynomial systems., , , and . Math. Comput., 89 (322): 879-909 (2020)Prediction of NOx emissions from a biomass fired combustion process through digital imaging, non-negative matrix factorization and fast sparse regression., , , and . I2MTC, page 176-180. IEEE, (2015)Action Governor for Discrete-Time Linear Systems With Non-Convex Constraints., , , , , and . IEEE Control. Syst. Lett., 5 (1): 121-126 (2021)