Author of the publication

Game Theoretic Suppression of Forged Messages in Online Social Networks.

, , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (3): 1601-1611 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain for Internet of Things., , , , and . Blockchains for Network Security, Institution of Engineering and Technology, (2020)Game Theoretic Suppression of Forged Messages in Online Social Networks., , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (3): 1601-1611 (2021)A High-Performance Hybrid Blockchain System for Traceable IoT Applications., , , , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 721-728. Springer, (2019)A Unified Analytical model for proof-of-X schemes., , , , , , and . Comput. Secur., (2020)Capacity of blockchain based Internet-of-Things: Testbed and analysis., , , , , , , and . Internet Things, (2019)Securing data transmission in Internet of Things. University of Technology Sydney, Australia, (2019)A Morphological LiDAR Points Cloud Filtering Method based on GPGPU., , , and . GISTAM, page 80-84. SciTePress, (2016)Survey on blockchain for Internet of Things., , , , , , and . Comput. Commun., (2019)Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems., , , , , , , , and . IEEE Trans. Engineering Management, 67 (4): 1213-1230 (2020)Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (10): 2261-2275 (2017)