Author of the publication

PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace.

, , , , , , and . IEEE Internet Things J., 11 (8): 13424-13436 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009., , and . IACR Cryptology ePrint Archive, (2009)A novel particle swarm optimizer hybridized with extremal optimization., , , and . Appl. Soft Comput., 10 (2): 367-373 (2010)An artificial bee colony algorithm for multi-objective optimisation., , , , , and . Appl. Soft Comput., (2017)Enabling Secure and Flexible Streaming Media With Blockchain Incentive., , , , , , and . IEEE Internet Things J., 11 (2): 1966-1980 (January 2024)Design of multivariable PID controllers using real-coded population-based extremal optimization., , , , , , and . Neurocomputing, (2015)Binary-coded extremal optimization for the design of PID controllers., , , , , , , and . Neurocomputing, (2014)A novel real-coded population-based extremal optimization algorithm with polynomial mutation: A non-parametric statistical study on continuous optimization problems., , , , and . Neurocomputing, (2016)A new hybrid memetic multi-objective optimization algorithm for multi-objective optimization., , , , , and . Inf. Sci., (2018)A novel Artificial Bee Colony algorithm with integration of extremal optimization for numerical optimization problems., , , , and . IEEE Congress on Evolutionary Computation, page 242-249. IEEE, (2014)Constant Size Hierarchical Identity-Based Encryption Tightly Secure in the Full Model without Random Oracles., , , and . EIDWT, page 652-657. IEEE Computer Society, (2013)