Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network., , , and . Information, 6 (4): 613-632 (2015)A Blockchain-Based Application System for Product Anti-Counterfeiting., , , , , and . IEEE Access, (2020)Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing., , , , , and . SACMAT, page 143-154. ACM, (2021)A universal designated multi verifiers content extraction signature scheme., , , and . Int. J. Comput. Sci. Eng., 21 (1): 49-59 (2020)Redactable Blockchain in Decentralized Setting., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)K-Time Modifiable and Epoch-Based Redactable Blockchain., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases., , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 167-186. Springer, (2018)Revocable Policy-Based Chameleon Hash., , , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 327-347. Springer, (2021)An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model., , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 578-592. Springer, (2020)DilateFormer: Multi-Scale Dilated Transformer for Visual Recognition., , , , , , and . CoRR, (2023)