From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain., , , и . IEEE Internet Things J., 9 (11): 8681-8692 (2022)An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms., , , и . ICACS, стр. 14-20. ACM, (2018)Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack., , , , , , и . IEEE Access, (2018)Blockchain: Perspectives and issues., , , и . J. Intell. Fuzzy Syst., 37 (6): 8029-8052 (2019)Research on Cross-Chain Technology Architecture System Based on Blockchain., , и . CSPS, том 571 из Lecture Notes in Electrical Engineering, стр. 2609-2617. Springer, (2019)A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM., , , , и . ICCNS, стр. 88-93. ACM, (2023)Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence., , и . BICS, том 10989 из Lecture Notes in Computer Science, стр. 717-726. Springer, (2018)Research on Data Protection Architecture Based on Block Chain., , и . CSPS, том 571 из Lecture Notes in Electrical Engineering, стр. 2618-2624. Springer, (2019)Enhancing Security and Privacy in Healthcare: A Conceptual Model., , и . iThings/GreenCom/CPSCom/SmartData/Cybermatics, стр. 188-195. IEEE, (2023)Research on identity authentication system of Internet of Things based on blockchain technology., , , , , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10, Part B): 10365-10377 (ноября 2022)