Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms., , , and . ICACS, page 14-20. ACM, (2018)An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain., , , and . IEEE Internet Things J., 9 (11): 8681-8692 (2022)Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence., , and . BICS, volume 10989 of Lecture Notes in Computer Science, page 717-726. Springer, (2018)Research on Cross-Chain Technology Architecture System Based on Blockchain., , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 2609-2617. Springer, (2019)Blockchain: Perspectives and issues., , , and . J. Intell. Fuzzy Syst., 37 (6): 8029-8052 (2019)A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM., , , , and . ICCNS, page 88-93. ACM, (2023)Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack., , , , , , and . IEEE Access, (2018)Research on Data Protection Architecture Based on Block Chain., , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 2618-2624. Springer, (2019)An Abnormal Behavior Clustering Algorithm Based on K-means., , , and . BICS, volume 10989 of Lecture Notes in Computer Science, page 535-544. Springer, (2018)Research on identity authentication system of Internet of Things based on blockchain technology., , , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10, Part B): 10365-10377 (November 2022)