Author of the publication

A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing.

, , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 167-184. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance., , , , , , and . IEEE Intell. Syst., 33 (4): 49-61 (2018)Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing., , , , , , , , and . Secur. Commun. Networks, (2018)Inferring the QoE of HTTP video streaming from user-viewing activities., , , and . W-MUST@SIGCOMM, page 31-36. ACM, (2011)Beyond the virus: a first look at coronavirus-themed Android malware., , , , , , , , , and 1 other author(s). Empir. Softw. Eng., 26 (4): 82 (2021)Dual-Anonymous Off-Line Electronic Cash for Mobile Payment., , , , , and . IEEE Trans. Mob. Comput., 22 (6): 3303-3317 (June 2023)iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations., , , , , and . CoRR, (2021)CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum., , , and . CoRR, (2020)What did you pack in my app? a systematic analysis of commercial Android packers., , , , , , , and . ESEC/SIGSOFT FSE, page 1430-1440. ACM, (2022)Detecting concurrency vulnerabilities based on partial orders of memory and thread events., , , , and . ESEC/SIGSOFT FSE, page 280-291. ACM, (2021)Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features., , , , , , and . ISSTA, page 917-928. ACM, (2023)