Author of the publication

A Trusted Reputation Management Scheme for Cross-Chain Transactions.

, , , , , and . Sensors, 23 (13): 6033 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Intelligent Attack Detection Using DNA Computing., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 126:1-126:27 (2023)A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things., , , and . IEEE Access, (2018)You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks., , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 303-312 (2020)Transparent authentication scheme with adaptive biometrie features for IoT networks., , , , and . GCCE, page 1-2. IEEE, (2016)Novel RFID Authentication Schemes for Security Enhancement and System Efficiency., and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 203-212. Springer, (2007)A Trusted Reputation Management Scheme for Cross-Chain Transactions., , , , , and . Sensors, 23 (13): 6033 (July 2023)A Novel RFID Tag Identification Protocol: Adaptive $$n$$ n -Resolution and $$k$$ k -Collision Arbitration., , , , and . Wireless Personal Communications, 77 (3): 1775-1800 (2014)Two robust remote user authentication protocols using smart cards., , , , and . J. Syst. Softw., 83 (12): 2556-2565 (2010)Mutual RFID Authentication Scheme for Resource-constrained Tags., and . J. Inf. Sci. Eng., 26 (5): 1875-1889 (2010)Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges., , , and . IEEE Internet Things J., 6 (2): 2159-2187 (2019)