From post

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain.

, , , , и . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Android Malware Detection Based on Call Graph via Graph Neural Network., , , , , и . NaNA, стр. 368-374. IEEE, (2020)ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks., , , , и . Future Gener. Comput. Syst., (2018)Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing., , , , , и . ACM Trans. Internet Techn., 22 (2): 45:1-45:24 (2022)Lightweight Security Authentication Mechanism Towards UAV Networks., , , , , , , и . NaNA, стр. 379-384. IEEE, (2019)Android Malware Detection via Graph Representation Learning., , , , , и . Mob. Inf. Syst., (2021)Indian Buffet Process-Based on Nonnegative Matrix Factorization with Single Binary Component., , , , и . SMC, стр. 1139-1144. IEEE, (2021)Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT., , , , , и . NaNA, стр. 348-354. IEEE, (2020)Lightweight Secure Communication Mechanism Towards UAV Networks., , , , , , , , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2019)Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection., , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT., , , , , , и . AIiH (2), том 14976 из Lecture Notes in Computer Science, стр. 263-278. Springer, (2024)