Author of the publication

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepCPPred: A Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies., , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 19 (5): 2749-2759 (2022)Corrigendum to Örchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" Comput. Ind. 123 (December) (2020) 103334., , , and . Comput. Ind., (2021)Mobile agent watermarking (MAW): security properties and attacks revisited., , , , and . FIT, page 32:1-32:6. ACM, (2009)Blockchain-based secure multi-resource trading model for smart marketplace., , , and . Computing, 103 (3): 379-400 (2021)A Novel Method of Watermarking Relational Databases using Character String., , , , and . Artificial Intelligence and Applications, page 120-124. IASTED/ACTA Press, (2006)Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature., , and . IIH-MSP, page 566-569. IEEE Computer Society, (2007)Aggregated Signatures for Chaining: A Secure Provenance Scheme., , , and . Trustcom/BigDataSE/ISPA, page 2012-2017. IEEE, (2016)Adaptive Reputation Weights Assignment Scheme for MANETs., , , and . Trustcom/BigDataSE/ISPA, page 160-167. IEEE, (2016)Introducing Secure Provenance in IoT: Requirements and Challenges., , , , and . SIoT, page 39-46. IEEE Computer Society, (2016)On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)., , , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 223-228. Springer, (2009)