Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mobile Web Service Middleware and Its Performance Study, , , and . Transactions on Large-Scale Data- and Knowledge-Centered Systems III, volume 6790 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2011)Transactional Network Analysis and Money Laundering Behavior Identification of Central Bank Digital Currency of China., , , and . J. Soc. Comput., 3 (3): 219-230 (2022)Incorporating Dynamic Constraints in the Flexible Authorization Framework., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images., , , , and . Algorithms, 15 (6): 213 (2022)Exploring Blockchains Interoperability: A Systematic Survey., , and . ACM Comput. Surv., 55 (13s): 290:1-290:38 (2023)On the Security and Performance of Blockchain Sharding., , , , and . IACR Cryptol. ePrint Arch., (2021)How to Rationally Select Your Delegatee in PoS., , , and . CoRR, (2023)Electrostatic-Fluid-Structure 3D Numerical Simulation of a MEMS Electrostatic Comb Resonator., , , and . Sensors, 22 (3): 1056 (2022)Tracking anonymous peer-to-peer VoIP calls on the internet., , and . CCS, page 81-91. ACM, (2005)A Blockchain-Based Autonomous System for Primary Financial Market., and . ICSOC Workshops, volume 13236 of Lecture Notes in Computer Science, page 278-282. Springer, (2021)