Author of the publication

Distributed pseudonym mechanism based on Consortium Blockchain.

, , , , , and . HPCC/DSS/SmartCity/DependSys, page 456-461. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A service recovery method based on trust evaluation in mobile social network., , , and . Multim. Tools Appl., 76 (3): 3255-3277 (2017)A self-adaptive method of task allocation in clustering-based MANETs., , , and . NOMS, page 440-447. IEEE, (2010)A Shapley value-based forwarding strategy in Information-Centric Networking., , , , , and . APNOMS, page 1-4. IEEE, (2016)A Novel Recovery Strategy for Service Interruption in Ubiquitous Stub Environment., , , and . VTC Spring, page 1-5. IEEE, (2014)A Novel Architecture Combining Oracle With Decentralized Learning for IIoT., , , , , , , and . IEEE Internet Things J., 10 (5): 3774-3785 (March 2023)FedSeC: a Robust Differential Private Federated Learning Framework in Heterogeneous Networks., , , , and . WCNC, page 1868-1873. IEEE, (2022)Select-Storage: A New Oracle Design Pattern on Blockchain., , , , , , and . TrustCom, page 1177-1184. IEEE, (2021)Network Traffic Prediction Method Based on Multi-Channel Spatial-Temporal Graph Convolutional Networks., , , , and . ICAIT, page 25-30. IEEE, (2022)Multi-Source Feedback Based Light-Weight Trust Mechanism for Edge Computing., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)Trusted Authentication Mechanism of IoT Terminal Based on Authorization Consensus and Reputation Evaluation., , , , and . IEEE Internet Things J., 11 (13): 23961-23976 (July 2024)