Author of the publication

Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature.

, , , , , and . Concurr. Comput. Pract. Exp., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial behaviours in mixing coins under incomplete information., , , , and . Appl. Soft Comput., (2020)A systematic mapping study for blockchain based on complex network., , , , , , and . Concurr. Comput. Pract. Exp., (2022)A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 82-95. Springer, (2014)RETSR: An Effective Review-Enhanced and Time-Aware Sequential Recommendation Framework., , , and . ICTAI, page 826-831. IEEE, (2022)A Deep Learning Approach with Conditional Random Field for Automatic Sleep Stage Scoring., , , , , and . EITCE, page 901-906. ACM, (2021)TSHML: Token Shuffling under Haircut Policy Based on Machine Learning., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 401-405. IEEE, (2022)Query Evaluation by Circuits., and . PODS, page 67-78. ACM, (2022)Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption., , , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 107-125. Springer, (2023)Using information entropy to analyze secure multi-party computation protocol., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 312-318. IEEE, (2021)2-out-of-2 Rational Secret Sharing in Extensive Form., and . CIS, page 847-851. IEEE Computer Society, (2011)