Author of the publication

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.

, , , , , , and . IEEE Trans. Ind. Informatics, 18 (7): 4456-4465 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT., , , , and . IEEE Internet Things J., 11 (2): 3484-3496 (January 2024)Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Attribute-based Encrypted Search for Multi-owner and Multi-user Model., , , , , and . ICC, page 1-7. IEEE, (2021)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , and . SERVICES, page 19. IEEE, (2021)Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS., , , , , , and . IEEE Trans. Serv. Comput., 17 (2): 589-603 (March 2024)Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Privacy-Preserved Data Trading Via Verifiable Data Disturbance., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3126-3140 (July 2024)VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner., , , , and . Int. J. High Perform. Comput. Netw., 12 (1): 39-48 (2018)Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation., , , , and . ICC, page 1-6. IEEE, (2019)