Author of the publication

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.

, , , , , , and . IEEE Trans. Ind. Informatics, 18 (7): 4456-4465 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PIMSAB: A Processing-In-Memory System with Spatially-Aware Communication and Bit-Serial-Aware Computation., , , , and . CoRR, (2023)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Asymmetric Group Message Franking: Definitions & Constructions., , , , , and . IACR Cryptol. ePrint Arch., (2023)Numerical investigation of sequential cuts residual stress considering tool edge radius in machining of AISI 304 stainless steel., , , , , , and . Simul. Model. Pract. Theory, (2022)Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme., , , and . J. Syst. Softw., 84 (2): 219-225 (2011)Adaptive Dropout Method Based on Biological Principles., , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 32 (9): 4267-4276 (2021)Vulnerable Implicit Service: A Revisit., , , , , , and . CCS, page 1051-1063. ACM, (2017)Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security., , , , , and . AsiaCCS, page 247-255. ACM, (2016)LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset., , , , , , and . CCS, page 2307-2320. ACM, (2021)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)