Author of the publication

Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.

, , , , , , , and . Frontiers Comput. Sci., 18 (2): 182815 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Body sensor network key distribution using human interactive channels., , , , , and . ISABEL, page 143:1-143:5. ACM, (2011)The Missing Link: Human Interactive Security Protocols in Mobile Payment., , , and . IWSEC (Short Papers), page 94-109. Information Processing Society of Japan (IPSJ), (2010)Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation., , , , , , , and . ACSAC, page 117-131. ACM, (2022)When Blockchain Meets SGX: An Overview, Challenges, and Open Issues., , , , , and . IEEE Access, (2020)Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme., , , , , , , and . Frontiers Comput. Sci., 18 (2): 182815 (April 2024)Mobile Electronic Identity: Securing Payment on Mobile Phones., and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 22-37. Springer, (2011)SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts., , , , , and . ICDCS, page 1219-1222. IEEE, (2020)Protect Your Smart Contract Against Unfair Payment., , , , , , and . SRDS, page 61-70. IEEE, (2020)CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts., , , , , and . CoRR, (2021)Committable: A Decentralised and Trustless Open-Source Protocol., , , and . ICBC, page 1-2. IEEE, (2022)