Author of the publication

Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.

, , , , , and . IEEE Internet Things J., 10 (24): 21322-21336 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs., , , , , and . Digit. Commun. Networks, 9 (5): 1180-1189 (October 2023)SSIR: Secure similarity image retrieval in IoT., , and . Inf. Sci., (2019)K-Anonymity Algorithm Based on Improved Clustering., , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 462-476. Springer, (2018)DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping., , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 155-174. Springer, (2019)An efficient and privacy-preserving location sharing mechanism., , , , and . Comput. Stand. Interfaces, (2016)Outsourcing Encryption of Attribute-Based Encryption with MapReduce., , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 191-201. Springer, (2012)Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud., , , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 490-502. Springer, (2012)New Privacy-Preserving Location Sharing System for Mobile Online Social Networks., , , , and . 3PGCIC, page 214-218. IEEE, (2013)Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT., , , , , and . IEEE Internet Things J., 10 (24): 21322-21336 (December 2023)Xmark: Dynamic Software Watermarking Using Collatz Conjecture., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2859-2874 (2019)