Author of the publication

Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.

, , , , and . IEEE Internet Things J., 11 (2): 3484-3496 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT., , , , and . IEEE Internet Things J., 11 (2): 3484-3496 (January 2024)Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Attribute-based Encrypted Search for Multi-owner and Multi-user Model., , , , , and . ICC, page 1-7. IEEE, (2021)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , and . SERVICES, page 19. IEEE, (2021)Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS., , , , , , and . IEEE Trans. Serv. Comput., 17 (2): 589-603 (March 2024)Privacy-Preserved Data Trading Via Verifiable Data Disturbance., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3126-3140 (July 2024)VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner., , , , and . Int. J. High Perform. Comput. Netw., 12 (1): 39-48 (2018)CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System., , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (3): 3528-3540 (March 2023)