From post

A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities.

, , , , и . CSoNet, том 12575 из Lecture Notes in Computer Science, стр. 283-294. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation., , , , и . WCNC, стр. 1533-1538. IEEE, (2022)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , и . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)Propagation modeling of active P2P worms based on ternary matrix., , , , и . J. Netw. Comput. Appl., 36 (5): 1387-1394 (2013)An Anti-Forensics Method against Memory Acquiring for Android Devices., , , , , и . CSE/EUC (1), стр. 214-218. IEEE Computer Society, (2017)Co-Clustering Host-Domain Graphs to Discover Malware Infection., , , , , и . AIAM (ACM), стр. 49:1-49:6. ACM, (2019)AutoSup: Driving Behaviors Recognition Supervision via Incentive Mechanism., , , , и . ICC, стр. 1-6. IEEE, (2021)A Hybrid Covert Channel with Feedback over Mobile Networks., , , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 87-94. Springer, (2019)An RTP Extension for Reliable User-Data Transmission over VoIP Traffic., , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 74-86. Springer, (2019)A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures., , , , и . KSEM (3), том 13370 из Lecture Notes in Computer Science, стр. 27-38. Springer, (2022)Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost., , , , , , и . CCS, стр. 395-411. ACM, (2018)