Author of the publication

Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid.

, , , , , and . GLOBECOM, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding., , , , , and . DSN, page 530-542. IEEE, (2019)CLPP: Context-aware location privacy protection for location-based social network., , , , and . ICC, page 1164-1169. IEEE, (2015)A novel stochastic-encryption-based P2P Digital Rights Management scheme., , , and . ICC, page 5541-5545. IEEE, (2015)Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission., , , , , and . ICNC, page 428-433. IEEE, (2020)Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks., , , , , and . WCNC, page 1-6. IEEE, (2020)Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters., , , and . Secur. Commun. Networks, (2017)Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling., , , and . DSN, page 411-423. IEEE, (2020)Load balance and energy efficient data gathering in wireless sensor networks., , , and . Wirel. Commun. Mob. Comput., 8 (5): 645-659 (2008)A Low-latency Secure Data Outsourcing Scheme for Cloud-WSN., , , , and . CoRR, (2018)An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing., , , , and . ICC, page 1-6. IEEE, (2017)