Author of the publication

Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.

, , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach of Secure Two-Way-Pegged Multi-sidechain., , , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 551-564. Springer, (2019)When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid., , , , , and . IWQoS, page 1-9. IEEE, (2017)Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources., , , , , and . CoRR, (2018)Attack-Resilient TLS Certificate Transparency., , , , , and . IEEE Access, (2020)Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid., , , , and . IEEE Wirel. Commun., 25 (1): 84-89 (2018)Security and Privacy in Wireless IoT., , , , and . IEEE Wirel. Commun., 25 (6): 10-11 (2018)A Time Impulse Neural Network Framework for Solving the Minimum Path Pair Problems of the Time-Varying Network., , and . IEEE Trans. Knowl. Data Eng., 35 (8): 7681-7692 (August 2023)EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid., , , , and . Sci. China Inf. Sci., 62 (3): 32103:1-32103:14 (2019)An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing., , , and . BigDataSecurity/HPSC/IDS, page 113-118. IEEE, (2019)WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT., , , and . USENIX Security Symposium, page 5341-5357. USENIX Association, (2023)