Author of the publication

A Secure Sharing Framework Based on Cloud-Chain Fusion for SWIM.

, , and . DataCom, volume 13864 of Lecture Notes in Computer Science, page 127-141. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlation-based Detection of LDoS Attack., , , and . J. Softw., 7 (10): 2341-2348 (2012)Blockchain-Based Trust Model for Air Traffic Management Network., , and . ICCCS, page 92-98. IEEE, (2021)A Secure Sharing Framework Based on Cloud-Chain Fusion for SWIM., , and . DataCom, volume 13864 of Lecture Notes in Computer Science, page 127-141. Springer, (2022)Access control method for air ticket distribution system based on blockchain., , and . ISPA/BDCloud/SocialCom/SustainCom, page 815-821. IEEE, (2022)Research on SWIM Cooperative Emergency Response and Resilient Disaster Recovery Based on Survivability., , and . ISADS, page 1-5. IEEE, (2023)A Detection Method for I-CIFA Attack in NDN Network., , , and . SmartCom, volume 13202 of Lecture Notes in Computer Science, page 364-373. Springer, (2021)An adaptive adjustment strategy for bolt posture errors based on an improved reinforcement learning algorithm., , , , , and . Appl. Intell., 51 (6): 3405-3420 (2021)SEDP-based detection of low-rate DoS attacks., , , and . Int. J. Commun. Syst., 28 (11): 1772-1788 (2015)I-CIFA: An improved collusive interest flooding attack in named data networking., , , and . J. Inf. Secur. Appl., (2021)A New Transmitter Design for Wireless Power Transmission Systems with Compatible Circular and Solenoidal Receiving Coils., , , , , and . IECON, page 1-6. IEEE, (2023)