Author of the publication

Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations.

, , , , , and . IEEE Trans. Computers, 72 (11): 3231-3244 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topology Inference in Wireless Mesh Networks., , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 159-168. Springer, (2009)A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 232-242. Springer, (2015)Enhancing Macrocell Downlink Performance through Femtocell User Cooperation., , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 232-242. Springer, (2011)Low Price to Win: Interactive scheme in cooperative cognitive radio networks., , , and . ICC, page 7546-7551. IEEE, (2015)Sparsity and compressive sensing of sense-through-foliage radar signals., , , , and . ICC, page 6376-6380. IEEE, (2012)A Simple Implementation of the Stochastic Discrimination for Pattern Recognition., and . SSPR/SPR, volume 1876 of Lecture Notes in Computer Science, page 882-887. Springer, (2000)Quantum Game Analysis of Privacy-Leakage for Application Ecosystems., , , , and . MobiHoc, page 13:1-13:10. ACM, (2017)Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory., , , and . CoRR, (2021)Robust Compressive Data Gathering in Wireless Sensor Networks., , , , and . IEEE Trans. Wirel. Commun., 12 (6): 2754-2761 (2013)Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments., , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 554-563. Springer, (2014)