Author of the publication

DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems.

, , , , , and . IEEE Netw., 34 (1): 38-46 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized IoT Data Authorization with Pebble Tracker., , , and . WF-IoT, page 1-2. IEEE, (2020)DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter., , , , and . BSCI, page 53-62. ACM, (2020)Structural Attention Enhanced Continual Meta-Learning for Graph Edge Labeling Based Few-Shot Remote Sensing Scene Classification., , , , and . Remote. Sens., 14 (3): 485 (2022)Secure simultaneous bit extraction from Koblitz curves., , , , and . Des. Codes Cryptogr., 87 (1): 1-13 (2019)Contrastive Prompt Learning-based Code Search based on Interaction Matrix., , , and . CoRR, (2023)TPU as Cryptographic Accelerator., , , , , , , and . CoRR, (2023)QUIZ: An Arbitrary Volumetric Point Matching Method for Medical Image Registration., , , , , , , , and . CoRR, (2023)Decentralized Trust Management: Risk Analysis and Trust Aggregation., , , , and . ACM Comput. Surv., 53 (1): 2:1-2:33 (2021)Lightweight Dual-Domain Network for Real-Time Medical Image Segmentation., , , and . ICIP, page 396-400. IEEE, (2022)Can Adversarial Training benefit Trajectory Representation?: An Investigation on Robustness for Trajectory Similarity Computation., , , , , , and . CIKM, page 905-914. ACM, (2022)