Author of the publication

Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.

, , , , and . ACM Trans. Cyber Phys. Syst., 5 (1): 4:1-4:24 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications., , , , , , and . IEEE Internet Things J., 8 (21): 15796-15806 (2021)TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks., , , and . IEEE Internet Things J., 6 (4): 5878-5891 (2019)Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3606-3615 (2020)COLIDE: a collaborative intrusion detection framework for Internet of Things., , , , and . IET Networks, 8 (1): 3-14 (2019)On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things., , , , and . Inf. Process. Manag., 58 (3): 102526 (2021)Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features., , and . Inf., 15 (1): 36 (2024)Risk-Based Access Control Model: A Systematic Literature Review., , , , and . Future Internet, 12 (6): 103 (2020)Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems., , , , , and . ACM Trans. Priv. Secur., 27 (1): 1:1-1:25 (2024)M2M-REP: Reputation system for machines in the internet of things., , , and . Comput. Secur., (2018)M2M-REP: Reputation of Machines in the Internet of Things., , and . ARES, page 28:1-28:7. ACM, (2017)