Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive and Dynamic Security in AI-Empowered 6G: From an Energy Efficiency Perspective., , , , and . IEEE Commun. Stand. Mag., 5 (3): 80-88 (2021)Provable data transfer from provable data possession and deletion in cloud storage., , , and . Comput. Stand. Interfaces, (2017)Fine-grained data access control with attribute-hiding policy for cloud-based IoT., , , , , and . Comput. Networks, (2019)Achieving Accountable and Efficient Data Sharing in Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 17 (2): 1416-1427 (2021)Guest Editorial Special Issue on Cybertwin-Driven 6G: Architectures, Methods, and Applications., , , , , and . IEEE Internet Things J., 8 (22): 16191-16194 (2021)Efficient and Anonymous Authentication With Succinct Multi-Subscription Credential in SAGVN., , , and . IEEE Trans. Intell. Transp. Syst., 23 (3): 2863-2873 (2022)Blockchain-Based Credential Management for Anonymous Authentication in SAGVN., , , , and . IEEE J. Sel. Areas Commun., 40 (10): 3104-3116 (2022)FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme., , , , , and . IEEE J. Sel. Areas Commun., 40 (12): 3343-3357 (2022)Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3002-3018 (July 2023)Privacy-Enhancing Fog Computing and Its Applications, , and . Springer Briefs in Electrical and Computer Engineering Springer, (2018)