Author of the publication

Polynomial-based modifiable blockchain structure for removing fraud transactions.

, , , , , and . Future Gener. Comput. Syst., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring., , , , and . Symmetry, 11 (5): 637 (2019)A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree., and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 170-181. Springer, (2008)A MQTT-API-compatible IoT security-enhanced platform., , , , , , , , and . Int. J. Sens. Networks, 32 (1): 54-68 (2020)Special issue on security and privacy of blockchain technologies., , , , and . Int. J. Inf. Sec., 19 (3): 243-244 (2020)Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices., , , , , and . IEEE Trans. Ind. Informatics, 18 (10): 7059-7067 (2022)A Novel Structure-Based Data Sharing Scheme in Cloud Computing., , , , and . IEICE Trans. Inf. Syst., 103-D (2): 222-229 (2020)Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (12): 25287-25296 (2022)DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems., , , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (5): 3558-3569 (2022)Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust"., , and . Symmetry, 15 (5): 1059 (2023)Improved handover authentication and key pre-distribution for wireless mesh networks., , , and . Concurr. Comput. Pract. Exp., 28 (10): 2978-2990 (2016)