Author of the publication

Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.

, , , , , , and . IEEE Trans. Ind. Informatics, 18 (2): 953-964 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Errors in Computational Complexity Proofs for Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 585-604. Springer, (2005)Secret Signatures: How to Achieve Business Privacy Efficiently?, , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 30-47. Springer, (2007)Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis., , , and . AISC, volume 161 of CRPIT, page 53-56. Australian Computer Society, (2015)Empirical vulnerability analysis of automated smart contracts security testing on blockchains., , , and . CASCON, page 103-113. ACM, (2018)Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things., , , and . IEEE Internet of Things Journal, 5 (4): 3059-3067 (2018)Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.. SIGACT News, 43 (2): 38-40 (2012)Using Social Media Data to Improve Situational Awareness during Emergent Events., , , and . AMCIS, Association for Information Systems, (2018)Improving Security Awareness in the Government Sector., , , , and . DG.O, page 1-7. ACM, (2016)A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials., , , and . IEEE Access, (2018)