Author of the publication

A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics.

, , , and . IEEE Internet Things J., 10 (10): 8603-8617 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting., , , , , and . J. Medical Syst., 40 (11): 246:1-246:12 (2016)A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective., , , and . CoRR, (2023)MaskBlock: Transferable Adversarial Examples with Bayes Approach., , , and . CoRR, (2022)PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting., , , , , , and . Future Gener. Comput. Syst., (2020)A secure data deletion scheme for IoT devices through key derivation encryption and data analysis., , , , , , and . Future Gener. Comput. Syst., (2020)Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage., , , and . Secur. Commun. Networks, (2021)CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph., , , , and . IEEE Trans. Big Data, 8 (4): 905-919 (2022)Lightning-fast and privacy-preserving outsourced computation in the cloud., , , and . Cybersecur., 3 (1): 17 (2020)Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2641-2656 (May 2023)