Author of the publication

A Security Detection Model for Selfish Mining Attack.

, , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 185-195. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-aware PKI model with strong forward security., , , , , and . Int. J. Intell. Syst., 37 (12): 10049-10065 (December 2022)A Security Detection Model for Selfish Mining Attack., , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 185-195. Springer, (2019)Design of Anonymous Communication Protocol Based on Group Signature., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 175-181. Springer, (2019)Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature., , , , , and . Concurr. Comput. Pract. Exp., (2022)Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing., , , , , , and . IEEE Access, (2020)Aitac: an identity-based traceable anonymous communication model., , , , , , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1353-1362 (2022)