Author of the publication

An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain.

, , , , , and . Secur. Commun. Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment., , , and . IEEE Access, (2020)Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things., , , , and . J. Sensors, (2020)Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme., , , , and . Entropy, 25 (5): 822 (2023)Cloud-edge collaboration based peer to peer services redirection strategy for passive optical network., , , , and . IET Commun., 16 (8): 902-914 (2022)A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network., , , , and . Sensors, 18 (11): 3962 (2018)Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 519-527. Springer, (2018)Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices., , , , and . Adv. Comput., (2021)Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing., , and . Secur. Commun. Networks, (2020)A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF., , , , and . Entropy, 25 (9): 1347 (September 2023)A remote sensing encrypted data search method based on a novel double-chain., , , and . Connect. Sci., (December 2023)