Author of the publication

Dynamic Access Control and Trust Management for Blockchain-Empowered IoT.

, , , , and . IEEE Internet Things J., 9 (15): 12997-13009 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative ICI Mitigation Method for MIMO OFDM Systems., , , and . IEICE Trans. Commun., 89-B (3): 859-866 (2006)On MM-Type Channel Estimation for MIMO OFDM Systems., , , and . IEEE Trans. Wirel. Commun., 6 (3): 1046-1055 (2007)STAMP: Short-Term Attention/Memory Priority Model for Session-based Recommendation., , , and . KDD, page 1831-1839. ACM, (2018)A hybrid Bregman alternating direction method of multipliers for the linearly constrained difference-of-convex problems., , , and . J. Glob. Optim., 76 (4): 665-693 (2020)Distributed and Secure Federated Learning for Wireless Computing Power Networks., , , , and . IEEE Trans. Veh. Technol., 72 (7): 9381-9393 (July 2023)On the Origins and Variations of Blockchain Technologies., , , and . CoRR, (2018)K-State automaton burst detection model based on KOS: Emerging trends in cancer field., , and . J. Inf. Sci., 41 (1): 16-26 (2015)General Framework of Chain Store Information System base on Supply Chain Management Theory., and . Computer and Information Science, 1 (4): 150-154 (2008)Bit Security of the CDH Problems over Finite Fields., , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 441-461. Springer, (2015)Improving EDCA for Efficient Channel Access in Vehicular Communications., , and . IEEE Commun. Mag., 56 (10): 72-77 (2018)