Author of the publication

Enhancing Security and Flexibility in the Industrial Internet of Things: Blockchain-Based Data Sharing and Privacy Protection.

, , , , and . Sensors, 24 (3): 1035 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Communication for AMI on Basis of ECC and ESP., , and . ICCSP, page 44-48. ACM, (2017)Enhancing Security and Flexibility in the Industrial Internet of Things: Blockchain-Based Data Sharing and Privacy Protection., , , , and . Sensors, 24 (3): 1035 (February 2024)A Protection Method Based on Message Identification and Flow Monitoring for Managing the Congestion Arising From Network Attacks on Smart Substation., , , and . IEEE Communications Letters, 22 (11): 2214-2217 (2018)A multimodal dual-fusion entity extraction model for large and complex devices., , , and . Comput. Commun., (October 2023)Analysis of data model communication performance based on gated dispatch network simulation model., , , , , and . EITCE, page 573-578. ACM, (2021)Quantum Varying Deficit Round Robin Scheduling Over Priority Queues., and . CIS, page 252-256. IEEE Computer Society, (2007)Study on Communication Service Strategy for Congestion Issue in Smart Substation Communication Network., , , , and . IEEE Access, (2018)Multi-agent trust-based intrusion detection scheme for wireless sensor networks., , , , and . Comput. Electr. Eng., (2017)Establishment of a unified data model based on OPC UA and analysis of the efficiency of communication protocol., , , , , and . EITCE, page 497-503. ACM, (2021)Analysis and evaluation of fieldbus communication and protocol static characteristic., and . ICAIT, page 126:1-126:5. ACM, (2008)