Author of the publication

Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing.

, , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 181-189. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and quantitatively predicting software security based on stochastic Petri nets., , , and . Mathematical and Computer Modelling, 55 (1-2): 102-112 (2012)Modeling Activity Diagrams with Extended Petri Nets., , , and . Intelligent Automation & Soft Computing, 17 (6): 725-735 (2011)Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing., , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 181-189. Springer, (2019)Scheduling Real-Time Embedded Systems Based on TCPNIA., , , and . JSW, 6 (3): 340-348 (2011)Modelling UML sequence diagrams with aspect-oriented extended Petri nets., , and . IJCAT, 45 (1): 57-65 (2012)Trustworthy Software Development Based on Model Driven Architecture., , and . ICICA (1), volume 391 of Communications in Computer and Information Science, page 193-202. Springer, (2013)ABE with improved auxiliary input for big data security., , , and . J. Comput. Syst. Sci., (2017)An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices., , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 339-353. Springer, (2019)Modeling UML sequence diagrams using extended Petri nets., , , and . Telecommunication Systems, 51 (2-3): 147-158 (2012)Mapping UML Activity Diagrams to Analyzable Petri Net Models., , , and . QSIC, page 369-372. IEEE Computer Society, (2010)