Author of the publication

Privacy-Protection Scheme of a Credit-Investigation System Based on Blockchain.

, , , , , and . Entropy, 23 (12): 1657 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of the Relative Entropy Density Divergence in Intrusion Detection Models., , and . CSSE (3), page 951-954. IEEE Computer Society, (2008)978-0-7695-3336-0.Data Masking Generic Model., , , and . EIDWT, page 724-727. (2013)Xmark: Dynamic Software Watermarking Using Collatz Conjecture., , , , and . IEEE Trans. Information Forensics and Security, 14 (11): 2859-2874 (2019)SSIR: Secure similarity image retrieval in IoT., , and . Inf. Sci., (2019)DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping., , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 155-174. Springer, (2019)K-Anonymity Algorithm Based on Improved Clustering., , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 462-476. Springer, (2018)B-Mobishare: Privacy-Preserving Location Sharing Mechanism in Mobile Online Social Networks., , , and . BWCCA, page 312-316. IEEE Computer Society, (2014)Format Compliant Degradation for PNG Image., , , and . EIDWT, page 720-723. IEEE Computer Society, (2013)Format-Preserving Fuzzy Query Mechanism., , , and . EIDWT, page 220-226. IEEE Computer Society, (2013)An efficient and privacy-preserving location sharing mechanism., , , , and . Computer Standards & Interfaces, (2016)