A Blockchain-Based IoT Data Secure Vickery Auction System

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (8. : 2022 : Qinghai) Advances in artificial intelligence and security ; Part 3
1. Verfasser: Wang, Haohui (VerfasserIn)
Weitere Verfasser: Chen, Xiubo (VerfasserIn), Ahmad, Haseeb (VerfasserIn), Xu, Gang (VerfasserIn), Yang, Yixian (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Linkable Ring Signature Scheme from NTRU Lattice 2022 Ye, Qing
A Blockchain-Assisted Key Generation Electric Health Records Sharing Scheme 2022 Zhang, Qiao
An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption 2022 Tan, Pengfei
Byzantine Fault-Tolerant Consensus Algorithm Based on Dynamic Weight Sharding 2022 Zhang, Wang
A Review of Crop Recognition Methods Based on Multi-source Remote Sensing Data 2022 Wang, Lei
Study on the Internet of Things Discipline in Civil Aviation 2022 Chen, Jialei
EEMP: Architecture Design of Electrical Equipment Monitoring and Management Platform Oriented to Power Internet of Things 2022 Qiao, Xueming
Reliability Evaluation of Smart DC Microgrid 2022 Zheng, Kai
Mobile Terminal Security Protection Method Based on Community Detection Algorithms and Graph Matching Networks 2022 Chen, Mu
A Privacy-Preserving Scheme by Combining Compressed Sensing and Secret Sharing in Cloud Environment 2022 Liang, Junying
A Learning-Based Feature Extraction Method for Detecting Malicious Code 2022 Ruan, Zhiqiang
Identification of Experts in the Security Field Based on the Hypernet S-edgeRank Algorithm 2022 Zhang, Yurui
Review of Security Choreography Research 2022 Yu, Jiangping
Deep Edge Defense for Industrial Internet Based on Customized Hardware and UOS Architecture 2022 Wan, Ming
Reliable Collaboration Mechanism of Side End Resources for Discrete Services of Virtual Power Plants 2022 Song, Jigao
Design and Testing of Source Address Validation Protocols: A Survey 2022 Li, Deshun
A High-Capacity and High-Security Generative Cover Steganography Algorithm 2022 Ma, Bin
Steganalysis of Content-Adaptive JPEG Steganography Based on Ensemble of Convolutional Neural Networks with Image Preprocessing Using Gabor Filters 2022 Song, Xiaofeng
Robust Zero Watermarking Algorithm for Medical Images Using Local Binary Pattern and Discrete Cosine Transform 2022 Liu, Wenyi
Reversible Data Hiding Based on Stationary Sequence of Pixel Value Ordering 2022 Mao, Ningxiong
Alle Artikel auflisten