A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem | 0 | 0.34 | 2022 |
A blockchain-adaptive contractual approach for multi-contracting organizational entities | 0 | 0.34 | 2022 |
Supply chain equilibrium on a game theory-incentivized blockchain network | 0 | 0.34 | 2022 |
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable | 0 | 0.34 | 2022 |
Controllable software licensing system for sub-licensing | 0 | 0.34 | 2022 |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain | 0 | 0.34 | 2022 |
Secure and Efficient Data Aggregation for IoT Monitoring Systems | 0 | 0.34 | 2021 |
Complementary Blockchain-Based Privacy Protection for Covid-19 Contact Tracing. | 0 | 0.34 | 2021 |
Scalable and redactable blockchain with update and anonymity | 0 | 0.34 | 2021 |
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors | 0 | 0.34 | 2021 |
Policy-Driven Blockchain and Its Applications for Transport Systems | 1 | 0.35 | 2020 |
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. | 3 | 0.36 | 2020 |
A Novel End-To-End Fault Diagnosis Approach for Rolling Bearings by Integrating Wavelet Packet Transform into Convolutional Neural Network Structures. | 0 | 0.34 | 2020 |
A Study of Primary School Pupils' Motivation, Emotional Intelligence and Attentional Control Ability. | 0 | 0.34 | 2019 |
Fully Secure Lightweight Certificateless Signature Scheme For Iiot | 0 | 0.34 | 2019 |
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. | 1 | 0.36 | 2019 |
Efficient Micropayment of Cryptocurrency from Blockchains. | 0 | 0.34 | 2019 |
Provably Secure (Broadcast) Homomorphic Signcryption | 0 | 0.34 | 2019 |
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. | 2 | 0.43 | 2019 |
Maximizing the first eigenfrequency of structures subjected to uniform boundary erosion through the level set method. | 0 | 0.34 | 2019 |
V-Chain: A Blockchain-Based Car Lease Platform | 0 | 0.34 | 2018 |
GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. | 3 | 0.36 | 2018 |
Practical and secure telemedicine systems for user mobility. | 0 | 0.34 | 2018 |
On sufficient dimension reduction with missing responses through estimating equations. | 0 | 0.34 | 2018 |
High-Bandwidth Ultrasonic Communication Using Graphene-Based Acoustic Devices | 0 | 0.34 | 2018 |
Secure Payment Routing Protocol For Economic Systems Based On Blockchain | 0 | 0.34 | 2018 |
Eliminate localized eigenmodes in level set based topology optimization for the maximization of the first eigenfrequency of vibration. | 5 | 1.02 | 2017 |
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain. | 32 | 1.16 | 2017 |
On a new hybrid estimator for the central mean space. | 1 | 0.37 | 2017 |
Bbds: Blockchain-Based Data Sharing For Electronic Medical Records In Cloud Environments | 32 | 1.25 | 2017 |
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems | 1 | 0.36 | 2017 |
Unsupervised Representation Learning for Pulmonary Nodule Classification | 0 | 0.34 | 2017 |
Image Segmentation of Liver CT Based on Fully Convolutional Network | 0 | 0.34 | 2017 |
Privacy-Preserving Mobile Crowdsensing For Located-Based Applications | 1 | 0.34 | 2017 |
Dual-Anonymous Reward Distribution For Mobile Crowdsensing | 0 | 0.34 | 2017 |
Distributed clinical data sharing via dynamic access-control policy transformation. | 8 | 0.51 | 2016 |
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds | 4 | 0.39 | 2016 |
Advanced security analysis of a signature scheme with message recovery | 0 | 0.34 | 2015 |
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage. | 8 | 0.47 | 2014 |
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures | 2 | 0.38 | 2014 |
A novel blind separation method in magnetic resonance images. | 0 | 0.34 | 2014 |
A New Construction of Proxy Signature Using Chameleon Hash Function | 0 | 0.34 | 2013 |
Tailoring The Ratios Between Eigenfrequencies Of Tapping Mode Atomic Force Microscope Probe Using Concentrated Masses | 0 | 0.34 | 2013 |
Image registration using a point-line duality based line matching method. | 4 | 0.46 | 2013 |
A Strong Designated Verifier Signature Scheme with Secure Disavowability | 1 | 0.35 | 2012 |
Improved certificateless signature scheme provably secure in the standard model. | 17 | 0.85 | 2012 |
A pattern matching method using geometric information of images | 0 | 0.34 | 2011 |
Cryptanalysis of Two Identity Based Signcryption Schemes | 0 | 0.34 | 2009 |
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel | 0 | 0.34 | 2009 |
Simultaneous optimization of the material properties and the topology of functionally graded structures | 2 | 0.40 | 2008 |