Personensuche
X
?
2023 IEEE International Conference on Blockchain (Blockchain) ,
1
Cross-chain based Spectrum Resources Transfer Technology ac..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
2
BDTS: Blockchain-Based Data Trading System:
, In:
?
Database Systems for Advanced Applications; Lecture Notes in Computer Science ,
3
EduChain: A Blockchain-Based Privacy-Preserving Lifelong Ed..:
, In:
?
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure ,
4
DCSS: A Smart Contract-based Data Continuous Storage Scheme:
, In:
?
Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science ,
5
PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transa..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
6
Lever: Making Intensive Validation Practical on Blockchain:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
7
FPHammer: A Device Identification Framework based on DRAM F..:
, In:
?
2023 26th International Conference on Electrical Machines and Systems (ICEMS) ,
8
Impedance Control of a Spherical Motor with a Complementary..:
, In:
?
2023 8th Asia Conference on Power and Electrical Engineering (ACPEE) ,
9
Research on Demagnetization Technology for Virtual Synchron..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
10
Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Su..:
, In:
?
Proceedings of the Asia Conference on Electrical, Power and Computer Engineering ,
11
Parameter optimization scheme of DFIG based on the Self-syn..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
12
Squeezing Network Performance for Secure and Efficient PoW ..:
, In:
?
?
Springer Series in Geomechanics and Geoengineering; Proceedings of the International Field Exploration and Development Conference 2020 ,
14
Physical Simulation of Depleted Exploitation for Yingxi E32..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
15