Xiaodong Wang's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publication (1)
Leakage of user privacy and vandalism of the sharing bike have been the most serious problem since sharing bike came on the scene. Accordingly, it is very urgent to rebuild the underlying trust mechanism. Most bike sharing systems are centralized, leading to overpressure on the central server. This paper proposes a bike sharing system based on bloc...
Citations
... In this case, IoB services could be disrupted, and the safety of bikers is not guaranteed. To encounter security issues, a variety of solutions have explored the security problems in IoB to identify the attacks and propose secure access control management mechanisms between bikes and their stations in the IoB network [13,14,15,9]. These solutions could be classified in two categories: Centralized Access Control and Distributed Access Control. ...