Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VMV: Augmenting an Internet Voting System with Selene Verifiability., , , , , , , , and . CoRR, (2019)RDSF: Risk Driven Security Framework for Industrial Autonomous Robots., and . ICDCS, page 1075-1076. IEEE, (2023)High-Level Feature Extraction for Crowd Behaviour Analysis: A Computer Vision Approach., , , , , , , and . ICIAP Workshops, volume 13374 of Lecture Notes in Computer Science, page 59-70. Springer, (2022)An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks., , , and . Array, (2022)PVPBC: Privacy and Verifiability Preserving E-Voting Based on Permissioned Blockchain., , and . Future Internet, 15 (4): 121 (April 2023)Automated Cognitive Analyses for Intelligent Tutoring Systems., , and . BDCAT, page 171-178. IEEE, (2020)Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger., , , , , , , and . ICDCS, page 1167-1168. IEEE, (2020)Locality based approach to improve propagation delay on the Bitcoin peer-to-peer network., , and . IM, page 556-559. IEEE, (2017)Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network., , and . ISCC, page 1-6. IEEE, (2020)Evaluation of security and performance of clustering in the Bitcoin network, with the aim of improving the consistency of the Blockchain.. University of Portsmouth, UK, (2018)British Library, EThOS.