Author of the publication

ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement.

, , and . DSC, page 1-8. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06)., and . SAC, page 1854. ACM, (2006)A Unified Security Framework for Networked Applications., and . SAC, page 351-357. ACM, (2003)Supporting multi-agent reputation calculation in the Wikipedia Recommender System.. IET Inf. Secur., 4 (4): 273-282 (2010)Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control., , and . SAC, page 2202-2209. ACM, (2016)A Collaborative Approach to Botnet Protection., , , , and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 624-638. Springer, (2012)The Claim Tool Kit for ad hoc recognition of peer entities., and . Sci. Comput. Program., 54 (1): 49-71 (2005)Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control., and . Sensors, 21 (9): 3041 (2021)A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS., , , , and . CoRR, (2022)ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement., , and . DSC, page 1-8. IEEE, (2021)Privacy-preserving Measures in Smart City Video Surveillance Systems., and . ICISSP, page 506-514. SCITEPRESS, (2020)