Author of the publication

Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study.

, , , , , , , , , and . WI/IAT, page 128-135. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise., and . ACM Trans. Manag. Inf. Syst., 12 (1): 2:1-2:20 (2021)Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem., , and . WPES@CCS, page 114-120. ACM, (2018)Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes., , , , and . ICCST, page 1-8. IEEE, (2016)PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies., , , , , , , and . WSDM, page 1593-1596. ACM, (2022)On Sentiment of Online Fake News., , and . ASONAM, page 760-767. IEEE, (2020)Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools., and . ICAART (2), page 29-40. SCITEPRESS, (2021)Modeling and analysis of identity threat behaviors through text mining of identity theft stories., , , and . Comput. Secur., (2017)Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach., , and . PST, page 1-3. IEEE, (2019)Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study., , , , , , , , , and . WI/IAT, page 128-135. ACM, (2021)Self-Sovereign Identity and User Control for Privacy-Preserving Contact Tracing., , , , , , and . WI/IAT, page 438-445. ACM, (2021)