Author of the publication

Blockchain Performance Analysis for Supporting Cross-Border E-Government Services.

, , , , , and . IEEE Trans. Engineering Management, 67 (4): 1310-1322 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks., and . MobiMedia, ICST, (2008)Detecting DNS Amplification Attacks., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 185-196. Springer, (2007)PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies., , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 185-195. Springer, (2006)A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks., , , , , and . Symmetry, 12 (4): 579 (2020)Adaptive defenses for commodity software through virtual application partitioning., , , and . CCS, page 133-144. ACM, (2012)Towards a Forensic Analysis for Multimedia Communication Services., and . AINA Workshops, page 424-429. IEEE Computer Society, (2011)A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony., , and . TrustBus, volume 5185 of Lecture Notes in Computer Science, page 59-68. Springer, (2008)Dypermin: Dynamic permission mining framework for android platform., , and . Comput. Secur., (2018)Survey of network security systems to counter SIP-based denial-of-service attacks., , and . Comput. Secur., 29 (2): 225-243 (2010)A Permission verification approach for android mobile applications., , , and . Comput. Secur., (2015)