Author of the publication

Blockchain Performance Analysis for Supporting Cross-Border E-Government Services.

, , , , , and . IEEE Trans. Engineering Management, 67 (4): 1310-1322 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication., , , and . J. Comput. Secur., 22 (3): 383-413 (2014)ASPF: Adaptive anti-SPIT Policy-based Framework., and . ARES, page 153-160. IEEE Computer Society, (2011)Faults and Cyber Attacks Detection in Critical Infrastructures., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 283-289. Springer, (2014)Formal analysis for robust anti-SPIT protection using model checking., , , and . Int. J. Inf. Sec., 11 (2): 121-135 (2012)A fault diagnosis system for interdependent critical infrastructures based on HMMs., , and . Reliab. Eng. Syst. Saf., (2015)Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony., and . Comput. Secur., 29 (5): 603-618 (2010)A Formally Verified Mechanism for Countering SPIT., , , and . CRITIS, volume 6712 of Lecture Notes in Computer Science, page 128-139. Springer, (2010)SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned., , , , and . SEC, volume 278 of IFIP, page 381-395. Springer, (2008)Cyber Attacks in Power Grid ICT Systems Leading to Financial Disturbance., and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 256-267. Springer, (2014)An Adaptive Policy-Based Approach to SPIT Management., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 446-460. Springer, (2008)