Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full Characterization of a Class of Graphs Tailored for Software Watermarking., , , , and . Algorithmica, 81 (7): 2899-2916 (2019)Dijkstra graphs., , , , , and . Discret. Appl. Math., (2019)Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger Fabric., , , , , and . Int. J. Secur. Networks, 17 (2): 77-91 (2022)Software Watermark Scheme., , and . MetroInd4.0& IoT, page 306-310. IEEE, (2022)Development of security mechanisms for a remote sensing system based on opportunistic and mesh networks., , , , and . MetroInd4.0&IoT, page 418-422. IEEE, (2020)The Graphs of Structured Programming., , , , and . CTW, page 105-108. (2015)The Graphs of Structured Programming., , , , and . CTW, page 105-108. (2015)On the resilience of canonical reducible permutation graphs., , , , and . Discret. Appl. Math., (2018)Proficiency Testing for Software Analysis and Cybersecurity Laboratories., , , , , , and . MetroInd4.0&IoT, page 441-446. IEEE, (2020)Towards a Practical Information Security Maturity Evaluation Method focused on People, Process and Technology., , and . MetroInd4.0&IoT, page 721-726. IEEE, (2021)