Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval., , , and . IACR Cryptology ePrint Archive, (2016)A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 949-962 (2013)Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction., , , , and . Computing, 97 (1): 29-49 (2015)Preserving privacy of feedback providers in decentralized reputation systems., , and . Comput. Secur., 31 (7): 816-826 (2012)A Patient-centered Longitudinal Plan of Care: Vision Versus Reality., , , , , , and . AMIA, AMIA, (2013)Sustainable PV-powered FPGA-controlled high brightness LED illumination systems., , and . EDUCON, page 1-5. IEEE, (2012)Self-reported Verifiable Reputation with Rater Privacy., , , and . IFIPTM, volume 505 of IFIP Advances in Information and Communication Technology, page 180-195. Springer, (2017)A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case., , , , and . BigData Congress, page 25-30. IEEE Computer Society, (2013)Decentralized trustworthiness score management with smart contracts on the trustlend platform., , , and . IET Blockchain, 4 (1): 59-72 (March 2024)Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps., , , and . COMPLEX NETWORKS (2), volume 882 of Studies in Computational Intelligence, page 599-610. Springer, (2019)