Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness., , and . CoRR, (2019)Limitations to threshold random walk scan detection and mitigating enhancements., and . CNS, page 332-340. IEEE, (2013)Augmenting Fiat Currency with an Integrated Managed Cryptocurrency.. CoRR, (2019)Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems., and . Recent Advances in Intrusion Detection, (1999)A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types., and . COMPSAC, page 511-516. IEEE, (2020)A Historical and Statistical Studyof the Software Vulnerability Landscape., and . CoRR, (2021)Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness., , and . SSS, volume 10616 of Lecture Notes in Computer Science, page 410-425. Springer, (2017)Smart Contract Federated Identity Management without Third Party Authentication Services., , and . Open Identity Summit, volume P-293 of LNI, page 37-48. GI, (2019)Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks., and . MILCOM, page 192-197. IEEE, (2014)Empirical Validation of Automated Vulnerability Curation and Characterization., , , , , , and . IEEE Trans. Software Eng., 49 (5): 3241-3260 (2023)