Author of the publication

A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger.

, , and . iThings/GreenCom/CPSCom/SmartData, page 1129-1136. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opportunistic routing in wireless networks using bitmap-based weighted tree., and . Comput. Networks, (2021)Optimal Spare Management via Statistical Model Checking: A Case Study in Research Reactors., , , , and . FMICS, volume 14290 of Lecture Notes in Computer Science, page 205-223. Springer, (2023)A lightweight improvement of PeDAAC protocol for 6LoWPAN in the Internet of Things., and . Multim. Tools Appl., 80 (20): 31467-31486 (2021)A new algorithm for money laundering detection based on structural similarity., , , , , and . UEMCON, page 1-7. IEEE, (2016)Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy., , and . BRAINS, page 93-96. IEEE, (2021)A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger., , and . iThings/GreenCom/CPSCom/SmartData, page 1129-1136. IEEE, (2018)Towards Energy-aware Cyber-Physical Systems Verification and Optimization., , and . FedCSIS (Position Papers), volume 26 of Annals of Computer Science and Information Systems, page 205-210. (2021)Complexity of Computing the Anti-Ramsey Numbers for Paths., , , , , and . MFCS, volume 170 of LIPIcs, page 6:1-6:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Decentralized and Privacy-Preserving Key Management Model., , and . ISNCC, page 1-7. IEEE, (2020)Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets., , and . DASC/PiCom/DataCom/CyberSciTech, page 320-325. IEEE, (2019)