Author of the publication

Two-Factor Blockchain for Traceability Cacao Supply Chain.

, , and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, page 332-339. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification Based Scheme to Restrict IoT Attacks., , , , , and . BDCAT, page 63-68. ACM, (2021)Threshold based Technique to Detect Anomalies using Log Files., , , and . ICMLT, page 191-198. ACM, (2022)Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 574-581. IEEE, (2021)Correction to: Two-Factor Blockchain for Traceability Cacao Supply Chain., , and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, Springer, (2018)Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification., , , , , , and . IEEE Internet Things J., 11 (2): 2322-2335 (January 2024)Multimodal Fake News Analysis Based on Image-Text Similarity., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 959-972 (February 2024)Data breach: analysis, countermeasures and challenges., , , , , and . Int. J. Inf. Comput. Secur., 19 (3/4): 402-442 (2022)A real-time hostile activities analyses and detection system., , , , and . Appl. Soft Comput., (2021)An effective SVD-based image tampering detection and self-recovery using active watermarking., , , , and . Signal Process. Image Commun., 29 (10): 1197-1210 (2014)Security issues in Internet of Vehicles (IoV): A comprehensive survey., , , , , and . Internet Things, (July 2023)