Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On recommendation systems applied in big data.. ECAI, page 1-6. IEEE, (2016)Unveiling Threats: Leveraging User Behavior Analysis for Enhanced Cybersecurity., , , and . ECAI, page 1-6. IEEE, (2023)Fuel Monitoring System based on IoT: Overview and Device Authentication., and . COMM, page 1-4. IEEE, (2022)Security and Cryptographic Challenges for Authentication Based on Biometrics Data., , and . Cryptogr., 2 (4): 39 (2018)A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments., and . Cryptogr., 6 (1): 8 (2022)Blockchain Applications in Computer Communication., and . ECAI, page 1-4. IEEE, (2021)Blockchain Search Using Searchable Encryption Based on Elliptic Curves., and . AINA (3), volume 451 of Lecture Notes in Networks and Systems, page 471-481. Springer, (2022)Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective., and . IntelliSys (2), volume 543 of Lecture Notes in Networks and Systems, page 26-48. Springer, (2022)A Hybrid Searchable Encryption Scheme for Cloud Computing., and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 85-96. Springer, (2018)Authentication Protocol for Intelligent Cars using Fog Computing and Software-Defined Networking., , and . ECAI, page 1-6. IEEE, (2021)