Author of the publication

Data concealing of supply chain transactions using the Distributed Trust Backbone.

, , , and . ICITST, page 151-156. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data concealing of supply chain transactions using the Distributed Trust Backbone., , , and . ICITST, page 151-156. IEEE, (2014)A Decision Framework for Selecting a Suitable Software Development Process., , , , and . ICEIS (3), page 34-43. SciTePress, (2010)A Novel Algorithm for Visualizing Concept Associations., , and . DEXA Workshops, page 405-409. IEEE Computer Society, (2005)Fuzzy histograms: A Statistical Analysis., , and . EUSFLAT Conf., page 605-610. Universidad Polytecnica de Catalunya, (2005)A fuzzy additive reasoning scheme for probabilistic Mamdani fuzzy systems., , and . FUZZ-IEEE, page 331-336. IEEE, (2003)Multi-phase time series models for motorway flow forecasting., , , and . ITSC, page 2033-2038. IEEE, (2011)Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations., , and . MILCOM, page 1-6. IEEE, (2018)Evolutionary hidden information detection by granulation-based fitness approximation., , , , and . Appl. Soft Comput., 10 (3): 719-729 (2010)A Decision Tree Induction Algorithm for Efficient Rule Evaluation Using Shannon's Expansion., , , and . MICAI (1), volume 14391 of Lecture Notes in Computer Science, page 241-252. Springer, (2023)Information retrieval systems using an associative conceptual space., and . ESANN, page 351-356. (1999)