Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiler: Profile-Based Model to Detect Phishing Emails., , , , , and . CoRR, (2022)Traceable, trustworthy and privacy preserving agri-food supply chains., , , , and . TPS-ISA, page 313-320. IEEE, (2021)Efficient Credential Revocation Using Cryptographic Accumulators., , and . DAPPS, page 127-134. IEEE, (2023)VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms., , , , and . DAPPS, page 109-118. IEEE, (2023)Automated Table Understanding Using Stub Patterns., , , and . DASFAA (1), volume 9642 of Lecture Notes in Computer Science, page 533-548. Springer, (2016)MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System., , , and . TrustCom, page 976-987. IEEE, (2021)Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation., , , and . ICSA, page 166-175. IEEE Computer Society, (2018)A systematic review of federated learning from clients' perspective: challenges and solutions., , , and . Artif. Intell. Rev., 56 (S2): 1773-1827 (November 2023)BGRA: A Reference Architecture for Blockchain Governance., , , , and . CoRR, (2022)Defining Blockchain Governance Principles: A Comprehensive Framework., , , and . CoRR, (2021)