Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures., , , , , , and . J. Supercomput., 80 (2): 2914-2915 (January 2024)ECGsound for human identification., , , and . Biomed. Signal Process. Control., 72 (Part): 103335 (2022)Generation and Classification of Illicit Bitcoin Transactions., , and . UCAmI, volume 594 of Lecture Notes in Networks and Systems, page 1086-1097. Springer, (2022)Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things., , , and . Future Gener. Comput. Syst., (2018)Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation., , , and . Future Gener. Comput. Syst., (2017)Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces for Atrial Fibrillation Detection., , , and . BSN, page 1-4. IEEE, (2023)Exploring the power of photoplethysmogram matrix for atrial fibrillation detection with integrated explainability., , , and . Eng. Appl. Artif. Intell., (2024)Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures., , , , , , and . J. Supercomput., 80 (2): 1668-1693 (January 2024)Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields., , , and . IEEE Access, (2021)A True Random Number Generator Based on Gait Data for the Internet of You., , , and . IEEE Access, (2020)