Author of the publication

Achieving Service Accountability Through Blockchain and Digital Identity.

, , , , and . CAiSE Forum, volume 317 of Lecture Notes in Business Information Processing, page 16-23. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework Enhancing the User Search Activity Through Data Posting., , , and . RuleML, volume 9718 of Lecture Notes in Computer Science, page 287-304. Springer, (2016)An Automatic Techniques for Detecting Type Conflicts in Database Schemes., , and . CIKM, page 306-313. ACM, (1998)An Effective Approach to Inverse Frequent Set Mining., , and . ICDM, page 806-811. IEEE Computer Society, (2009)Delivering Semantics-aware Compressed OLAP Views in Mobile Environments with Hand-OLAP., and . ICTAI, page 206-213. IEEE Computer Society, (2009)Big data: a research agenda., , and . IDEAS, page 198-203. ACM, (2013)Partial Semantics for Disjunctive Deductive Databases., , and . DEXA, volume 1134 of Lecture Notes in Computer Science, page 564-573. Springer, (1996)PUF-based Smart Tags for Supply Chain Management., , , , and . ARES, page 41:1-41:7. ACM, (2021)An Overview of the Endless Battle between Virus Writers and Detectors: How Compilers Can Be Used as an Evasion Technique., , and . DATA, page 203-208. SciTePress, (2019)Extending Logic Programming., , and . SIGMOD Conference, page 184-193. ACM Press, (1990)SIGMOD Record 19(2), June 1990.Properties of Database Schemata with Functional Dependencies., , and . PODS, page 19-28. ACM, (1984)