Author of the publication

Secure Hierarchical Processing and Logging of Sensing Data and IoT Events with Blockchain.

, , and . ICBCT, page 52-56. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Hierarchical Processing and Logging of Sensing Data and IoT Events with Blockchain., , and . ICBCT, page 52-56. ACM, (2020)Car e-Talk: An IoT-Enabled Cloud-Assisted Smart Fleet Maintenance System., , and . IEEE Internet Things J., 8 (12): 9484-9494 (2021)A Survey of the Analysis of Complex Systems based on Complex Network Theory and Deep Learning., and . Int. J. Perform. Eng., 18 (4): 241 (2022)Towards a component-based system model to improve the quality of highly configurable systems., , , , , and . PeerJ Comput. Sci., (2022)Reliability Evaluation of FPGA with Common Cause Failure in Multi-Phase Mission., , , and . QRS, page 320. IEEE, (2020)Towards Taxonomical-Based Situational Model to Improve the Quality of Agile Distributed Teams., , , and . IEEE Access, (2020)Optimized Differential Evolution Algorithm for Software Testing., , , , and . Int. J. Comput. Intell. Syst., 12 (1): 215-226 (2018)Role of Requirement Prioritization Technique to Improve the Quality of Highly-Configurable Systems., , , and . IEEE Access, (2020)A Data Mining Technique to Improve Configuration Prioritization Framework for Component-Based Systems: An Empirical Study., , , , , , and . Inf. Technol. Control., 50 (3): 424-442 (2021)Dos and Don'ts in Blockchain Research and Development., , , and . ICBCT, page 37-43. ACM, (2022)