Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks., , , and . CoRR, (2022)DIMY: Enabling Privacy-preserving Contact Tracing., , , , , , and . CoRR, (2021)Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET., and . ICSEB, page 117-122. ACM, (2017)Trust Management in Decentralized IoT Access Control System., , , and . IEEE ICBC, page 1-9. IEEE, (2020)Blockchain-based Trust and Reputation Management for Securing IoT.. University of New South Wales, Sydney, Australia, (2022)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/100837).DIMY: Enabling privacy-preserving contact tracing., , , , , , and . J. Netw. Comput. Appl., (2022)Trust-based Blockchain Authorization for IoT., , , , and . CoRR, (2021)A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain., , , , and . TrustCom, page 1107-1114. IEEE, (2022)Decentralised Trustworthy Collaborative Intrusion Detection System for IoT., , , , and . Blockchain, page 306-313. IEEE, (2021)Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT., , , and . IoTDI, page 256-257. IEEE, (2020)