Author of the publication

A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger.

, , and . iThings/GreenCom/CPSCom/SmartData, page 1129-1136. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opportunistic routing in wireless networks using bitmap-based weighted tree., and . Comput. Networks, (2021)Optimal Spare Management via Statistical Model Checking: A Case Study in Research Reactors., , , , and . FMICS, volume 14290 of Lecture Notes in Computer Science, page 205-223. Springer, (2023)A new algorithm for money laundering detection based on structural similarity., , , , , and . UEMCON, page 1-7. IEEE, (2016)Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy., , and . BRAINS, page 93-96. IEEE, (2021)A lightweight improvement of PeDAAC protocol for 6LoWPAN in the Internet of Things., and . Multim. Tools Appl., 80 (20): 31467-31486 (2021)A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger., , and . iThings/GreenCom/CPSCom/SmartData, page 1129-1136. IEEE, (2018)Complexity of Computing the Anti-Ramsey Numbers for Paths., , , , , and . MFCS, volume 170 of LIPIcs, page 6:1-6:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Towards Energy-aware Cyber-Physical Systems Verification and Optimization., , and . FedCSIS (Position Papers), volume 26 of Annals of Computer Science and Information Systems, page 205-210. (2021)Decentralized and Privacy-Preserving Key Management Model., , and . ISNCC, page 1-7. IEEE, (2020)Verification and Optimization of Cyber-Physical Systems: Preprint for FedCSIS., , and . CoRR, (2021)