Author of the publication

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

, , , , , , , and . Entropy, 24 (10): 1379 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Trust Assurance in Indy-Based Identity Networks Using Public Ledger Data., , and . Frontiers Blockchain, (2021)Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device., , , , and . ICISSP, page 551-561. SCITEPRESS, (2022)Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device., , , and . CoRR, (2019)PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform., , , and . Softw. Impacts, (2021)Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform., , , , , , , and . Entropy, 24 (10): 1379 (2022)PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching., , , , and . SIN, page 1-8. IEEE, (2021)Privacy-preserving Surveillance Methods using Homomorphic Encryption., , , , and . ICISSP, page 240-248. SCITEPRESS, (2020)Privacy and Trust Redefined in Federated Machine Learning., , , , and . CoRR, (2021)A Distributed Trust Framework for Privacy-Preserving Machine Learning., , , , and . TrustBus, volume 12395 of Lecture Notes in Computer Science, page 205-220. Springer, (2020)Identifying Roles, Requirements and Responsibilitiesin Trustworthy AI Systems., and . UbiComp/ISWC Adjunct, page 264-271. ACM, (2021)