Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-based Trust and Reputation Management for Securing IoT.. University of New South Wales, Sydney, Australia, (2022)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/100837).Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks., , , and . CoRR, (2022)DIMY: Enabling Privacy-preserving Contact Tracing., , , , , , and . CoRR, (2021)Trust Management in Decentralized IoT Access Control System., , , and . IEEE ICBC, page 1-9. IEEE, (2020)Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET., and . ICSEB, page 117-122. ACM, (2017)Trust-based Blockchain Authorization for IoT., , , , and . CoRR, (2021)DIMY: Enabling privacy-preserving contact tracing., , , , , , and . J. Netw. Comput. Appl., (2022)A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain., , , , and . TrustCom, page 1107-1114. IEEE, (2022)Decentralised Trustworthy Collaborative Intrusion Detection System for IoT., , , , and . Blockchain, page 306-313. IEEE, (2021)Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT., , , and . IoTDI, page 256-257. IEEE, (2020)