From post

Matching Metadata on Blockchain for Self-Sovereign Identity.

, , , и . Business Process Management Workshops, том 436 из Lecture Notes in Business Information Processing, стр. 421-433. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Approach to Support the Design and the Dependability Analysis of High Performance I/O Intensive Distributed Systems., , , , и . 3PGCIC, том 158 из Lecture Notes in Networks and Systems, стр. 29-40. Springer, (2020)Intelligent Edge-powered Data Reduction: A Systematic Literature Review., , , и . ACM Comput. Surv., 56 (9): 234:1-234:39 (сентября 2024)Matching Metadata on Blockchain for Self-Sovereign Identity., , , и . Business Process Management Workshops, том 436 из Lecture Notes in Business Information Processing, стр. 421-433. Springer, (2021)Micro IDS: On-Line Recognition of Denial-of-Service Attacks on IoT Networks., , и . AINA (1), том 661 из Lecture Notes in Networks and Systems, стр. 446-459. Springer, (2023)Characterization Research on I/O Improvements Targeting DISC and HPC Applications., , , , , , и . IECON, стр. 2095-2100. IEEE, (2020)Research Characterization on I/O Improvements of Storage Environments., , и . 3PGCIC, том 96 из Lecture Notes in Networks and Systems, стр. 287-298. Springer, (2019)A Scientific Model to Support Industrial Data Management Process Using Virtualized Environments., , , , , и . 3PGCIC, том 343 из Lecture Notes in Networks and Systems, стр. 144-155. Springer, (2021)A Cluster Formation Algorithm for Fog Architectures Based on Mobility Parameters at a Geographically LAN Perspective., , , и . 3PGCIC, том 571 из Lecture Notes in Networks and Systems, стр. 25-36. Springer, (2022)An Implementation Science Effort in a Heterogenous Edge Computing Platform to Support a Case Study of a Virtual Scenario Application., , , , , и . 3PGCIC, том 158 из Lecture Notes in Networks and Systems, стр. 136-147. Springer, (2020)Recognition of Denial-of-Service Attacks in IoT Networks with Linear Complexity Model., , и . UCC, стр. 20. ACM, (2023)