Author of the publication

An Automated Policy Verification and Enforcement Framework for Ethereum Applications.

, , and . ICBC, page 1-5. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database., , and . TENCON, page 2054-2058. IEEE, (2019)On Designing Leakage-Resilient Vibration Based Authentication Techniques., , , and . Trustcom/BigDataSE/ISPA, page 1875-1881. IEEE, (2016)A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability., and . CoRR, (2015)Improved solution to the non-domination level update problem., , and . Appl. Soft Comput., (2017)An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack., and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 298-317. Springer, (2014)A Federated Multi-stage Light-Weight Vision Transformer for Respiratory Disease Detection., , , and . ICONIP (10), volume 1964 of Communications in Computer and Information Science, page 300-311. Springer, (2023)Security Analysis of Temporal-RBAC Using Timed Automata., and . IAS, page 37-40. IEEE Computer Society, (2008)An unsupervised heuristic based approach for author name disambiguation., , and . COMSNETS, page 540-542. IEEE, (2018)SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0., , and . Comput. Electr. Eng., (2022)Towards achieving efficient access control of medical data with both forward and backward secrecy., , , and . Comput. Commun., (2022)