Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control in Adversarial Environments for IoT-oriented Distributed Ledgers., , , , and . IM, page 968-973. IEEE, (2021)Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach., , , , and . IEEE Internet Things J., 9 (3): 2277-2292 (2022)Mitigation of liveness attacks in DAG-based ledgers., , , and . ICBC, page 1-9. IEEE, (2023)Blockchain-based Federated Learning Utilizing Zero-Knowledge Proofs for Verifiable Training and Aggregation., , , , , and . Blockchain, page 54-63. IEEE, (2024)zkSSI: A Zero-Knowledge-Based Self-Sovereign Identity Framework., , , and . Blockchain, page 276-285. IEEE, (2024)Vulnerabilities that arise from poor governance in Distributed Ledger Technologies., and . CoRR, (2024)Secure Access Control for DAG-based Distributed Ledgers., , , , , and . CoRR, (2021)Parasite Chain Detection in the IOTA Protocol., , , , and . Tokenomics, volume 82 of OASIcs, page 8:1-8:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Properties of the Tangle for Uniform Random and Random Walk Tip Selection., , , , and . Blockchain, page 228-236. IEEE, (2019)Salt-based autopeering for DLT-networks., , , , , , , , and . BRAINS, page 165-169. IEEE, (2021)