Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge Proof., and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 67-83. Springer, (2023)Cost-Efficient Blockchain-Based Access Control for the Internet of Things., , , and . GLOBECOM, page 1-6. IEEE, (2021)Block diffusion delay attack and its countermeasures in a Bitcoin network., , , and . Int. J. Netw. Manag., (2022)IOTA-Based Access Control Framework for the Internet of Things., , , and . BRAINS, page 87-91. IEEE, (2020)Analysis of Consecutive Block-Loss for Streaming Services., , , and . ICC, page 1-5. IEEE, (2010)Queueing analysis of internet-based call centers with interactive voice response and redial., , , and . CAMAD, page 373-377. IEEE, (2012)User-search time analysis for hierarchical peer-to-peer overlay networks with time-dependent user-population process., , , and . QTNA, page 5:1-5:4. ACM, (2009)Performance analysis of data block synchronization mechanism in coolstreaming., , , and . QTNA, page 53-58. ACM, (2010)Mining Pool Selection Problem in the Presence of Block Withholding Attack., , , and . Blockchain, page 321-326. IEEE, (2020)Performance Analysis of Dynamic Lightpath Configuration for WDM Asymmetric Ring Networks., and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 972-983. Springer, (2002)