Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Foundation of Web3., , , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 3-18. Springer, (2022)Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?, and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 451-463. Springer, (2017)Secure and Efficient Implementation of Electronic Money., , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 34-51. Springer, (2022)A Self-Timed Implementation of Boolean Functions., and . ASYNC, page 243-. IEEE Computer Society, (1999)On Provably Secure Time-Stamping Schemes., and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 500-514. Springer, (2004)An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation., , , , , , , , , and 1 other author(s). IEEE Access, (2022)Improving the Availability of Time-Stamping Services., , , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 360-375. Springer, (2001)Verification of Parameterized Asynchronous Circuits: A Case Study., , and . ACSD, page 64-74. IEEE Computer Society, (1998)