Author of the publication

Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.

, , , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 298-308. CEUR-WS.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks., , , , , and . SITIS, page 363-367. IEEE, (2019)A comprehensive survey of hardware-assisted security: From the edge to the cloud., , , and . Internet Things, (2019)Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing., , , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 298-308. CEUR-WS.org, (2021)Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware., , , and . DATE, page 206-211. IEEE Computer Society, (2004)Dependability analysis of transmission techniques for MPEG-2 streams., , , and . PRDC, page 120-127. IEEE Computer Society, (2000)Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study., , , , and . IDC, volume 570 of Studies in Computational Intelligence, page 465-474. Springer, (2014)Effective QoS Monitoring in Large Scale Social Networks., , , , and . IDC, volume 511 of Studies in Computational Intelligence, page 249-259. Springer, (2013)How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project., , , , and . AINA Workshops, page 573-578. IEEE Computer Society, (2018)Improving the QoS of MPEG2 streaming over wireless LANs., , , and . Simul. Model. Pract. Theory, 11 (7-8): 533-555 (2003)Awesome Trusted Execution Environment., , and . DSN-S, page 5-6. IEEE, (2023)