Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporating Dynamic Constraints in the Flexible Authorization Framework., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)Transactional Network Analysis and Money Laundering Behavior Identification of Central Bank Digital Currency of China., , , and . J. Soc. Comput., 3 (3): 219-230 (2022)How to Rationally Select Your Delegatee in PoS., , , and . CoRR, (2023)Exploring Blockchains Interoperability: A Systematic Survey., , and . ACM Comput. Surv., 55 (13s): 290:1-290:38 (2023)Electrostatic-Fluid-Structure 3D Numerical Simulation of a MEMS Electrostatic Comb Resonator., , , and . Sensors, 22 (3): 1056 (2022)On the Security and Performance of Blockchain Sharding., , , , and . IACR Cryptol. ePrint Arch., (2021)A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images., , , , and . Algorithms, 15 (6): 213 (2022)Tracking anonymous peer-to-peer VoIP calls on the internet., , and . CCS, page 81-91. ACM, (2005)A Blockchain-Based Autonomous System for Primary Financial Market., and . ICSOC Workshops, volume 13236 of Lecture Notes in Computer Science, page 278-282. Springer, (2021)Blockchain Developments and Innovations - An Analytical Evaluation of Software Engineering Approaches., , , , and . ICIOT, volume 12993 of Lecture Notes in Computer Science, page 58-76. Springer, (2021)