Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Blockchain with Quantum Safe Cryptography: When and How?, , and . CISIS, volume 1267 of Advances in Intelligent Systems and Computing, page 371-379. Springer, (2020)An Approach for Adapting Moodle into a Secure Infrastructure., , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 214-221. Springer, (2011)A general view of pseudoharmonics and pseudoantiharmonics to calculate external arguments of Douady and Hubbard, , , , , , and . Applied Mathematics and Computation, 213 (2): 484--497 (2009)Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm, , , , and . Chaos, Solitons & Fractals, 41 (5): 2613--2616 (2009)Privacy Threats in E-Shopping (Position Paper), , , , , and . Lecture Notes in Computer Science, (2016)TRESCA D1.1 Meta-analysis map: relevant factors shaping public attitudes of science communication, , , , , and . (2020)A new color image cryptosystem based on a piecewise linear chaotic map, , and . 2009 6th International Multi-Conference on Systems, Signals and Devices, page 1--6. IEEE, (2009)Cryptanalysis of a discrete-time synchronous chaotic encryption system, , , , and . Physics Letters A, 372 (7): 1034--1039 (2008)Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT, , and . International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), page 195--204. Springer, Cham, (2019)Challenges of the market for initial coin offerings, , , and . International Review of Financial Analysis, (2022)