Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts., , , , and . BlockSys, page 2-8. ACM, (2023)Authenticating Spatial Queries on Blockchain Systems., , , and . IEEE Access, (2021)Blockchain Applications: Bitcoin and Beyond.. University of Pisa, Italy, (2018)AJIT: Accountable Just-in-Time Network Resource Allocation with Smart Contracts., , , and . MobiArch, page 48-53. ACM, (2020)Putting Trust back in IP Licensing: DLT Smart Licenses for the Internet of Things., , and . IEEE ICBC, page 1-3. IEEE, (2021)Lightnings over rose bouquets: an analysis of the topology of the Bitcoin Lightning Network., , , and . COMPSAC, page 324-331. IEEE, (2021)Non Fungible Mutable Tokens: dynamic assets traceability for the Metaverse., , , , and . MetaCom, page 393-397. IEEE, (2023)Blockchain Based Access Control., , and . DAIS, volume 10320 of Lecture Notes in Computer Science, page 206-220. Springer, (2017)Automated Quality of Service Monitoring for 5G and Beyond Using Distributed Ledgers., , , and . IWQoS, page 1-6. IEEE, (2021)The Graph Structure of Bitcoin., , and . COMPLEX NETWORKS (2), volume 813 of Studies in Computational Intelligence, page 547-558. Springer, (2018)