Author of the publication

The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol.

, and . Selfie Biometrics, Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme., , , and . HASE, page 209-213. IEEE Computer Society, (1998)Software project management and measurement on the World-Wide-Web (WWW)., and . WETICE, page 156-161. IEEE Computer Society, (1996)Using Biometrics to Fight Credential Fraud., , , and . IEEE Communications Standards Magazine, 3 (4): 39-45 (2019)The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity., and . IJCNN, page 1-7. IEEE, (2018)The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol., and . Selfie Biometrics, Springer, (2019)Working group report on environments program environments., and . WETICE, page 5-7. IEEE Computer Society, (1995)V & V through Inconsistency Tracking and Analysis., , and . IWSSD, page 43-49. IEEE Computer Society, (1998)A decentralized software bus based on IP multicasting., and . WETICE, page 65-69. IEEE, (1994)An empirical comparison of pie vs. linear menus., , , and . CHI, page 95-100. ACM, (1988)Independent validation of specifications: a coordination headache., and . WETICE, page 232-237. IEEE Computer Society, (1996)