Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Forensic Implications of Collusion Attacks on the Lightning Network., , and . IFIP Int. Conf. Digital Forensics, volume 511 of IFIP Advances in Information and Communication Technology, page 133-147. Springer, (2017)Gamifying research in software engineering., , and . Comput. Appl. Eng. Educ., 26 (5): 1641-1652 (2018)Quasi-Social: Software as the 'Social' in Socio-Technical Design., and . STPIS@ECIS, volume 2398 of CEUR Workshop Proceedings, page 42-53. CEUR-WS.org, (2019)Review of Techniques for Privacy-Preserving Blockchain Systems., and . BSCI, page 1-9. ACM, (2020)An Architecture for Self-Organising Evolvable Virtual Machines., , and . Engineering Self-Organising Systems, volume 3464 of Lecture Notes in Computer Science, page 100-122. Springer, (2004)Evolution and Hypercomputing in Global Distributed Evolvable Virtual Machines Environment., and . ESOA, volume 4335 of Lecture Notes in Computer Science, page 176-191. Springer, (2006)Multi-agent System Technology for P2P Applications on Small Portable Devices., , , , and . AP2PC, volume 3601 of Lecture Notes in Computer Science, page 153-160. Springer, (2004)Privacy-preserving tax-case processing., , , and . PST, page 1-10. IEEE, (2019)Agent-Based Modelling of Primitive Human Communities., , , , and . WI-IAT (3), page 64-71. IEEE Computer Society, (2014)978-1-4799-4143-8.Analysing the Dynamics of Norm Evolution Using Interval Type-2 Fuzzy Sets., , , and . WI-IAT (3), page 230-237. IEEE Computer Society, (2014)978-1-4799-4143-8.