Author of the publication

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

, , , and . CSNet, page 63-70. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption., , , , , and . VTC Fall, page 1-6. IEEE, (2023)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , and . IEEE BigData, page 5034-5039. IEEE, (2018)GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS., , , , , , , , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 40-57. Springer, (2021)Launching Adversarial Label Contamination Attacks Against Malicious URL Detection., , , and . TrustBus, volume 12927 of Lecture Notes in Computer Science, page 69-82. Springer, (2021)Enhancing Network Management using Mobile Agents., , and . ECBS, page 218-. IEEE Computer Society, (2000)An Omnidirectional Approach to Touch-based Continuous Authentication., , , and . CoRR, (2023)Requirements for 5G based telemetric cardiac monitoring., , , , and . WiMob, page 1-4. IEEE, (2018)TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication., , , and . TrustCom, page 788-795. IEEE, (2023)TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies., , , and . COMPSAC, page 1235-1240. IEEE, (2020)Scalable Multi-domain Trust Infrastructures for Segmented Networks., , , , , and . CAMAD, page 182-187. IEEE, (2023)