Author of the publication

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

, , , and . CSNet, page 63-70. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption., , , , , and . VTC Fall, page 1-6. IEEE, (2023)Requirements for 5G based telemetric cardiac monitoring., , , , and . WiMob, page 1-4. IEEE, (2018)An Omnidirectional Approach to Touch-based Continuous Authentication., , , and . CoRR, (2023)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , and . IEEE BigData, page 5034-5039. IEEE, (2018)GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS., , , , , , , , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 40-57. Springer, (2021)Launching Adversarial Label Contamination Attacks Against Malicious URL Detection., , , and . TrustBus, volume 12927 of Lecture Notes in Computer Science, page 69-82. Springer, (2021)Enhancing Network Management using Mobile Agents., , and . ECBS, page 218-. IEEE Computer Society, (2000)TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies., , , and . COMPSAC, page 1235-1240. IEEE, (2020)Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations., , , and . CAMAD, page 194-199. IEEE, (2023)Scalable Multi-domain Trust Infrastructures for Segmented Networks., , , , , and . CAMAD, page 182-187. IEEE, (2023)