Author of the publication

Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT.

, , and . CISIS-ICEUTE, volume 951 of Advances in Intelligent Systems and Computing, page 195-204. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodale Bildregistrierung von fpVCT- und OCT-Daten zur Realisierung hochgenauer medizinischer Navigation., , , , , and . CURAC, volume 1475 of CEUR Workshop Proceedings, page 165-168. Der Andere Verlag, Düsseldorf, (2010)Towards Intra-operative OCT Guidance for Automatic Head Surgery: First Experimental Results., , , , and . MICCAI (3), volume 8151 of Lecture Notes in Computer Science, page 347-354. Springer, (2013)Korrektur geometrischer Verzeichnungen zur Kalibrierung von optischen Kohärenztomographiesystemen., , , , , , and . Bildverarbeitung für die Medizin, page 233-238. Springer, (2015)Normal distributions transform in multi-modal image registration of optical coherence tomography and computed tomography datasets., , , and . Medical Imaging: Image Processing, volume 9034 of SPIE Proceedings, page 90343L. SPIE, (2014)Localization accuracy of sphere fiducials in computed tomography images., , , , , and . Medical Imaging: Image-Guided Procedures, volume 9036 of SPIE Proceedings, page 90360Z. SPIE, (2014)libgroupsig: An extensible C library for group signatures., , and . IACR Cryptology ePrint Archive, (2015)Methodological Security Verification of a Registration Protocol., , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 453-462. Springer, (2014)Review of the main security threats and challenges in free-access public cloud storage servers, , , and . Computer and Network Security Essentials, Springer, Cham, (2018)Anonymity revocation through standard infrastructures, , and . European Public Key Infrastructure Workshop, page 112--127. Springer, Berlin, Heidelberg, (2012)Fair and Accountable Anonymity for the Tor Network., , and . SECRYPT, page 560--565. (2017)