Author of the publication

A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement.

, , , and . TrustCom, page 1965-1970. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A meta-modelling approach to express change requirements., , and . ICSOFT (2), page 287-293. INSTICC Press, (2006)Matching ERP Functionalities with the Logistic Requirements of French Railways: A Similarity Approach., and . ICEIS (3), page 444-450. (2004)Aligning IS to Organization's Strategy: The InStAlMethod., and . CAiSE, volume 4495 of Lecture Notes in Computer Science, page 203-217. Springer, (2007)On the Ontological Expressiveness of the High-Level Constraint Language for Product Line Specification., , and . SAM, volume 11150 of Lecture Notes in Computer Science, page 46-66. Springer, (2018)Unsupervised discovery of intentional process models from event logs., , , and . MSR, page 282-291. ACM, (2014)Documenter l'alignement d'un ED avec la stratégie d'entreprise en vue de mieux satisfaire les exigences des décideurs., , and . Ingénierie des Systèmes d Inf., 11 (6): 83-114 (2006)A methodical framework for service oriented architecture adoption: Guidelines, building blocks, and method fragments., , and . Inf. Softw. Technol., (2021)An Ontology for Software Patterns: Application to Blockchain-Based Software Development., , , and . EDOC Workshops, volume 466 of Lecture Notes in Business Information Processing, page 284-299. Springer, (2022)Automatic process model discovery from textual methodologies., , , , and . RCIS, page 19-30. IEEE, (2015)A Method to Analyse Changes in the Realisation of Business Intentions and Strategies for Information System Adaptation., and . EDOC, page 84-95. IEEE Computer Society, (2002)