Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Redaction in Self-Sovereign Identity., , , , and . SoftCOM, page 1-6. IEEE, (2022)KIDS - Keyed Intrusion Detection System., and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 173-182. Springer, (2010)Realistic video sequences for subjective QoE analysis., , , , and . MMSys, page 246-251. ACM, (2022)Selective disclosure in digital credentials: A review., , , , , , and . ICT Express, 10 (4): 916-934 (2024)Using Genetic Algorithms for Load Balancing in Cloud Computing., and . ICAT, page 1-6. IEEE, (2023)PMU Spoof Detection via Image Classification Methodology against Repeated Value Attacks by using Deep Learning., , , , and . ICAT, page 1-6. IEEE, (2022)Data mining meets network analysis: Traffic prediction models., , , and . MIPRO, page 1479-1484. IEEE, (2014)A Path Towards an Internet of Things and Artificial Intelligence Regulatory Framework., , and . IEEE Commun. Mag., 61 (7): 90-96 (July 2023)Towards the Classification of Self-Sovereign Identity Properties., , , , and . IEEE Access, (2022)A Novel Key Management for Virtually Limitless Key Size., , and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 102-118. Springer, (2015)