Author of the publication

Untangling the Overlap Between Blockchain and DLTs.

, , , , and . SAI (3), volume 508 of Lecture Notes in Networks and Systems, page 483-505. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ouaddah, Aafaf
add a person with the name Ouaddah, Aafaf
 

Other publications of authors with the same name

Machine Learning based Identity and Access Management Systems (ML I&AM): a Taxonomy., , and . CiSt, page 657-662. IEEE, (2023)Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Identity and Access Management Field: Challenges and State of the Art., , and . AISI, volume 152 of Lecture Notes on Data Engineering and Communications Technologies, page 50-64. Springer, (2022)Untangling the Overlap Between Blockchain and DLTs., , , , and . SAI (3), volume 508 of Lecture Notes in Networks and Systems, page 483-505. Springer, (2022)GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks., , , , and . TrustCom, page 1272-1278. IEEE, (2023)Harnessing the power of blockchain technology to solve IoT security & privacy issues., , and . ICC, page 7:1-7:10. ACM, (2017)A Transpilation-Based Approach to Writing Secure Access Control Smart Contracts., , , , and . BRAINS, page 1-7. IEEE, (2023)SOK: A Comprehensive Survey on Distributed Ledger Technologies., , , , and . ICBC, page 1-16. IEEE, (2022)Access control in IoT: Survey & state of the art., , , and . ICMCS, page 272-277. IEEE, (2016)DCEA: A Reference model for Distributed Ledger Technologies., , , , and . IEEE ICBC, page 1-2. IEEE, (2021)Exploring blockchain-based Self Sovereign Identity Systems: challenges and comparative analysis., , and . BRAINS, page 21-22. IEEE, (2021)