Author of the publication

Privacy in the Internet of Things: A Study to Protect User's Data in LPR Systems Using Blockchain.

, , , , , and . PST, page 1-5. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware., , , , , and . J. Sens. Actuator Networks, 10 (1): 3 (2021)PriADA: Management and Adaptation of Information Based on Data Privacy in Public Environments., , , , and . Comput., 9 (4): 77 (2020)PADRES: Tool for PrivAcy, Data REgulation and Security., , and . SoftwareX, (2022)Privacy Management Solution in Ubiquitous Environments Using Percontrol., , , , , and . J. Ubiquitous Syst. Pervasive Networks, 5 (2): 21-28 (2014)Performance Evaluation Analysis of Spark Streaming Backpressure for Data-Intensive Pipelines., , , and . Sensors, 22 (13): 4756 (2022)MultiS: A Context-Server for Pervasive Computing., , , , , and . CLEI Selected Papers, volume 292 of Electronic Notes in Theoretical Computer Science, page 39-56. Elsevier, (2012)µJSON, a Lightweight Compression Scheme for Embedded GNSS Data Transmission on IoT Nodes., , , and . CIoT, page 232-238. IEEE, (2022)Application of Machine Learning Techniques to Predict a Patient's No-Show in the Healthcare Sector., , , , , and . Future Internet, 14 (1): 3 (2022)Nero: A Deterministic Leaderless Consensus Algorithm for DAG-Based Cryptocurrencies., , and . Algorithms, 16 (1): 38 (January 2023)Boosting Big Data Streaming Applications in Clouds With BurstFlow., , , , , , , , and . IEEE Access, (2020)