Personensuche
X
?
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure ,
1
Avoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT t..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
3
Access Control based on CRDTs for Collaborative Distributed..:
, In:
?
Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data ,
5
Distributed access control for collaborative applications u..:
, In:
?
2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) ,
10
A Comprehensive Study of the Bitcoin P2P Network:
, In:
?
Proceedings of the 7th Workshop on Principles and Practice of Consistency for Distributed Data ,
11
Efficient renaming in sequence CRDTs:
, In:
?
Service-Oriented and Cloud Computing; Lecture Notes in Computer Science ,
12
Identification of Comparison Key Elements and Their Relatio..:
, In:
?
Web Information Systems Engineering – WISE 2019; Lecture Notes in Computer Science ,
13
Shadowed Authorization Policies - A Disaster Waiting to Hap..:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
14
Authorization Policies Specification and Consistency Manage..:
, In:
?
Companion Proceedings of the The Web Conference 2018 ,
15