Omar Hasan

Orcid: 0000-0002-9585-7810

According to our database1, Omar Hasan authored at least 52 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Decentralized trustworthiness score management with smart contracts on the trustlend platform.
IET Blockchain, March, 2024

2023
Privacy considerations for a decentralized finance (DeFi) loans platform.
Clust. Comput., August, 2023

Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey.
ACM Comput. Surv., 2023

2022
Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting.
SN Comput. Sci., 2022

A Bachelor Degree Program in IoT Engineering Accreditation Constraints and Market Demand.
Int. J. Eng. Pedagog., 2022

TrustLend: Using Borrower Trustworthiness for Lending on Ethereum.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

LAPS: Computing Loan Default Risk from User Activity, Profile, and Recommendations.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp).
Proceedings of the 18th International Conference on Security and Cryptography, 2021

A social-capital based approach to blockchain-enabled peer-to-peer lending.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonation.
Appl. Netw. Sci., 2020

Supplier Impersonation Fraud Detection using Bayesian Inference.
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020

2019
A Transparent Referendum Protocol with Immutable Proceedings and Verifiable Outcome for Trustless Networks.
Proceedings of the Complex Networks and Their Applications VIII, 2019

Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps.
Proceedings of the Complex Networks and Their Applications VIII, 2019

2018
Exploratory Study of Privacy Preserving Fraud Detection.
Proceedings of the 19th International Middleware Conference, 2018

2017
PrivaSense: Privacy-Preserving and Reputation-Aware Mobile Participatory Sensing.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

E-Learning Platform for Disadvantaged Groups.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

Self-reported Verifiable Reputation with Rater Privacy.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Lightning impulse parameters estimation using fractional model order reduction.
Proceedings of the 7th IEEE International Conference on Control System, 2017

A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
A trustless privacy-preserving reputation system.
IACR Cryptol. ePrint Arch., 2016

A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.
IACR Cryptol. ePrint Arch., 2016

4PR: Privacy preserving routing in mobile delay tolerant networks.
Comput. Networks, 2016

2015
Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction.
Computing, 2015

Trust management and reputation systems in mobile participatory sensing applications: A survey.
Comput. Networks, 2015

A delay and cost balancing protocol for message routing in mobile delay tolerant networks.
Ad Hoc Networks, 2015

2014
A patient-centered longitudinal care plan: vision versus reality.
J. Am. Medical Informatics Assoc., 2014

2013
Privacy Preserving Reputation Management in Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IEEE Trans. Inf. Forensics Secur., 2013

An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing.
Int. J. Inf. Manag., 2013

A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
Proceedings of the IEEE International Congress on Big Data, 2013

The Current Capabilities of Health Information Technology to Support Care Transitions.
Proceedings of the AMIA 2013, 2013

A Patient-centered Longitudinal Plan of Care: Vision Versus Reality.
Proceedings of the AMIA 2013, 2013

A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Preserving privacy of feedback providers in decentralized reputation systems.
Comput. Secur., 2012

An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Microwave engineering education over the web.
Proceedings of the IEEE Frontiers in Education Conference, 2012

A case study of designed an e-learning course for electrical engineering students.
Proceedings of the IEEE Global Engineering Education Conference, 2012

Sustainable PV-powered FPGA-controlled high brightness LED illumination systems.
Proceedings of the IEEE Global Engineering Education Conference, 2012

A self-regulating protocol for efficient routing in mobile delay tolerant networks.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

2011
Implementation of Dual Use Fiber Optic Communications Laboratories.
Int. J. Online Eng., 2011

An adaptive routing algorithm for mobile delay tolerant networks.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

Leveraging Node Centrality and Regularity for Efficient Routing in Mobile Peer-to-Peer Networks.
Proceedings of the Data Management in Grid and Peer-to-Peer Systems, 2011

A Privacy Preserving Reputation Protocol for Web Service Provider Selection.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Efficient privacy preserving reputation protocols inspired by secure sum.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
L'Elimination de la subjectivité dans la recommandation de confiance.
Proceedings of the Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, 2009

Elimination of Subjectivity from Trust Recommendation.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments.
Proceedings of the 2009 international conference on Pervasive services, 2009

2008
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Establishing Trust Beliefs Based on a Uniform Disposition to Trust.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

2004
Limiter discriminator detection of narrow-band duobinary FSK in a land mobile channel.
Int. J. Commun. Syst., 2004

2003
Bit-serial architecture for rank order and stack filters.
Integr., 2003


  Loading...