Zakwan Jaroucheh

According to our database1, Zakwan Jaroucheh authored at least 29 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Resolving the Decreased Rank Attack in RPL's IoT Networks.
CoRR, 2023

Crypto Assets Custody: Taxonomy, Components, and Open Challenges.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

(POSTER) Resolving the Decreased Rank Attack in RPL's IoT Networks.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

Secure Multi-Party Computation for Digital Assets Custody Purpose - Analysis of Open-Source Implementations.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022

2021
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Programming Languages: A Usage-based Statistical Analysis and Visualization.
Proceedings of the ICISS 2021: The 4th International Conference on Information Science and Systems, 2021

Blockchain-based identity and authentication scheme for MQTT protocol.
Proceedings of the ICBCT '21: The 3rd International Conference on Blockchain Technology, 2021

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

2020
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.
CoRR, 2020

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.
Proceedings of the 2020 IEEE International Conference on Software Architecture Companion, 2020

Trust-based Ecosystem to Combat Fake News.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2012
An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments.
PhD thesis, 2012

An approach to domain-based scalable context management architecture in pervasive environments.
Pers. Ubiquitous Comput., 2012

2011
Recognize contextual situation in pervasive environments using process mining techniques.
J. Ambient Intell. Humaniz. Comput., 2011

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

A Model-driven Approach to Flexible Multi-Level Customization of SaaS Applications.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.
Proceedings of the IEEE International Conference on Web Services, 2010

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications.
Proceedings of the CISIS 2010, 2010

2009
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009


  Loading...