Omar Hasan
Orcid: 0000-0001-9190-9444
According to our database1,
Omar Hasan
authored at least 56 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Appl. Netw. Sci., December, 2024
Secure and efficient decentralized machine learning through group-based model aggregation.
Clust. Comput., July, 2024
Decentralized trustworthiness score management with smart contracts on the trustlend platform.
IET Blockchain, March, 2024
Proceedings of the IEEE International Conference on Web Services, 2024
2023
Clust. Comput., August, 2023
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey.
ACM Comput. Surv., 2023
2022
SN Comput. Sci., 2022
A Bachelor Degree Program in IoT Engineering Accreditation Constraints and Market Demand.
Int. J. Eng. Pedagog., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp).
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
2020
GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonation.
Appl. Netw. Sci., 2020
Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020
2019
A Transparent Referendum Protocol with Immutable Proceedings and Verifiable Outcome for Trustless Networks.
Proceedings of the Complex Networks and Their Applications VIII, 2019
Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps.
Proceedings of the Complex Networks and Their Applications VIII, 2019
2018
Proceedings of the 19th International Middleware Conference, 2018
2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the 7th IEEE International Conference on Control System, 2017
A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.
IACR Cryptol. ePrint Arch., 2016
Comput. Networks, 2016
2015
Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction.
Computing, 2015
Trust management and reputation systems in mobile participatory sensing applications: A survey.
Comput. Networks, 2015
A delay and cost balancing protocol for message routing in mobile delay tolerant networks.
Ad Hoc Networks, 2015
2014
J. Am. Medical Informatics Assoc., 2014
2013
Proceedings of the Security and Privacy Preserving in Social Networks, 2013
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IEEE Trans. Inf. Forensics Secur., 2013
An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing.
Int. J. Inf. Manag., 2013
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
Proceedings of the IEEE International Congress on Big Data, 2013
The Current Capabilities of Health Information Technology to Support Care Transitions.
Proceedings of the AMIA 2013, 2013
Proceedings of the AMIA 2013, 2013
A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Comput. Secur., 2012
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the IEEE Frontiers in Education Conference, 2012
Proceedings of the IEEE Global Engineering Education Conference, 2012
Proceedings of the IEEE Global Engineering Education Conference, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
2011
Int. J. Online Eng., 2011
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011
Leveraging Node Centrality and Regularity for Efficient Routing in Mobile Peer-to-Peer Networks.
Proceedings of the Data Management in Grid and Peer-to-Peer Systems, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
2009
Proceedings of the Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments.
Proceedings of the 2009 international conference on Pervasive services, 2009
2008
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
2004
Limiter discriminator detection of narrow-band duobinary FSK in a land mobile channel.
Int. J. Commun. Syst., 2004
2003