Now showing items 1-3 of 3

    • A distributed biometric authentication scheme based on blockchain 

      Toutara F., Spathoulas G. (2020)
      Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ...
    • Reduction of collisions and regret in time sharing schemes for opportunistic spectrum access 

      Giatsios D., Korakis T., Tassiulas L., Koutsopoulos I. (2017)
      We examine decentralized learning and access algorithms for opportunistic spectrum access with multiple users. Several distributed algorithms have been proposed for this problem, mainly as an application of corresponding ...
    • Scheduling the execution of tasks at the edge 

      Kolomvatsos K., Loukopoulos T. (2018)
      The Internet of Things provides a huge infrastructure where numerous devices produce, collect and process data. These data are the basis for offering analytics to support novel applications. The processing of huge volumes ...