


default search action
Omar Hasan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Maximilian Schiedermeier, Omar Hasan, Tobias René Mayer, Lionel Brunie, Harald Kosch:
Anonymous voting using distributed ledger-assisted secure multi-party computation. Appl. Netw. Sci. 9(1): 51 (2024) - [j18]Brandon A. Mosqueda González
, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie:
Secure and efficient decentralized machine learning through group-based model aggregation. Clust. Comput. 27(4): 3911-3925 (2024) - [j17]Wisnu Uriawan
, Youakim Badr, Omar Hasan, Lionel Brunie:
Decentralized trustworthiness score management with smart contracts on the trustlend platform. IET Blockchain 4(1): 59-72 (2024) - [c35]Mohammad Alja'Afreh, Omar Hasan, Ranwa Al Mallah, Ali Karime:
Blockchain-Driven Networking and Communications in the Metaverse. BCCA 2024: 826-833 - [c34]Nicola Bena
, Marco Pedrinazzi, Marco Anisetti, Omar Hasan, Lionel Brunie:
A Transparent Certification Scheme Based on Blockchain for Service-Based Systems. ICWS 2024: 501-511 - [i5]Guglielmo Zocca, Omar Hasan:
Privacy-Preserving and Trustworthy Localization in an IoT Environment. CoRR abs/2406.16182 (2024) - 2023
- [j16]Janka Hartmann, Omar Hasan
:
Privacy considerations for a decentralized finance (DeFi) loans platform. Clust. Comput. 26(4): 2147-2161 (2023) - [j15]Omar Hasan
, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55(2): 32:1-32:37 (2023) - 2022
- [j14]A. Y. Al-Zoubi, Ashraf A. Tahat, Rami Wahsheh, Mohammad Taha, Luae Altarawneh, Omar Hasan:
A Bachelor Degree Program in IoT Engineering Accreditation Constraints and Market Demand. Int. J. Eng. Pedagog. 12(4): 17-34 (2022) - [j13]Matthieu Bettinger
, Lucas Barbero, Omar Hasan:
Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting. SN Comput. Sci. 3(5): 334 (2022) - [c33]Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie:
LAPS: Computing Loan Default Risk from User Activity, Profile, and Recommendations. BCCA 2022: 167-172 - [c32]Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie:
TrustLend: Using Borrower Trustworthiness for Lending on Ethereum. SECRYPT 2022: 519-524 - [i4]Matthieu Bettinger, Lucas Barbero, Omar Hasan:
Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting. CoRR abs/2206.07429 (2022) - 2021
- [c31]Janka Hartmann, Omar Hasan:
A social-capital based approach to blockchain-enabled peer-to-peer lending. BCCA 2021: 105-110 - [c30]Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie:
Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp). SECRYPT 2021: 839-844 - 2020
- [j12]Rémi Canillas, Omar Hasan, Laurent Sarrat, Lionel Brunie:
GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonation. Appl. Netw. Sci. 5(1): 40 (2020) - [c29]Rémi Canillas, Omar Hasan, Laurent Sarrat, Lionel Brunie:
Supplier Impersonation Fraud Detection using Bayesian Inference. BigComp 2020: 330-337
2010 – 2019
- 2019
- [c28]Rémi Canillas, Omar Hasan, Laurent Sarrat, Lionel Brunie:
Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps. COMPLEX NETWORKS (2) 2019: 599-610 - [c27]Maximilian Schiedermeier, Omar Hasan, Lionel Brunie, Tobias René Mayer, Harald Kosch:
A Transparent Referendum Protocol with Immutable Proceedings and Verifiable Outcome for Trustless Networks. COMPLEX NETWORKS (1) 2019: 647-658 - [i3]Maximilian Schiedermeier, Omar Hasan, Tobias René Mayer, Lionel Brunie, Harald Kosch:
A transparent referendum protocol with immutable proceedings and verifiable outcome for trustless networks. CoRR abs/1909.06462 (2019) - 2018
- [c26]Rémi Canillas, Rania Talbi, Sara Bouchenak, Omar Hasan, Lionel Brunie, Laurent Sarrat:
Exploratory Study of Privacy Preserving Fraud Detection. Middleware Industry 2018: 25-31 - 2017
- [c25]Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama S. Younes
, Mohiy M. Hadhoud:
A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications. CCNC 2017: 829-834 - [c24]Mohamed Taha, Dia I. Abu-Al-Nadi, Omar Hasan, Eyad A. Feilat
:
Lightning impulse parameters estimation using fractional model order reduction. ICCSCE 2017: 80-84 - [c23]Rémi Bazin, Alexander Schaub
, Omar Hasan, Lionel Brunie:
Self-reported Verifiable Reputation with Rater Privacy. IFIPTM 2017: 180-195 - [c22]Omar Hasan, Mohamed Taha, Omar Alasali, Neda Aldaher:
E-Learning Platform for Disadvantaged Groups. IMCL 2017: 872-878 - [c21]Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama S. Younes
, Mohiy M. Hadhoud:
PrivaSense: Privacy-Preserving and Reputation-Aware Mobile Participatory Sensing. MobiQuitous 2017: 38-47 - 2016
- [j11]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar
, Lionel Brunie, Ammar Hasan:
4PR: Privacy preserving routing in mobile delay tolerant networks. Comput. Networks 111: 17-28 (2016) - [c20]Alexander Schaub
, Rémi Bazin, Omar Hasan, Lionel Brunie:
A Trustless Privacy-Preserving Reputation System. SEC 2016: 398-411 - [i2]Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie:
A trustless privacy-preserving reputation system. IACR Cryptol. ePrint Arch. 2016: 16 (2016) - [i1]Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie:
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval. IACR Cryptol. ePrint Arch. 2016: 416 (2016) - 2015
- [j10]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar
, Lionel Brunie, Gabriele Gianini
:
A delay and cost balancing protocol for message routing in mobile delay tolerant networks. Ad Hoc Networks 25: 430-443 (2015) - [j9]Hayam Mousa, Sonia Ben Mokhtar
, Omar Hasan, Osama S. Younes
, Mohey M. Hadhoud, Lionel Brunie:
Trust management and reputation systems in mobile participatory sensing applications: A survey. Comput. Networks 90: 49-73 (2015) - [j8]Heidi Dikow, Omar Hasan, Harald Kosch
, Lionel Brunie, Renaud Sornin:
Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction. Computing 97(1): 29-49 (2015) - 2014
- [j7]Patricia C. Dykes, Lipika Samal, Moreen Donahue, Jeffrey O. Greenberg, Ann C. Hurley, Omar Hasan
, Terrance A. O'Malley, Arjun K. Venkatesh, Lynn A. Volk, David W. Bates:
A patient-centered longitudinal care plan: vision versus reality. J. Am. Medical Informatics Assoc. 21(6): 1082-1090 (2014) - 2013
- [j6]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar
, Lionel Brunie, Kangbin Yim:
An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. Int. J. Inf. Manag. 33(2): 252-262 (2013) - [j5]Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang:
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. IEEE Trans. Inf. Forensics Secur. 8(6): 949-962 (2013) - [c19]Omar Hasan, Jingwei Miao, Sonia Ben Mokhtar
, Lionel Brunie:
A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks. AINA 2013: 546-553 - [c18]Patricia C. Dykes, Lipika Samal, Jeffrey O. Greenberg, Omar Hasan, Arjun K. Venkatesh, Lynn A. Volk, David W. Bates:
A Patient-centered Longitudinal Plan of Care: Vision Versus Reality. AMIA 2013 - [c17]Lipika Samal, Patricia C. Dykes, Jeffrey O. Greenberg, Omar Hasan, Arjun K. Venkatesh, Lynn A. Volk, David W. Bates:
The Current Capabilities of Health Information Technology to Support Care Transitions. AMIA 2013 - [c16]Omar Hasan, Benjamin Habegger, Lionel Brunie, Nadia Bennani, Ernesto Damiani
:
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case. BigData Congress 2013: 25-30 - [p1]Omar Hasan, Lionel Brunie:
Privacy Preserving Reputation Management in Social Networks. Security and Privacy Preserving in Social Networks 2013: 245-280 - 2012
- [j4]Omar Hasan, Lionel Brunie, Elisa Bertino:
Preserving privacy of feedback providers in decentralized reputation systems. Comput. Secur. 31(7): 816-826 (2012) - [c15]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar
, Lionel Brunie:
A self-regulating protocol for efficient routing in mobile delay tolerant networks. DEST 2012: 1-6 - [c14]Akram Abu-aisheh, Sameer Hanna Khader, Omar Hasan:
Sustainable PV-powered FPGA-controlled high brightness LED illumination systems. EDUCON 2012: 1-5 - [c13]Sameer Hanna Khader, Omar Hasan, Akram Abu-aisheh:
A case study of designed an e-learning course for electrical engineering students. EDUCON 2012: 1-7 - [c12]Abdullah Y. Al-Zoubi, Omar Ata, Omar Hasan:
Microwave engineering education over the web. FIE 2012: 1-5 - [c11]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar
, Lionel Brunie, Kangbin Yim:
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks. IMIS 2012: 208-215 - 2011
- [j3]Akram Ahmad Abu-aisheh, Sameer Hanna Khader, Omar Hasan:
Implementation of Dual Use Fiber Optic Communications Laboratories. Int. J. Online Eng. 7(2): 4-9 (2011) - [c10]Omar Hasan, Lionel Brunie, Ernesto Damiani
:
A Privacy Preserving Reputation Protocol for Web Service Provider Selection. COMPSAC Workshops 2011: 404-409 - [c9]Jingwei Miao, Omar Hasan, Lionel Brunie:
Leveraging Node Centrality and Regularity for Efficient Routing in Mobile Peer-to-Peer Networks. Globe 2011: 83-94 - [c8]Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie:
An adaptive routing algorithm for mobile delay tolerant networks. WPMC 2011: 1-5 - 2010
- [c7]Omar Hasan, Elisa Bertino, Lionel Brunie:
Efficient privacy preserving reputation protocols inspired by secure sum. PST 2010: 126-133 - [c6]Omar Hasan, Lionel Brunie, Elisa Bertino:
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. SEC 2010: 253-264
2000 – 2009
- 2009
- [c5]Omar Hasan, Lionel Brunie, Jean-Marc Pierson
:
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments. ICPS 2009: 49-54 - [c4]Omar Hasan, Lionel Brunie, Jean-Marc Pierson
, Elisa Bertino:
Elimination of Subjectivity from Trust Recommendation. IFIPTM 2009: 65-80 - [c3]Omar Hasan, Lionel Brunie, Jean-Marc Pierson
, Elisa Bertino:
L'Elimination de la subjectivité dans la recommandation de confiance. UbiMob 2009: 3-10 - 2008
- [c2]Omar Hasan, Jean-Marc Pierson
, Lionel Brunie:
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation. EUC (2) 2008: 603-609 - 2007
- [c1]Rachid Saadi, Omar Hasan, Jean-Marc Pierson
, Lionel Brunie:
Establishing Trust Beliefs Based on a Uniform Disposition to Trust. SITIS 2007: 221-228 - 2004
- [j2]Omar Hasan, Ahmad A. Hiasat
:
Limiter discriminator detection of narrow-band duobinary FSK in a land mobile channel. Int. J. Commun. Syst. 17(1): 85-97 (2004) - 2003
- [j1]Ahmad A. Hiasat
, Omar Hasan:
Bit-serial architecture for rank order and stack filters. Integr. 36(1-2): 3-12 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-14 17:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint