302,956 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
4. Short Paper: Debt Representation in UTXO Blockchains
5. Hostile Blockchain Takeovers (Short Paper)
6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)
7. Artificial life and intelligent agents: second international symposium, ALIA 2016, Birmingham, UK, June 14-15, 2016, revised selected papers.
8. An Ontology-Based System for Generating Mathematical Test Papers
9. Paper-Based Inkjet Electrodes : Experimental Study for ECG Applications
10. Cross-Layer Deanonymization Methods in the Lightning Protocol
11. An Empirical Analysis of Privacy in the Lightning Network
12. ACeD: Scalable Data Availability Oracle
13. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
14. Detection and localization of an underwater docking station in acoustic images using machine learning and generalized fuzzy hough transform
15. On-Chain Smart Contract Verification over Tendermint
16. DeFi as an Information Aggregator
17. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
18. Paper Wrapping, Based on Knowledge about Face Connectivity among Paper Fragments
19. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
20. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)
21. Artificial intelligence for knowledge management : second IFIP WG 12.6 International Workshop, AI4KM 2014, Warsaw, Poland, September 7-10, 2014, revised selected papers.
22. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
23. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
24. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
25. Speculative Dereferencing: Reviving Foreshadow
26. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
27. Improving the Efficiency of AES Protocols in Multi-Party Computation
28. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
29. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
30. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies
31. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
32. Liquidations: DeFi on a Knife-Edge
33. Fast Isomorphic State Channels
34. Congestion Attacks in Payment Channel Networks
35. Ignore the Extra Zeroes: Variance-Optimal Mining Pools
36. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
37. Brick: Asynchronous Incentive-Compatible Payment Channels
38. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin
39. Deployment architecture for the local delivery of ML-Models to the industrial shop floor
40. Information modeling and knowledge extraction for machine learning applications in industrial production systems
41. Deep Learning in Resource and Data Constrained Edge Computing Systems
42. Energy Profile Prediction of Milling Processes Using Machine Learning Techniques
43. Automatic Generation of Improvement Suggestions for Legacy, PLC Controlled Manufacturing Equipment Utilizing Machine Learning
44. First Approaches to Automatically Diagnose and Reconfigure Hybrid Cyber-Physical Systems
45. EthVer: Formal Verification of Randomized Ethereum Smart Contracts
46. Empirical Analysis of On-chain Voting with Smart Contracts
47. Absentia: Secure Multiparty Computation on Ethereum
48. Publicly Verifiable and Secrecy Preserving Periodic Auctions
49. Red-Black Coins: Dai Without Liquidations
50. Mobile Voting – Still Too Risky?
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.