302,950 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
4. Short Paper: Debt Representation in UTXO Blockchains
5. Cross-Layer Deanonymization Methods in the Lightning Protocol
6. An Empirical Analysis of Privacy in the Lightning Network
7. ACeD: Scalable Data Availability Oracle
8. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
9. Detection and localization of an underwater docking station in acoustic images using machine learning and generalized fuzzy hough transform
10. On-Chain Smart Contract Verification over Tendermint
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.