6,472 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
4. Short Paper: Debt Representation in UTXO Blockchains
5. Hostile Blockchain Takeovers (Short Paper)
6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)
7. Cross-Layer Deanonymization Methods in the Lightning Protocol
8. An Empirical Analysis of Privacy in the Lightning Network
9. ACeD: Scalable Data Availability Oracle
10. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
11. Detection and localization of an underwater docking station in acoustic images using machine learning and generalized fuzzy hough transform
12. On-Chain Smart Contract Verification over Tendermint
13. DeFi as an Information Aggregator
14. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
15. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
16. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)
17. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
18. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
19. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
20. Speculative Dereferencing: Reviving Foreshadow
21. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
22. Improving the Efficiency of AES Protocols in Multi-Party Computation
23. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
24. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
25. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies
26. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
27. Liquidations: DeFi on a Knife-Edge
28. Fast Isomorphic State Channels
29. Congestion Attacks in Payment Channel Networks
30. Ignore the Extra Zeroes: Variance-Optimal Mining Pools
31. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
32. Brick: Asynchronous Incentive-Compatible Payment Channels
33. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin
34. Deployment architecture for the local delivery of ML-Models to the industrial shop floor
35. Information modeling and knowledge extraction for machine learning applications in industrial production systems
36. Deep Learning in Resource and Data Constrained Edge Computing Systems
37. Energy Profile Prediction of Milling Processes Using Machine Learning Techniques
38. Automatic Generation of Improvement Suggestions for Legacy, PLC Controlled Manufacturing Equipment Utilizing Machine Learning
39. First Approaches to Automatically Diagnose and Reconfigure Hybrid Cyber-Physical Systems
40. EthVer: Formal Verification of Randomized Ethereum Smart Contracts
41. Empirical Analysis of On-chain Voting with Smart Contracts
42. Absentia: Secure Multiparty Computation on Ethereum
43. Publicly Verifiable and Secrecy Preserving Periodic Auctions
44. Red-Black Coins: Dai Without Liquidations
45. Mobile Voting – Still Too Risky?
46. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle
47. Auditing Hamiltonian Elections
48. Towards a Theory of Decentralized Finance
49. Formal Analysis of Composable DeFi Protocols
50. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.