3,161 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
4. Short Paper: Debt Representation in UTXO Blockchains
5. Hostile Blockchain Takeovers (Short Paper)
6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)
7. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
8. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)
9. Cross-Layer Deanonymization Methods in the Lightning Protocol
10. An Empirical Analysis of Privacy in the Lightning Network
11. ACeD: Scalable Data Availability Oracle
12. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
13. Detection and localization of an underwater docking station in acoustic images using machine learning and generalized fuzzy hough transform
14. On-Chain Smart Contract Verification over Tendermint
15. DeFi as an Information Aggregator
16. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
17. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)
18. Private eCash in Practice (Short Paper)
19. A Short Paper on Blind Signatures from Knowledge Assumptions
20. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
21. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
22. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
23. Speculative Dereferencing: Reviving Foreshadow
24. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
25. Improving the Efficiency of AES Protocols in Multi-Party Computation
26. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
27. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
28. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies
29. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
30. Liquidations: DeFi on a Knife-Edge
31. Fast Isomorphic State Channels
32. Congestion Attacks in Payment Channel Networks
33. Ignore the Extra Zeroes: Variance-Optimal Mining Pools
34. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
35. Brick: Asynchronous Incentive-Compatible Payment Channels
36. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin
37. Deployment architecture for the local delivery of ML-Models to the industrial shop floor
38. Information modeling and knowledge extraction for machine learning applications in industrial production systems
39. Deep Learning in Resource and Data Constrained Edge Computing Systems
40. Energy Profile Prediction of Milling Processes Using Machine Learning Techniques
41. Automatic Generation of Improvement Suggestions for Legacy, PLC Controlled Manufacturing Equipment Utilizing Machine Learning
42. First Approaches to Automatically Diagnose and Reconfigure Hybrid Cyber-Physical Systems
43. EthVer: Formal Verification of Randomized Ethereum Smart Contracts
44. Empirical Analysis of On-chain Voting with Smart Contracts
45. Absentia: Secure Multiparty Computation on Ethereum
46. Publicly Verifiable and Secrecy Preserving Periodic Auctions
47. Red-Black Coins: Dai Without Liquidations
48. Mobile Voting – Still Too Risky?
49. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle
50. Auditing Hamiltonian Elections
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.