300,992 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
4. Short Paper: Debt Representation in UTXO Blockchains
5. Cross-Layer Deanonymization Methods in the Lightning Protocol
6. An Empirical Analysis of Privacy in the Lightning Network
7. ACeD: Scalable Data Availability Oracle
8. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
9. Detection and localization of an underwater docking station in acoustic images using machine learning and generalized fuzzy hough transform
10. On-Chain Smart Contract Verification over Tendermint
11. DeFi as an Information Aggregator
12. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
13. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox
14. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
15. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
16. Speculative Dereferencing: Reviving Foreshadow
17. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
18. Improving the Efficiency of AES Protocols in Multi-Party Computation
19. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
20. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
21. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies
22. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
23. Liquidations: DeFi on a Knife-Edge
24. Fast Isomorphic State Channels
25. Congestion Attacks in Payment Channel Networks
26. Ignore the Extra Zeroes: Variance-Optimal Mining Pools
27. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
28. Brick: Asynchronous Incentive-Compatible Payment Channels
29. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin
30. Deployment architecture for the local delivery of ML-Models to the industrial shop floor
31. Information modeling and knowledge extraction for machine learning applications in industrial production systems
32. Deep Learning in Resource and Data Constrained Edge Computing Systems
33. Energy Profile Prediction of Milling Processes Using Machine Learning Techniques
34. Automatic Generation of Improvement Suggestions for Legacy, PLC Controlled Manufacturing Equipment Utilizing Machine Learning
35. First Approaches to Automatically Diagnose and Reconfigure Hybrid Cyber-Physical Systems
36. EthVer: Formal Verification of Randomized Ethereum Smart Contracts
37. Empirical Analysis of On-chain Voting with Smart Contracts
38. Absentia: Secure Multiparty Computation on Ethereum
39. Publicly Verifiable and Secrecy Preserving Periodic Auctions
40. Red-Black Coins: Dai Without Liquidations
41. Mobile Voting – Still Too Risky?
42. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle
43. Auditing Hamiltonian Elections
44. Towards a Theory of Decentralized Finance
45. Formal Analysis of Composable DeFi Protocols
46. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
47. Market Based Mechanisms for Incentivising Exchange Liquidity Provision
48. Fairness in ERC Token Markets: A Case Study of CryptoKitties
49. Standardized Crypto-Loans on the Cardano Blockchain
50. Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.