464 results on '"V Misic"'
Search Results
2. PA-iMFL: Communication-Efficient Privacy Amplification Method Against Data Reconstruction Attack in Improved Multilayer Federated Learning.
3. Block and Transaction Delivery in Ethereum Network.
4. Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
5. Analyzing the Impact of TXOP Allocation on Legacy Devices in IEEE 802.11bd Networks.
6. Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake.
7. An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus.
8. The impact of ruminative thought style on the maintenance of depressive mood
9. A2E: Attribute-based Anonymity-Enhanced Authentication for Accessing Driverless Taxi Service.
10. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation.
11. Analytical evaluation of three attacks on Ethereum.
12. SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
13. Performance of IEEE 802.11bd Channel Bonding with Fallback.
14. PBFT with Gated Prioritized Block Cycles.
15. Fast Cycle Multiple Entry PBFT Consensus.
16. DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
17. Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain.
18. Performance of IEEE802.11bd for Legacy and NGV Devices with Channel Bonding and No Fallback.
19. Prioritizing transaction delivery in Ethereum network.
20. Trust and Rewards in a Two-Tier Consensus Architecture.
21. Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm.
22. Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach.
23. A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism.
24. Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
25. Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model.
26. Design of Proof-of-Stake PBFT Algorithm for IoT Environments.
27. Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
28. Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
29. Dual-UAV Aided Secure Dynamic G2U Communication.
30. Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
31. On block delivery time in Ethereum network.
32. How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
33. Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems.
34. Proof of Stake Voting in Multiple Entry PBFT System.
35. Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT.
36. Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
37. Evaluating fork after withholding (FAW) attack in Bitcoin.
38. PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning.
39. CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
40. Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
41. Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis.
42. RSMS: Towards Reliable and Secure Metaverse Service Provision.
43. Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods.
44. Reducing the number of transaction messages in bitcoin.
45. DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
46. Understanding MEC empowered vehicle task offloading performance in 6G networks.
47. A high performance two-layer consensus architecture for blockchain-based IoT systems.
48. Revisiting FAW attack in an imperfect PoW blockchain system.
49. Scalable Self-Sovereign Identity Architecture.
50. Interpretable Optimal Stopping.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.