New Privacy Practices for Blockchain Software | 0 | 0.34 | 2022 |
Clover: An anonymous transaction relay protocol for the bitcoin P2P network | 0 | 0.34 | 2022 |
Leveled Multikey FHE with constant-size ciphertexts from RLWE. | 0 | 0.34 | 2022 |
AToM: Active topology monitoring for the bitcoin peer-to-peer network | 0 | 0.34 | 2022 |
Offline Scaling of IoT Devices in IOTA Blockchain | 0 | 0.34 | 2022 |
SoK: Network-Level Attacks on the Bitcoin P2P Network | 0 | 0.34 | 2022 |
FairTraDEX: A Decentralised Exchange Preventing Value Extraction. | 0 | 0.34 | 2022 |
ZPiE: Zero-Knowledge Proofs in Embedded Systems | 0 | 0.34 | 2021 |
Sans: Self-Sovereign Authentication For Network Slices | 2 | 0.41 | 2020 |
Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes | 0 | 0.34 | 2020 |
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems | 0 | 0.34 | 2020 |
LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version). | 0 | 0.34 | 2019 |
Connect: Contextual Name Discovery For Blockchain-Based Services In The Iot | 2 | 0.37 | 2017 |
CoLLIDE: CLoud Latency-based IDEntification. | 0 | 0.34 | 2017 |
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions. | 0 | 0.34 | 2017 |
FRoDO: Fraud Resilient Device for Off-line micropayments | 1 | 0.36 | 2016 |
Exploring the Effectiveness of Video Viewing in an Introductory x-MOOC of Algebra. | 0 | 0.34 | 2015 |
A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs). | 0 | 0.34 | 2015 |
Performance analysis of a Multiuser Multi-Packet Transmission system for WLANs in non-saturation conditions | 4 | 0.47 | 2014 |
SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments. | 0 | 0.34 | 2014 |
Queueing Analysis in Multiuser Multi-Packet Transmission Systems Using Spatial Multiplexing | 2 | 0.37 | 2012 |
Buffer sizing in TxSDMA systems | 1 | 0.36 | 2011 |
An Approximate Queueing Model for Multi-Rate Multi-User MIMO Systems | 4 | 0.46 | 2011 |
Flaws in some self-healing key distribution schemes with revocation | 4 | 0.46 | 2009 |
Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks | 56 | 1.88 | 2009 |
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts | 9 | 0.68 | 2008 |
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes | 26 | 1.31 | 2008 |
On the Computational Security of a Distributed Key Distribution Scheme | 2 | 0.39 | 2008 |
Extensions of access structures and their cryptographic applications | 0 | 0.34 | 2008 |
A distributed architecture for scalable private RFID tag identification | 25 | 1.33 | 2007 |
On Dynamic Distribution of Private Keys over MANETs | 5 | 0.52 | 2007 |
Cryptographic techniques for mobile ad-hoc networks | 4 | 0.45 | 2007 |
CCA2-secure threshold broadcast encryption with shorter ciphertexts | 21 | 0.94 | 2007 |
An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks | 0 | 0.34 | 2007 |
On codes, matroids and secure multi-party computation from linear secret sharing schemes | 21 | 1.19 | 2005 |
Protocols useful on the Internet from distributed signature schemes | 3 | 0.37 | 2004 |
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures | 9 | 0.50 | 2004 |
Some Protocols Useful on the Internet from Threshold Signature Schemes | 2 | 0.38 | 2003 |
Constructing general dynamic group key distribution schemes with decentralized user join | 5 | 0.60 | 2003 |
A Distributed and Computationally Secure Key Distribution Scheme | 3 | 0.39 | 2002 |
Some Applications of Threshold Signature Schemes to Distributed Protocols. | 0 | 0.34 | 2002 |