Gnocci: Multiplexed Payment Channels for Cryptocurrencies

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Network and System Security (13. : 2019 : Sapporo) Network and system security
1. Verfasser: Pan, Chen (VerfasserIn)
Weitere Verfasser: Tang, Shuyang (VerfasserIn), Ge, Zhonghui (VerfasserIn), Liu, Zhiqiang (VerfasserIn), Long, Yu (VerfasserIn), Liu, Zhen (VerfasserIn), Gu, Dawu (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation 2019 Liu, Liu
A Graph Database-Based Approach to Analyze Network Log Files 2019 Diederichsen, Lars
A Privacy-Enhancing Framework for Internet of Things Services 2019 Malina, Lukas
OUTGENE: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms 2019 Dias, Luís
LaT-Voting: Traceable Anonymous E-Voting on Blockchain 2019 Li, Peng
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture 2019 Ma, Xinshu
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System 2019 Zhang, Li
Privacy-Preserving Sequential Data Publishing 2019 Wang, Huili
SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform 2019 Bazai, Sibghat Ullah
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter 2019 Li, Kang
Derandomized PACE with Mutual Authentication 2019 Bobowski, Adam
A High-Performance Hybrid Blockchain System for Traceable IoT Applications 2019 Wang, Xu
Strong Known Related-Key Attacks and the Security of ECDSA 2019 Yuen, Tsz Hon
Threat Assessment of Enterprise Applications via Graphical Modelling 2019 Bilur, Manjunath
Towards Secure Open Banking Architecture: An Evaluation with OWASP 2019 Kellezi, Deina
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters 2019 Sumongkayothin, Karin
Detecting Intruders by User File Access Patterns 2019 Huang, Shou-Hsuan S.
Sequential Aggregate MACs with Detecting Functionality Revisted 2019 Sato, Shingo
EEG-Based Person Authentication with Variational Universal Background Model 2019 Tran, Huyen
A Comparative Study on Network Traffic Clustering 2019 Liu, Yang
Alle Artikel auflisten