Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (15. : 2022 : Ottawa) Foundations and practice of security
1. Verfasser: Salimpour, Sahar (VerfasserIn)
Weitere Verfasser: Keramat, Farhad (VerfasserIn), Queralta, Jorge Peria (VerfasserIn), Westerlund, Tomi (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Security Analysis of Improved EDHOC Protocol 2023 Cottier, Baptiste
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone 2023 Bettaieb, Slim
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications 2023 Bendoukha, Adda Akram
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework 2023 Ayoubi, Solayman
A Taxonomy and Gap-Analysis in Digital Privacy Education 2023 Paul, Sumit Kumar
Defense Models for Data Recovery in Industrial Control Systems 2023 Jawad, Alvi
Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts 2023 Salimpour, Sahar
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes 2023 Tam, Anthony
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis 2023 Fahd, Shah
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher 2023 Ebrahimi, Amirhossein
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter 2023 Mohzary, Muhammad
Where is the Virtual Machine Within CPYTHON? 2023 Bonfante, Guillaume
Differentially Private Friends Recommendation 2023 Macwan, Kamalkumar
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts 2023 Gill, Puneet
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic 2023 Tahmi, Omar
A Survey on Identity-Based Blind Signature 2023 Koscina, Mirko
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES 2023 Brisfors, Martin
Towards a Maturity Model for Crypto-Agility Assessment 2023 Hohm, Julian
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms 2023 Casanove, Olivier de
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks 2023 Fraunholz, Daniel
Alle Artikel auflisten