Money Transfer on Transaction Signature-Based Ledger

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (15. : 2022 : Ottawa) Foundations and practice of security
1. Verfasser: Shiraishi, Momoko (VerfasserIn)
Weitere Verfasser: Aida, Hitoshi (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Survey on Identity-Based Blind Signature 2023 Koscina, Mirko
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES 2023 Brisfors, Martin
Towards a Maturity Model for Crypto-Agility Assessment 2023 Hohm, Julian
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms 2023 Casanove, Olivier de
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks 2023 Fraunholz, Daniel
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords 2023 Krentz, Konrad-Felix
Deep-Learning-Based Vulnerability Detection in Binary Executables 2023 Schaad, Andreas
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection 2023 Burda, Pavlo
A New Class of Trapdoor Verifiable Delay Functions 2023 Zawia, Ahmed
Underwater Confidential Communications in JANUS 2023 Beaupré, Yannick
SCADA Radio Blackbox Reverse Engineering 2023 Larouche, Jean-Benoit
Money Transfer on Transaction Signature-Based Ledger 2023 Shiraishi, Momoko
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets 2023 Sans, Thierry
Towards Characterizing IoT Software Update Practices 2023 Bradley, Conner
Security Analysis of Improved EDHOC Protocol 2023 Cottier, Baptiste
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone 2023 Bettaieb, Slim
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications 2023 Bendoukha, Adda Akram
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework 2023 Ayoubi, Solayman
A Taxonomy and Gap-Analysis in Digital Privacy Education 2023 Paul, Sumit Kumar
Defense Models for Data Recovery in Industrial Control Systems 2023 Jawad, Alvi
Alle Artikel auflisten