Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
Steal from Collaboration: Spy Attack by a Dishonest Party i..:
, In:
?
Provable and Practical Security; Lecture Notes in Computer Science ,
4
Secure Collaboration Between Consortiums in Permissioned Bl..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
5
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sh..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
7
Rational Manager in Bitcoin Mining Pool: Dynamic Strategies..:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
9
How to Model the Bribery Attack: A Practical Quantification..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
15