Search for persons
X
?
2023 IEEE International Conference on Blockchain (Blockchain) ,
2
BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k ..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
3
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Functi..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
6
Evaluating Blockchain Protocols with Abusive Modeling:
, In:
?
2022 IEEE Conference on Dependable and Secure Computing (DSC) ,
7
Securing Password Authentication for Web-based Applications:
, In:
?
Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure ,
9
SmartWitness: A Proactive Software Transparency System usin..:
, In:
?
Annual Computer Security Applications Conference ,
10
Policy-based Chameleon Hash for Blockchain Rewriting with B..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
11
Fail-safe Watchtowers and Short-lived Assertions for Paymen..:
, In:
?
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies ,
12
SmartOTPs : An Air-Gapped 2-Factor Authentication for Sm..:
, In:
?
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
14