Author of the publication

A Graph-Based Investigation of Bitcoin Transactions.

, and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 79-95. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Wireless Applied Research on Concatenated Code for SpaceWire Communication Network., , , and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 214-220. Springer, (2011)COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks., , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 338-355. Springer, (2006)Evidence Collection in Peer-to-Peer Network Investigations., and . IFIP Int. Conf. Digital Forensics, volume 383 of IFIP Advances in Information and Communication Technology, page 215-230. Springer, (2012)A dynamic en-route scheme for filtering false data injection in wireless sensor networks., and . SenSys, page 294-295. ACM, (2005)Cardinality change-based early detection of large-scale cyber-attacks., , and . INFOCOM, page 1788-1796. IEEE, (2013)Lightweight Mutual Authentication and Ownership Transfer for RFID Systems., , , and . INFOCOM, page 251-255. IEEE, (2010)A fast sketch for aggregate queries over high-speed network traffic., , and . INFOCOM, page 2741-2745. IEEE, (2012)Design and Test of an In-Vivo Robotic Camera Integrated with Optimized Illumination System for Single-port Laparoscopic Surgery., , , , , and . ICRA, page 1392-1397. IEEE, (2018)Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness., , , , , , and . SADFE, page 1-3. IEEE Computer Society, (2011)Identifying high-cardinality hosts from network-wide traffic measurements., , and . CNS, page 287-295. IEEE, (2013)