Author of the publication

Extrapolation to calculate the probability of a double spending attack.

, , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 610-620. CEUR-WS.org, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Decentralized E-Voting System., , , , , , and . CMiGIN, volume 2588 of CEUR Workshop Proceedings, page 12-22. CEUR-WS.org, (2019)Global Digital Identity and Public Key Infrastructure., , , , and . ICTERI Workshops, volume 2732 of CEUR Workshop Proceedings, page 1-12. CEUR-WS.org, (2020)Optimization of a Simulated Annealing Algorithm for S-Boxes Generating., , , , , and . Sensors, 22 (16): 6073 (2022)Simulation of a Double Spending Attack on the Proof of Work Consensus Protocol., , , , , , and . CybHyg, volume 2654 of CEUR Workshop Proceedings, page 32-59. CEUR-WS.org, (2019)Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography., , , and . Cryptogr., 8 (2): 17 (June 2024)Extrapolation to calculate the probability of a double spending attack., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 610-620. CEUR-WS.org, (2020)Particle Swarm Optimization based on S-Boxes Generation., , , and . CPITS II (2), volume 3188 of CEUR Workshop Proceedings, page 120-134. CEUR-WS.org, (2021)Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems., , , , and . CPITS II, volume 3550 of CEUR Workshop Proceedings, page 81-94. CEUR-WS.org, (2023)