Author of the publication

Extrapolation to calculate the probability of a double spending attack.

, , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 610-620. CEUR-WS.org, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding data in vector images: software implementation and experimental research., , and . Multim. Tools Appl., 82 (10): 14581-14607 (April 2023)Information Hiding Using 3D-Printing Technology., , , , , and . IDAACS, page 701-706. IEEE, (2019)Photon-Driven Neural Reconstruction for Path Guiding., , , , , , , and . ACM Trans. Graph., 41 (1): 7:1-7:15 (2022)Multiple Axis-Aligned Filters for Rendering of Combined Distribution Effects., , , and . Comput. Graph. Forum, 36 (4): 155-166 (2017)Extrapolation to calculate the probability of a double spending attack., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 610-620. CEUR-WS.org, (2020)The data errors control in the modular number system based on the nullification procedure., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 580-593. CEUR-WS.org, (2020)Techniques for Raising the Remainder to a Power in the System of Residual Classes., , , , and . DESSERT, page 145-150. IEEE, (2020)Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications"., and . IDAACS, page 485-488. IEEE, (2021)Fault Tolerance Computer System Structures Functioning in Residue Classes., , , and . IDAACS, page 471-474. IEEE, (2021)Data Hiding Scheme Based on Spread Sequence Addressing., , , and . CITRisk, volume 2805 of CEUR Workshop Proceedings, page 44-58. CEUR-WS.org, (2020)