Author of the publication

Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.

, , , and . PerCom Workshops, page 279-284. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective., , , , and . IEEE Internet Things J., 11 (5): 7309-7324 (2024)Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain., , and . IEEE Trans. Netw. Serv. Manag., 20 (2): 1775-1789 (June 2023)Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles., , and . CoRR, (2022)DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles., , and . CoRR, (2023)Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering., , , , and . M&N, page 1-6. IEEE, (2022)Adaptive Coordinated Random Access For MTC With Correlated Traffic and Data Freshness., , and . SPAWC, page 206-210. IEEE, (2021)ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning., , , and . SAS, page 1-6. IEEE, (2023)Knocking on Tangle's Doors: Security Analysis of IOTA Ports., , , , and . Blockchain, page 433-439. IEEE, (2021)Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems., , , and . IEEE Trans. Ind. Informatics, 19 (6): 7801 (June 2023)RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems., , , and . ACM Trans. Intell. Syst. Technol., 15 (2): 31:1-31:21 (April 2024)