Author of the publication

Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis.

, , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1402-1409. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a New-Member-Joining-Protocol Design Using Bivariate Polynomials Based DKG Algorithms., and . BICS, volume 7888 of Lecture Notes in Computer Science, page 387-394. Springer, (2013)Fast algorithms of attribute reduction for covering decision systems with minimal elements in discernibility matrix., , and . Int. J. Machine Learning & Cybernetics, 7 (2): 297-310 (2016)On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , and . NOMS (1), page 277-290. IEEE, (2004)Improved Algorithm and Further Research of β -reduct for variable precision rough set., and . GrC, page 783-786. IEEE Computer Society, (2012)A Context-Aware System for Mobile Data Sharing in Hybrid P2P Environment., , and . ICAS, page 63-68. IEEE Computer Society, (2009)Mobile information retrieval in a hybrid peer-to-peer environment., and . Mobility Conference, ACM, (2009)Novel algorithms of attribute reduction for variable precision rough set., , and . ICMLC, page 108-112. IEEE, (2011)An adaptive people counting system with dynamic features selection and occlusion handling., , , and . J. Visual Communication and Image Representation, (2016)Parameterized Local Reduction of Decision Systems., , and . J. Applied Mathematics, (2012)Architectural Support for Global Smart Spaces, , , , , , , , and . CoRR, (2010)