research
∙
06/29/2022
Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices
The growing interest in Internet of Things (IoT) and Industrial IoT (IIo...
research
∙
06/23/2022
MAGIC: A Method for Assessing Cyber Incidents Occurrence
The assessment of cyber risk plays a crucial role for cybersecurity mana...
research
∙
02/15/2022
A data availability attack on a blockchain protocol based on LDPC codes
In a blockchain Data Availability Attack (DAA), a malicious node publish...
research
∙
01/20/2022