research
          
      
      ∙
      06/29/2022
    Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices
The growing interest in Internet of Things (IoT) and Industrial IoT (IIo...
          
            research
          
      
      ∙
      06/23/2022
    MAGIC: A Method for Assessing Cyber Incidents Occurrence
The assessment of cyber risk plays a crucial role for cybersecurity mana...
          
            research
          
      
      ∙
      02/15/2022
    A data availability attack on a blockchain protocol based on LDPC codes
In a blockchain Data Availability Attack (DAA), a malicious node publish...
          
            research
          
      
      ∙
      01/20/2022
     
             
  
  
     
                             share
 share