Showing results 1 to 2 of 2
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 Choi, Kibum; Son, Yunmok; Noh, Juhwan; Shin, Hocheol; Choi, Jaeyeong; Kim, Yongdae, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, 2016-07-19 |
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack Kwon, Yujin; Kim, Dohyun; Son, Yunmok; Choi, Jaeyeong; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.124 - 135, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25 |
Discover