See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
Zhou YongbinDengGuo Feng 2005 Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing IACR Cryptology ePrint Archive
K. StoufferV. PillitteriS. LightmanM. AbramsA. Hahn 2015 NIST Special Publication 800-82: Guide to Industrial Control Systems (ICS) Security
Sayed Hadi HashemiFaraz FaghriRoy H. Campbell 2017 Decentralized User-Centric Access Control using PubSub over Blockchain abs/1710.00110
Hossein ShafaghLukas BurkhalterAnwar HithnawiSimon Duquennoy 2017 Towards Blockchain-based Auditable Storage and Sharing of IoT Data Proceedings of the 2017 on Cloud Computing Security Workshop
K. NikitinE. Kokoris-KogiasP. JovanovicL. GasserN. GaillyN.I. Khoffi,, J. CapposB. 2017 Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds 26th USENIX Security Symposium
Ittay Eyal and Emin Gn Sirery 2014 How to Disincentivize Large Bitcoin Mining Pools http://hackingdistributed.com/2014/06/18/how-to-disincentivize-large-bitcoin-mining-pools/
S. Nakamoto 2008 Bitcoin: A Peer-to-Peer Electronic Cash System” May 2008
C. DworkM. Naor. (1992 ricing via processing or combatting junk mail Lecture Notes in Computer Science 740
M. Walport 2017 Distributed ledger technology: Beyond block chain UK Government Office for Science
K. ChristidisM. Devetsikiotis 2016 Blockchains and Smart Contracts for the Internet of Things IEEE Access
Ross 2016 NIST SP 800-160 systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems Nat. Inst. Standards Technol., US Dept. Commerce Gaithersburg, MD, US
L. LuuY. VelnerJ. TeutschP. Saxena 2017 SMART POOL: Practical Decentralized Pooled Mining IIACR Cryptology ePrint Archive
L.-N. LundbaekA. C. D’IddioM. Huth 2016 Optimizing Governed Blockchains for Financial Process Authentications http://arxiv.org/abs/1612.00407
T. MorrisW. Gao 2014 Industrial Control System Network Traffic Data sets to Facilitate Intrusion Detection System Research Critical Infrastructure Protection VIII
T. MorrisA. SrivastavaB. ReavesW. GaoK. PavurapuR. Reddi 2011 A Control System Testbed to Validate Critical Infrastructure Protection Concepts International Journal of Critical Infrastructure Protection
M. BellareB. Yee 2003 Forward-security in private-key cryptography Proc. Topics Cryptol
M. BellareB. Yee 1997 Forward-security in private-key cryptography