Tabular data sharing serves as a common method for data exchange. Howeve...
Industrial Internet of Things (IIoT) opens up a challenging research are...
We study cascading failures in smart grids, where an attacker selectivel...
Recently collaborative learning is widely applied to model sensitive dat...
Payments routed in Lightning Network are susceptible to a griefing
attac...
Technology has evolved over the years, making our lives easier. It has
i...
The infection rate of COVID-19 and lack of an approved vaccine has force...
Content sharing platforms such as Youtube and Vimeo have promoted pay pe...
The recent outbreak of COVID-19 has taken the world by surprise, forcing...
The Indian Personal Data Protection Bill 2019 provides a legal framework...
Payment Channel Networks or PCNs have gained prominence ensuring faster
...
Payment protocols developed to realize off-chain transactions in Payment...
The advent of Industrial IoT (IIoT) along with Cloud computing has broug...
Payment channel networks (PCN) are used in cryptocurrencies to enhance t...
We address the problem of fairness and transparency in online marketplac...
A symmetric searchable encryption (SSE) scheme allows a client (data own...
Data owners upload large files to cloud storage servers, but malicious
s...
Link Prediction is an important and well-studied problem for social netw...
Data is of unprecedented importance today. The most valuable companies o...
Permissioned Blockchain has become quite popular with enterprises formin...
Cloud computing enables users (clients) to outsource large volume of the...
Bitcoin cryptocurrency system enables users to transact securely and
pse...
Cloud users (clients) with limited storage capacity at their end can
out...
Cloud servers offer data outsourcing facility to their clients. A client...
A lot of scientific works are published in different areas of science,
t...