Security attacks on multi-stage proof-of-work P D'Arco, ZE Ansaroudi 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 3 | 2021 |
Modeling and formal verification of the ticket-based handoff authentication protocol for wireless mesh networks ZE Ansaroudi, S Pashazadeh Pervasive Systems, Algorithms and Networks: 16th International Symposium, I …, 2019 | 3 | 2019 |
Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends ZE Ansaroudi, R Carbone, G Sciarretta, S Ranise IFIP Annual Conference on Data and Applications Security and Privacy, 113-132, 2023 | 2 | 2023 |
Gossamer: weaknesses and performance P D’Arco, R De Prisco, ZE Ansaroudi, R Zaccagnino International Journal of Information Security, 1-19, 2022 | 2 | 2022 |
Multi-stage proof-of-works: properties and vulnerabilities P D'Arco, ZE Ansaroudi, F Mogavero Theoretical Computer Science 976, 114108, 2023 | 1 | 2023 |
On Pseudorandomness and Deep Learning: A Case Study Z Ebadi Ansaroudi, R Zaccagnino, P D’Arco Applied Sciences 13 (5), 3372, 2023 | | 2023 |
Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains P D’Arco, ZE Ansaroudi Proceedings of the 12th International Conference on Soft Computing and …, 2021 | | 2021 |
Pervasive Systems, Algorithms and Networks: 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings C Esposito, J Hong, KKR Choo Springer Nature, 2019 | | 2019 |