default search action
Simeon Wuthier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Sang-Yoon Chang, Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Xiaobo Zhou:
Base station gateway to secure user channel access at the first hop edge. Comput. Networks 240: 110165 (2024) - [j4]Hsiang-Jen Hong, Sang-Yoon Chang, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou:
Secure and Efficient Authentication using Linkage for permissionless Bitcoin network. Comput. Networks 254: 110840 (2024) - [c26]Simeon Wuthier, Nazmus Sakib, Sang-Yoon Chang:
Positive Reputation Score for Bitcoin P2P Network. CCNC 2024: 519-524 - [c25]Nazmus Sakib, Simeon Wuthier, Kelei Zhang, Xiaobo Zhou, Sang-Yoon Chang:
From Slow Propagation to Partition: Analyzing Bitcoin Over Anonymous Routing. ICBC 2024: 377-385 - [c24]Manohar Raavi, Simeon Wuthier, Sang-Yoon Chang:
Securing Post-Quantum DNSSEC Against Fragmentation Mis-Association Threat. ICC 2024: 97-102 - [c23]Sourav Purification, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Fake Base Station Detection and Blacklisting. ICCCN 2024: 1-9 - [c22]Hsiang-Jen Hong, Sang-Yoon Chang, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou:
SEAL: Secure and Efficient Authentication using Linkage for Blockchain Networks. ICIN 2024: 114-121 - [c21]Rono Cheruiyot, Sourav Purification, Simeon Wuthier, Sang-Yoon Chang:
5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery. SVCC 2024: 1-3 - 2023
- [j3]Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1302-1318 (2023) - [c20]Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Version++: Cryptocurrency Blockchain Handshaking With Software Assurance. CCNC 2023: 804-809 - [c19]Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance. CCNC 2023: 915-916 - [c18]Manohar Raavi, Simeon Wuthier, Xiaobo Zhou, Sang-Yoon Chang:
Post-Quantum QUIC Protocol in Cloud Networking. EuCNC/6G Summit 2023: 573-578 - 2022
- [j2]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency. Comput. Networks 219: 109436 (2022) - [j1]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. IEEE Trans. Netw. Serv. Manag. 19(3): 3619-3632 (2022) - [c17]Kelei Zhang, Simeon Wuthier, Kay Yoon, Sang-Yoon Chang:
Designing and Using Capture The Flag for Coordination and Interaction in Engineering Education. EDUCON 2022: 1555-1560 - [c16]Wenjun Fan, Simeon Wuthier, Hsiang-Jen Hong, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang:
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network. ICDCS 2022: 191-201 - [c15]Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang:
QUIC Protocol with Post-quantum Authentication. ISC 2022: 84-91 - [c14]Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang:
Greedy Networking in Cryptocurrency Blockchain. SEC 2022: 343-359 - [c13]Kathryn Hines, Manohar Raavi, John-Michael Villeneuve, Simeon Wuthier, Javier Moreno-Colin, Yan Bai, Sang-Yoon Chang:
Post-Quantum Cipher Power Analysis in Lightweight Devices. WISEC 2022: 282-284 - [c12]Theo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Lightweight Code Assurance Proof for Wireless Software. WISEC 2022: 285-287 - [i1]Sang-Yoon Chang, Kay Yoon, Simeon Wuthier, Kelei Zhang:
Capture the Flag for Team Construction in Cybersecurity. CoRR abs/2206.08971 (2022) - 2021
- [c11]Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, Xiaobo Zhou, Sang-Yoon Chang:
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms. ACNS (2) 2021: 424-447 - [c10]Wenjun Fan, Hsiang-Jen Hong, Simeon Wuthier, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang:
Security Analyses of Misbehavior Tracking in Bitcoin Network. IEEE ICBC 2021: 1-3 - [c9]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking. IEEE ICBC 2021: 1-9 - [c8]Manohar Raavi, Pranav Chandramouli, Simeon Wuthier, Xiaobo Zhou, Sang-Yoon Chang:
Performance Characterization of Post-Quantum Digital Certificates. ICCCN 2021: 1-9 - [c7]Simeon Wuthier, Sang-Yoon Chang:
Demo: Proof-of-Work Network Simulator for Blockchain and Cryptocurrency Research. ICDCS 2021: 1098-1101 - [c6]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, Xiaobo Zhou, C. Edward Chow, Sang-Yoon Chang:
Robust P2P Connectivity Estimation for Permissionless Bitcoin Network. IWQoS 2021: 1-6 - [c5]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking. LCN 2021: 319-322 - [c4]Manohar Raavi, Simeon Wuthier, Arijet Sarker, Jinoh Kim, Jong Hyun Kim, Sang-Yoon Chang:
Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network. SVCC 2021: 143-154 - 2020
- [c3]Sang-Yoon Chang, Simeon Wuthier:
Dynamic power control for rational cryptocurrency mining. CryBlock@MOBICOM 2020: 47-52
2010 – 2019
- 2019
- [c2]Sang-Yoon Chang, Younghee Park, Simeon Wuthier, Chang-Wu Chen:
Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. ACNS 2019: 241-258 - [c1]Arijet Sarker, Simeon Wuthier, Sang-Yoon Chang:
Anti-Withholding Reward System to Secure Blockchain Mining Pools. CVCBT 2019: 43-46
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint