Enforcing location and time-based access control on cloud-stored dataElli AndroulakiClaudio Sorienteet al.2014ICDCS 2014
Physical-layer identification of RFID devicesBoris DanevThomas S. Heydt-Benjaminet al.2009USENIX Security 2009
Misbehavior in Bitcoin: A study of double-spending and accountabilityGhassan O. KarameElli Androulakiet al.2015ACM TISSEC