no code implementations • 4 Feb 2021 • Enes Erdin, Suat Mercan, Kemal Akkaya
After discussing several emerging attacks on user/business privacy in these payment channel networks, we qualitatively evaluate them based on a number of privacy metrics that relate to our case.
Cryptography and Security
no code implementations • 4 Feb 2021 • Suat Mercan, Ahmet Kurt, Enes Erdin, Kemal Akkaya
The successful amalgamation of cryptocurrency and consumer Internet of Things (IoT) devices can pave the way for novel applications in machine-to-machine economy.
Cryptography and Security
no code implementations • 30 Apr 2020 • Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, Selcuk Uluagac
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments.