Personensuche
X
?
Proceedings of the 6th International COnference ,
1
Assessing the vulnerability of replicated network services:
, In:
?
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing ,
2
Surviving attacks on disruption-tolerant networks without a..:
, In:
?
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems ,
4
Bounding damage from link destruction, with application to ..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
8
Radium: Improving Dynamic PoW Targeting:
, In:
?
Proceedings of the ACM Special Interest Group on Data Communication ,
10
Graphene : efficient interactive set reconciliation appl..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
11
Bonded Mining: Difficulty Adjustment by Miner Commitment:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
15