Judmayer, Aljosha
18  Ergebnisse:
Personensuche X
?
1

Estimating (Miner) Extractable Value is Hard, Let's Go Shop..:

, In: Financial Cryptography and Data Security. FC 2022 International Workshops; Lecture Notes in Computer Science,
 
?
2

How much is the fork? Fast Probability and Profitability Ca..:

, In: Companion Proceedings of the Web Conference 2022,
 
?
3

Challenges and Opportunities of Blockchain for Auditable Pr..:

, In: Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum; Lecture Notes in Business Information Processing,
 
?
4

Opportunistic Algorithmic Double-Spending:: How I Learned t..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
5

SoK: Algorithmic Incentive Manipulation Attacks on Permissi..:

, In: Lecture Notes in Computer Science; Financial Cryptography and Data Security. FC 2021 International Workshops,
 
?
6

Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Crypt..:

, In: Lecture Notes in Computer Science; Financial Cryptography and Data Security. FC 2021 International Workshops,
 
?
7

Unnecessary Input Heuristics and PayJoin Transactions:

, In: HCI International 2021 - Posters; Communications in Computer and Information Science,
Ghesmati, Simin ; Kern, Andreas ; Judmayer, Aljosha.. - p. 416-424 , 2021
 
?
8

HydRand: Efficient Continuous Distributed Randomness:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
 
?
9

Revisiting Practical Byzantine Fault Tolerance Through Bloc..:

, In: Security and Quality in Cyber-Physical Systems Engineering,
 
?
10

Echoes of the Past: Recovering Blockchain Metrics from Merg..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
 
?
11

Blockchain: Basics:

, In: Business Transformation through Blockchain,
 
?
12

Pitchforks in Cryptocurrencies:: Enforcing Rule Changes Thr..:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
 
?
13

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Coul..:

, In: Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science,
 
?
14

Lightweight Address Hopping for Defending the IPv6 IoT:

, In: Proceedings of the 12th International Conference on Availability, Reliability and Security,
 
?
15

Cryptographic Currencies Crash Course (C4) : Tutorial:

, In: Proceedings of the 25th International Conference Companion on World Wide Web,
Judmayer, Aljosha ; Weippl, Edgar - p. 1021-1024 , 2016
 
1-15