Search for persons
X
?
Financial Cryptography and Data Security. FC 2022 International Workshops; Lecture Notes in Computer Science ,
1
Estimating (Miner) Extractable Value is Hard, Let's Go Shop..:
, In:
?
Companion Proceedings of the Web Conference 2022 ,
2
How much is the fork? Fast Probability and Profitability Ca..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
3
Opportunistic Algorithmic Double-Spending:: How I Learned t..:
, In:
?
Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum; Lecture Notes in Business Information Processing ,
4
Challenges and Opportunities of Blockchain for Auditable Pr..:
, In:
?
Lecture Notes in Computer Science; Financial Cryptography and Data Security. FC 2021 International Workshops ,
5
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Crypt..:
, In:
?
Lecture Notes in Business Information Processing; Business Process Management: Blockchain and Robotic Process Automation Forum ,
6
Methods for Decentralized Identities: Evaluation and Insigh..:
, In:
?
HCI International 2021 - Posters; Communications in Computer and Information Science ,
7
Unnecessary Input Heuristics and PayJoin Transactions:
, In:
?
Lecture Notes in Computer Science; Financial Cryptography and Data Security. FC 2021 International Workshops ,
8
SoK: Algorithmic Incentive Manipulation Attacks on Permissi..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
9
HydRand: Efficient Continuous Distributed Randomness:
, In:
?
Security and Quality in Cyber-Physical Systems Engineering ,
10
Revisiting Practical Byzantine Fault Tolerance Through Bloc..:
, In:
?
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) ,
11
Avoiding Risky Designs When Using Blockchain Technologies i..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
12
Echoes of the Past: Recovering Blockchain Metrics from Merg..:
, In:
?
Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science ,
13
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Coul..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
14