Author of the publication

Bernoulli Meets PBFT: Modeling BFT Protocols in the Presence of Dynamic Failures.

, , and . FedCSIS, volume 25 of Annals of Computer Science and Information Systems, page 291-300. (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BBBlockchain: Blockchain-Based Participation in Urban Development., , , and . eScience, page 321-330. IEEE, (2019)Managing Latency and Excess Data Dissemination in Fog-Based Publish/Subscribe Systems., , , and . ICFC, page 9-16. IEEE, (2020)Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks., and . AFT, page 214-227. ACM, (2020)Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges., , , and . ACM Trans. Internet Techn., 22 (4): 97:1-97:30 (November 2022)Empirical Analysis of On-chain Voting with Smart Contracts., and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 397-412. Springer, (2021)On the Impact of Attachment Strategies for Payment Channel Networks., , and . IEEE ICBC, page 1-9. IEEE, (2021)Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays., , and . LCN, page 320-323. IEEE Computer Society, (2010)Webchain: Verifiable Citations and References for the World Wide Web., , and . iThings/GreenCom/CPSCom/SmartData, page 1367-1372. IEEE, (2018)Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees., , and . ARES, page 31:1-31:6. ACM, (2021)Quantifying the Re-identification Risk of Event Logs for Process Mining., , , , , , , and . CoRR, (2020)