Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks., , , , , and . IACR Cryptol. ePrint Arch., (2021)ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution., , , and . IACR Cryptol. ePrint Arch., (2024)Online Admission Control and Rebalancing in Payment Channel Networks., , , , , and . CoRR, (2022)Weighted Packet Selection for Rechargeable Links in Cryptocurrency Networks: Complexity and Approximation., , and . SIROCCO, volume 13892 of Lecture Notes in Computer Science, page 576-594. Springer, (2023)Weighted Packet Selection for Rechargeable Links: Complexity and Approximation., , and . CoRR, (2022)Lightning Creation Games., , , and . ICDCS, page 1-11. IEEE, (2023)Route Discovery in Private Payment Channel Networks., , , , , and . IACR Cryptol. ePrint Arch., (2021)R2: Boosting Liquidity in Payment Channel Networks with Online Admission Control., , , , , and . FC (1), volume 13950 of Lecture Notes in Computer Science, page 309-325. Springer, (2023)Trojan-Resilience Without Cryptography., , , , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 397-428. Springer, (2021)Inverse-Sybil Attacks in Automated Contact Tracing., , , , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 399-421. Springer, (2021)