From post

When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.

, , и . Financial Cryptography Workshops, том 8976 из Lecture Notes in Computer Science, стр. 63-77. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Games of Timing for Security in Dynamic Environments., , и . GameSec, том 9406 из Lecture Notes in Computer Science, стр. 57-73. Springer, (2015)Execution and analysis of high-level tasks with dynamic obstacle anticipation., , , и . ICRA, стр. 330-337. IEEE, (2012)Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique., , , и . PhyCS, стр. 44-51. SciTePress, (2015)A New Approach to Temporal Planning with Rich Metric Temporal Properties., , , и . ICAPS, стр. 288-296. AAAI Press, (2017)On the Assessment of Systematic Risk in Networked Systems., , и . ACM Trans. Internet Techn., 18 (4): 48:1-48:28 (2018)I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves., , , и . Financial Cryptography Workshops, том 7862 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2013)Learning to Estimate: A Case-Based Approach to Task Execution Prediction., , , , , и . ICCBR, том 9343 из Lecture Notes in Computer Science, стр. 15-29. Springer, (2015)When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools., , и . Financial Cryptography Workshops, том 8976 из Lecture Notes in Computer Science, стр. 63-77. Springer, (2015)Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game., , и . GameSec, том 8252 из Lecture Notes in Computer Science, стр. 175-191. Springer, (2013)Exponential discounting in security games of timing., , , и . J. Cybersecur., (2021)