Author of the publication

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.

, , , , and . CCS, page 195-209. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing SIM Box Fraud Using Device Model Fingerprinting., , , , , , and . NDSS, The Internet Society, (2023)GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier., , and . NDSS, The Internet Society, (2018)Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous., , , and . NDSS, The Internet Society, (2012)One-Way Indexing for Plausible Deniability in Censorship Resistant Storage., , , and . FOCI, USENIX Association, (2012)Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE., , , , , and . USENIX Security Symposium, page 55-72. USENIX Association, (2019)Frying PAN: Dissecting Customized Protocol for Personal Area Network., , , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 300-312. Springer, (2015)Secure Group Services for Storage Area Networks., , , and . IEEE Security in Storage Workshop, page 80-93. IEEE Computer Society, (2002)Combating Double-Spending Using Cooperative P2P Systems., , , and . ICDCS, page 41. IEEE Computer Society, (2007)LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , and . WISEC, page 43-48. ACM, (2023)Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications., , , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 445-467. Springer, (2017)