Author of the publication

Bitcoin Security Under Temporary Dishonest Majority.

, , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 466-483. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Brick: Asynchronous State Channels., , and . CoRR, (2019)Impatient Online Matching., , , and . ISAAC, volume 123 of LIPIcs, page 62:1-62:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Latency and Consistent Flow Migration: Relax for Lossless Updates., , and . Networking, page 1-9. IEEE, (2019)How Live Streaming Changes Shopping Decisions in E-commerce: A Study of Live Streaming Commerce., , , , , and . Comput. Support. Cooperative Work., 31 (4): 701-729 (2022)Computational Social Dynamics (Dagstuhl Seminar 22452)., , , and . Dagstuhl Reports, 12 (11): 28-44 (November 2022)Gay Dating on Non-dating Platforms: The Case of Online Dating Activities of Gay Men on a Q&A Platform., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-23 (2022)Wireless evacuation on m rays with k searchers., , , and . Theor. Comput. Sci., (2020)Lower and upper competitive bounds for online directed graph exploration., and . Theor. Comput. Sci., (2016)On Identifiability in Transformers., , , , , and . ICLR, OpenReview.net, (2020)Medley2K: A Dataset of Medley Transitions., , , , , and . CoRR, (2020)