Author of the publication

Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts.

, , , , and . IEEE Secur. Priv., 16 (4): 30-37 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks., , , , and . Sensors, 17 (12): 2767 (2017)A Microwave Method for Dielectric Characterization Measurement of Small Liquids Using a Metamaterial-Based Sensor., , and . Sensors, 18 (5): 1438 (2018)Best Harmony, Unified RPCL and Automated Model Selection for Unsupervised and Supervised Learning on Gaussian Mixtures, Three-Layer Nets and ME-RBF-SVM Models.. Int. J. Neural Syst., 11 (1): 43-69 (2001)The neural mechanisms of semantic and response conflicts: An fMRI study of practice-related effects in the Stroop task., , , , and . NeuroImage, (2013)Errata to "BYY harmony learning, independent state space, and generalized apt financial analyses".. IEEE Trans. Neural Networks, 13 (4): 1023 (2002)BYY harmony learning, independent state space, and generalized APT financial analyses.. IEEE Trans. Neural Networks, 12 (4): 822-849 (2001)Research on the figure of merit for PVA nanofibrous membrane filters., , , , , and . NEMS, page 1002-1005. IEEE, (2010)Hardening Database Padding for Searchable Encryption., , , , and . INFOCOM, page 2503-2511. IEEE, (2019)Deep IA-BI and Five Actions in Circling.. IScIDE (1), volume 11935 of Lecture Notes in Computer Science, page 1-21. Springer, (2019)Effective Keyword Search for Candidate Fragments of XML Documents., , , , , and . DASFAA Workshops, volume 6637 of Lecture Notes in Computer Science, page 427-439. Springer, (2011)