Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACeD: Scalable Data Availability Oracle., , , and . CoRR, (2020)ACeD: Scalable Data Availability Oracle., , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 299-318. Springer, (2021)TrustBoost: Boosting Trust among Interoperable Blockchains., , , , and . CCS, page 1571-1584. ACM, (2023)Player-Replaceability and Forensic Support Are Two Sides of the Same (Crypto) Coin., , , , and . FC (1), volume 13950 of Lecture Notes in Computer Science, page 56-74. Springer, (2023)BFT Protocol Forensics., , , , and . CoRR, (2020)GANs for Children: A Generative Data Augmentation Strategy for Children Speech Recognition., , and . ASRU, page 129-135. IEEE, (2019)Data Augmentation using Conditional Generative Adversarial Networks for Robust Speech Recognition., , , , and . ISCSLP, page 121-125. IEEE, (2018)Proof of Diligence: Cryptoeconomic Security for Rollups., , , and . CoRR, (2024)Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin., , , , and . IACR Cryptol. ePrint Arch., (2022)Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth., , , , , , and . CoRR, (2022)