Author of the publication

How to Vote Privately Using Bitcoin.

, and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 82-96. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intent recognition model based on sequential information and sentence features., , , and . Neurocomputing, (January 2024)On the Complexity of the Minimum Independent Set Partition Problem., , and . COCOON, volume 9198 of Lecture Notes in Computer Science, page 121-132. Springer, (2015)Ranking on Arbitrary Graphs: Rematch via Continuous Linear Programming., , , and . SIAM J. Comput., 47 (4): 1529-1546 (2018)Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks., , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)Power Grid Knowledge Graph Completion with Complex Structure Learning., , , , , , , and . ICIC (5), volume 14090 of Lecture Notes in Computer Science, page 669-679. Springer, (2023)How to Vote Privately Using Bitcoin., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 82-96. Springer, (2015)