Author of the publication

Echoes of the Past: Recovering Blockchain Metrics from Merged Mining.

, , , , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 527-549. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Judmayer, Aljosha
add a person with the name Judmayer, Aljosha
 

Other publications of authors with the same name

On the security of security extensions for IP-based KNX networks., , and . WFCS, page 1-10. IEEE, (2014)The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy., , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 555-580. Springer, (2016)A Performance Assessment of Network Address Shuffling in IoT Systems., , , , and . EUROCAST (1), volume 10671 of Lecture Notes in Computer Science, page 197-204. Springer, (2017)Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin., , , and . Sicherheit, volume P-256 of LNI, page 137-148. GI, (2016)Echoes of the Past: Recovering Blockchain Metrics from Merged Mining., , , , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 527-549. Springer, (2019)Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies., , , , , , , and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 533-549. Springer, (2021)HydRand: Efficient Continuous Distributed Randomness., , , and . SP, page 73-89. IEEE, (2020)Lightweight Address Hopping for Defending the IPv6 IoT., , , , and . ARES, page 20:1-20:10. ACM, (2017)Echoes of the Past: Recovering Blockchain Metrics From Merged Mining., , , , , and . IACR Cryptology ePrint Archive, (2018)Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper)., , , and . DPM/CBT@ESORICS, volume 11025 of Lecture Notes in Computer Science, page 197-206. Springer, (2018)