Author of the publication

(Invited Paper) on the Security of Blockchain Consensus Protocols.

, , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 465-480. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Power of Randomization in Distributed Algorithms in Dynamic Networks with Adaptive Adversaries., , and . Euro-Par, volume 12247 of Lecture Notes in Computer Science, page 376-391. Springer, (2020)Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains., and . SP, page 2481-2498. IEEE, (2023)Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains., , and . SP, page 1263-1280. IEEE, (2022)CHP-based DG allocation considering the operation constraints of heating and gas systems., , , , , and . ICSAI, page 301-305. IEEE, (2016)Claytronics: highly scalable communications, sensing, and actuation networks., , , , , , , , , and 11 other author(s). SenSys, page 299. ACM, (2005)DRAM-Page Based Prediction and Prefetching., and . ICCD, page 267-275. IEEE Computer Society, (2000)Economic Analysis Model of Battery Energy Storage System based on Long-short-term Memory Neural Network Algorithm., , , , , , , , and . IoTAAI, page 313-317. ACM, (2023)The Cost of Unknown Diameter in Dynamic Networks., , and . SPAA, page 405-416. ACM, (2016)Sustaining collaboration in multicast despite rational collusion., , and . PODC, page 337-338. ACM, (2011)Signed quorum systems.. PODC, page 246-255. ACM, (2004)