Author of the publication

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.

, , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 241-258. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Co-location Patterns in Incremental Spatial Databases., , and . BigComp, page 141-148. IEEE, (2022)Transcranial direct current stimulation and EEG-based motor imagery BCI for upper limb stroke rehabilitation., , , , , , and . EMBC, page 4128-4131. IEEE, (2012)Protecting vehicular networks privacy in the presence of a single adversarial authority., , , and . CNS, page 1-9. IEEE, (2017)Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners., , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 241-258. Springer, (2019)Production planning and quality of service allocation across the supply chain in a dynamic lead time model., , and . CDC, page 7137-7144. IEEE, (2009)Spatial Exact Match Query Based on the NA-Tree Approach in P2P Systems., , and . IEA/AIE, volume 5579 of Lecture Notes in Computer Science, page 409-418. Springer, (2009)Data Classification Based on the Class-Rooted FP-Tree Approach., , , and . CISIS, page 506-511. IEEE Computer Society, (2009)Design of path-based multicast routing protocol in MANET., , and . PM2HW2N, page 131-136. ACM, (2008)Management of multiplexed ATM connection over WiMax network., , , and . APNOMS, page 1-5. IEEE, (2011)Range Queries Based on a Structured Segment Tree in P2P Systems., , , and . ECBS, page 91-99. IEEE Computer Society, (2010)