From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Incentives for Extortion in Proof of Stake Consensus Protocols., , , , и . DBB, том 541 из Lecture Notes in Networks and Systems, стр. 109-118. Springer, (2022)Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators., , , , и . ARES, стр. 105:1-105:11. ACM, (2023)A DLT-based Smart Contract Architecture for Atomic and Scalable Trading., , , , и . CoRR, (2021)ZKP Enabled Identity and Reputation Verification in P2P Marketplaces., , , и . Blockchain, стр. 591-598. IEEE, (2024)RansomClave: Ransomware Key Management using SGX., , , и . ARES, стр. 58:1-58:10. ACM, (2021)Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators., и . IACR Cryptology ePrint Archive, (2017)Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification., и . SSR, том 11322 из Lecture Notes in Computer Science, стр. 143-163. Springer, (2018)Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism., , , , и . COINS, стр. 1-6. IEEE, (2022)Revoke: Mitigating Ransomware Attacks Against Ethereum Validators., , и . ESORICS (4), том 14985 из Lecture Notes in Computer Science, стр. 333-353. Springer, (2024)Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM., , и . IWSSIP, стр. 81-84. IEEE, (2015)