Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof of Space from Stacked Expanders., and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 262-285. (2016)Global Asymptotic Stability of Periodic Solutions for Discrete Time Delayed BAM Neural Networks by Combining Coincidence Degree Theory with LMI Method., , and . Neural Processing Letters, 50 (2): 1321-1340 (2019)UAV control in 2D space based on brain computer interface., , , , and . ICSAI, page 594-598. IEEE, (2017)Integrity verification for path Oblivious-RAM., , , , and . HPEC, page 1-6. IEEE, (2013)Freecursive ORAM: Nearly Free Recursion and Integrity Verification for Position-based Oblivious RAM., , , , and . ASPLOS, page 103-116. ACM, (2015)Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs., , , , , and . HPCA, page 213-224. IEEE Computer Society, (2014)Practical Settlement Bounds for Proof-of-Work Blockchains., , and . IACR Cryptol. ePrint Arch., (2021)Bucket Oblivious Sort: An Extremely Simple Oblivious Sort., , , , , and . SOSA, page 8-14. SIAM, (2020)Multi-Threshold Byzantine Fault Tolerance., and . CCS, page 1686-1699. ACM, (2021)Constant Latency in Sleepy Consensus., and . CCS, page 2295-2308. ACM, (2022)