From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild., , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 426-446. Springer, (2014)Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus., , , , и . CCS, стр. 519-533. ACM, (2023)BFT Protocol Forensics., , , , и . CCS, стр. 1722-1743. ACM, (2021)Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security., , , , , и . CCS, стр. 2099-2113. ACM, (2022)Brief Announcement: Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults., , , и . PODC, стр. 375-377. ACM, (2021)On the Optimality of Optimistic Responsiveness., , , и . CCS, стр. 839-857. ACM, (2020)The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange., , , , , , , , , и 5 other автор(ы). IACR Cryptol. ePrint Arch., (2024)Decentralization of Ethereum's Builder Market., , и . CoRR, (2024)Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption., , , и . OPODIS, том 253 из LIPIcs, стр. 24:1-24:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Improved Extension Protocols for Byzantine Broadcast and Agreement., , , , и . DISC, том 179 из LIPIcs, стр. 28:1-28:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)