Author of the publication

When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.

, , and . IEEE Secur. Priv., 16 (4): 46-56 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving User Matching., and . WPES@CCS, page 111-120. ACM, (2015)On Bitcoin Security in the Presence of Broken Cryptographic Primitives., , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 201-222. Springer, (2016)Optimal routing with failure-independent path protection., , , , and . Networks, 55 (2): 125-137 (2010)SecNav: secure broadcast localization and time synchronization in wireless networks., , and . MobiCom, page 310-313. ACM, (2007)Attacks on public WLAN-based positioning systems., , , and . MobiSys, page 29-40. ACM, (2009)Implications of radio fingerprinting on the security of sensor networks., and . SecureComm, page 331-340. IEEE, (2007)SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network., , and . CODASPY, page 271-282. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android., , and . NDSS, The Internet Society, (2019)Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications., and . PST, page 1-10. IEEE Computer Society, (2018)Realization of RF Distance Bounding., and . USENIX Security Symposium, page 389-402. USENIX Association, (2010)