Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild., , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 426-446. Springer, (2014)Improved Extension Protocols for Byzantine Broadcast and Agreement., , , , and . DISC, volume 179 of LIPIcs, page 28:1-28:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus., , , , and . CCS, page 519-533. ACM, (2023)BFT Protocol Forensics., , , , and . CCS, page 1722-1743. ACM, (2021)Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security., , , , , and . CCS, page 2099-2113. ACM, (2022)On the Optimality of Optimistic Responsiveness., , , and . CCS, page 839-857. ACM, (2020)Brief Announcement: Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults., , , and . PODC, page 375-377. ACM, (2021)Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption., , , and . OPODIS, volume 253 of LIPIcs, page 24:1-24:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Asymptotically Tight Bounds for Composing ORAM with PIR., , , , and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 91-120. Springer, (2017)Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions., , , and . ITC, volume 199 of LIPIcs, page 8:1-8:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)