Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short Paper: Service-Oriented Sharding for Blockchains., , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 393-401. Springer, (2017)Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols., , , , , and . ACM Conference on Computer and Communications Security, page 2387-2402. ACM, (2019)Enabling Strong Database Integrity using Trusted Execution Environments., , and . CoRR, (2018)Peer-to-Peer Authentication with a Distributed Single Sign-On Service., , and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 250-258. Springer, (2004)AntFarm: Efficient Content Distribution with Managed Swarms., and . NSDI, page 107-122. USENIX Association, (2009)SoK: A Classification Framework for Stablecoin Designs., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 174-197. Springer, (2020)A content propagation metric for efficient content distribution., , and . SIGCOMM, page 326-337. ACM, (2011)An access control language for web services., and . SACMAT, page 23-30. ACM, (2002)Bitcoin Covenants., , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 126-141. Springer, (2016)Managing the network with Merlin., , , , and . HotNets, page 24:1-24:7. ACM, (2013)