Aviv Zohar
TitoloCitata daAnno
Secure high-rate transaction processing in bitcoin
Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 507-527, 2015
508*2015
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
3912015
Optimal selfish mining strategies in Bitcoin
A Sapirshtein, Y Sompolinsky, A Zohar
Financial Cryptography 2016, 2016
3202016
On bitcoin and red balloons
M Babaioff, S Dobzinski, S Oren, A Zohar
Proceedings of the 13th ACM conference on electronic commerce, 56-73, 2012
2492012
Inclusive block chain protocols
Y Lewenberg, Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 528-547, 2015
2112015
Hijacking bitcoin: Routing attacks on cryptocurrencies
M Apostolaki, A Zohar, L Vanbever
2017 IEEE Symposium on Security and Privacy (SP), 375-392, 2017
2062017
Bitcoin mining pools: A cooperative game theoretic analysis
Y Lewenberg, Y Bachrach, Y Sompolinsky, A Zohar, JS Rosenschein
Proceedings of the 2015 International Conference on Autonomous Agents and…, 2015
1482015
On the complexity of achieving proportional representation
AD Procaccia, JS Rosenschein, A Zohar
Social Choice and Welfare 30 (3), 353-362, 2008
1452008
SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
Y Sompolinsky, Y Lewenberg, A Zohar
IACR Cryptology ePrint Archive 2016, 1159, 2016
1362016
Bitcoin: under the hood
A Zohar
Communications of the ACM 58 (9), 104-113, 2015
1222015
Interdomain routing and games
H Levin, M Schapira, A Zohar
SIAM Journal on Computing 40 (6), 1892-1912, 2011
1062011
Complexity of strategic behavior in multi-winner elections
R Meir, AD Procaccia, JS Rosenschein, A Zohar
Journal of Artificial Intelligence Research 33, 149-178, 2008
1002008
Mechanisms for multi-level marketing
Y Emek, R Karidi, M Tennenholtz, A Zohar
Proceedings of the 12th ACM conference on Electronic commerce, 209-218, 2011
672011
Multi-winner elections: Complexity of manipulation, control and winner-determination
AD Procaccia, JS Rosenschein, A Zohar
Proceedings of the 20th International Joint Conference on Artificial…, 2007
622007
PHANTOM: A Scalable BlockDAG Protocol.
Y Sompolinsky, A Zohar
IACR Cryptology ePrint Archive 2018, 104, 2018
612018
Exploiting problem symmetries in state-based planners
N Pochter, A Zohar, JS Rosenschein
Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
612011
Searching for stability in interdomain routing
R Sami, M Schapira, A Zohar
INFOCOM 2009, IEEE, 549-557, 2009
602009
Bitcoin's security model revisited
Y Sompolinsky, A Zohar
arXiv preprint arXiv:1605.09193, 2016
512016
Best-response mechanisms
N Nisan, M Schapira, G Valiant, A Zohar
Proc. Second Syposium on Innovations in Computer Science (ICS). To Appear, 2011
49*2011
Search space reduction using swamp hierarchies
N Pochter, A Zohar, JS Rosenschein, A Felner
Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
422010
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20