关注
Aljosha Judmayer
Aljosha Judmayer
PhD Student at TU Wien, researcher at University of Vienna & SBA Research
在 3-volution.net 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
The other side of the coin: User experiences with bitcoin security and privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
1872017
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Springer Nature, 2022
1242022
Hydrand: Efficient continuous distributed randomness
P Schindler, A Judmayer, N Stifter, E Weippl
2020 IEEE Symposium on Security and Privacy (SP), 73-89, 2020
1122020
Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
Cryptology ePrint Archive, 2019
78*2019
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice: (Short Paper)
A Zamyatin, N Stifter, A Judmayer, P Schindler, E Weippl, WJ Knottenbelt
Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019
782019
A deep dive into bitcoin mining pools: An empirical analysis of mining shares
M Romiti, A Judmayer, A Zamyatin, B Haslhofer
arXiv preprint arXiv:1905.05999, 2019
742019
Merged mining: Curse or cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017
582017
Randrunner: Distributed randomness from trapdoor vdfs with strong uniqueness
P Schindler, A Judmayer, M Hittmeir, N Stifter, E Weippl
492021
Ethdkg: Distributed key generation with ethereum smart contracts
P Schindler, A Judmayer, N Stifter, E Weippl
Cryptology ePrint Archive, 2019
472019
Agreement with satoshi–on the formalization of nakamoto consensus
N Stifter, A Judmayer, P Schindler, A Zamyatin, E Weippl
Cryptology ePrint Archive, 2018
462018
Revisiting practical byzantine fault tolerance through blockchain technologies
N Stifter, A Judmayer, E Weippl
Security and Quality in Cyber-Physical Systems Engineering: With Forewords …, 2019
232019
Estimating (miner) extractable value is hard, let’s go shopping!
A Judmayer, N Stifter, P Schindler, E Weippl
International Conference on Financial Cryptography and Data Security, 74-92, 2022
192022
Sok: Algorithmic incentive manipulation attacks on permissionless pow cryptocurrencies
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži, S Meiklejohn, ...
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
192021
On the security of security extensions for IP-based KNX networks
A Judmayer, L Krammer, W Kastner
2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), 1-10, 2014
192014
Lightweight address hopping for defending the IPv6 IoT
A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl
Proceedings of the 12th international conference on availability …, 2017
172017
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking-and
A Judmayer, N Stifter, P Schindler, E Weippl
17*
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids
J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
132018
Echoes of the past: Recovering blockchain metrics from merged mining
N Stifter, P Schindler, A Judmayer, A Zamyatin, A Kern, E Weippl
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
72019
What is meant by permissionless blockchains?
N Stifter, A Judmayer, P Schindler, A Kern, W Fdhila
Cryptology ePrint Archive, 2021
62021
Distributed key generation with Ethereum smart contracts
P Schindler, A Judmayer, N Stifter, E Weippl
CIW’19: Cryptocurrency Implementers’ Workshop, 2019
62019
系统目前无法执行此操作,请稍后再试。
文章 1–20