Author of the publication

Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms

, , , and . Synthesis Lectures on Information Security, Privacy, and Trust, 9 (1): 1-123 (2017)
DOI: 10.2200/S00773ED1V01Y201704SPT020

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Internet, One HTTP 200 OK at a Time., , , and . ;login:, (2017)Hand Dynamics for Behavioral User Authentication., , , and . ARES, page 389-398. IEEE Computer Society, (2016)Automated Analysis of Underground Marketplaces., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 31-42. Springer, (2014)Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices., , and . SOUPS, page 207-219. USENIX Association, (2016)WhiteNet: Phishing Website Detection by Visual Whitelists., , and . CoRR, (2019)"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS., , , , and . IEEE Symposium on Security and Privacy, page 246-263. IEEE, (2019)Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness., , and . TRUST, volume 9824 of Lecture Notes in Computer Science, page 40-59. Springer, (2016)A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research., , , , , , , and . ACM Trans. Comput. Hum. Interact., 28 (6): 43:1-43:50 (2021)Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations., , , and . Digit. Investig., 11 (4): 336-348 (2014)Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches., , , and . CoRR, (2019)