Aviv Zohar
Title
Cited by
Cited by
Year
Secure high-rate transaction processing in bitcoin
Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 507-527, 2015
550*2015
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
4072015
Optimal selfish mining strategies in Bitcoin
A Sapirshtein, Y Sompolinsky, A Zohar
Financial Cryptography 2016, 2016
3392016
On bitcoin and red balloons
M Babaioff, S Dobzinski, S Oren, A Zohar
Proceedings of the 13th ACM conference on electronic commerce, 56-73, 2012
2542012
Hijacking bitcoin: Routing attacks on cryptocurrencies
M Apostolaki, A Zohar, L Vanbever
2017 IEEE Symposium on Security and Privacy (SP), 375-392, 2017
2242017
Inclusive block chain protocols
Y Lewenberg, Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 528-547, 2015
2172015
Bitcoin mining pools: A cooperative game theoretic analysis
Y Lewenberg, Y Bachrach, Y Sompolinsky, A Zohar, JS Rosenschein
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
1612015
On the complexity of achieving proportional representation
AD Procaccia, JS Rosenschein, A Zohar
Social Choice and Welfare 30 (3), 353-362, 2008
1492008
SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
Y Sompolinsky, Y Lewenberg, A Zohar
IACR Cryptology ePrint Archive 2016, 1159, 2016
1462016
Bitcoin: under the hood
A Zohar
Communications of the ACM 58 (9), 104-113, 2015
1282015
Interdomain routing and games
H Levin, M Schapira, A Zohar
SIAM Journal on Computing 40 (6), 1892-1912, 2011
1082011
Complexity of strategic behavior in multi-winner elections
R Meir, AD Procaccia, JS Rosenschein, A Zohar
Journal of Artificial Intelligence Research 33, 149-178, 2008
1012008
Mechanisms for multi-level marketing
Y Emek, R Karidi, M Tennenholtz, A Zohar
Proceedings of the 12th ACM conference on Electronic commerce, 209-218, 2011
712011
PHANTOM: A Scalable BlockDAG Protocol.
Y Sompolinsky, A Zohar
IACR Cryptology ePrint Archive 2018, 104, 2018
672018
Multi-winner elections: Complexity of manipulation, control and winner-determination
AD Procaccia, JS Rosenschein, A Zohar
Proceedings of the 20th International Joint Conference on Artificial …, 2007
652007
Exploiting problem symmetries in state-based planners
N Pochter, A Zohar, JS Rosenschein
Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
622011
Searching for stability in interdomain routing
R Sami, M Schapira, A Zohar
INFOCOM 2009, IEEE, 549-557, 2009
612009
Bitcoin's security model revisited
Y Sompolinsky, A Zohar
arXiv preprint arXiv:1605.09193, 2016
542016
Best-response mechanisms
N Nisan, M Schapira, G Valiant, A Zohar
Proc. Second Syposium on Innovations in Computer Science (ICS). To Appear, 2011
49*2011
Search space reduction using swamp hierarchies
N Pochter, A Zohar, JS Rosenschein, A Felner
Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
422010
The system can't perform the operation now. Try again later.
Articles 1–20