Aviv Zohar
Title
Cited by
Cited by
Year
Secure high-rate transaction processing in bitcoin
Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 507-527, 2015
603*2015
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
4452015
Optimal selfish mining strategies in Bitcoin
A Sapirshtein, Y Sompolinsky, A Zohar
Financial Cryptography 2016, 2016
3782016
On bitcoin and red balloons
M Babaioff, S Dobzinski, S Oren, A Zohar
Proceedings of the 13th ACM conference on electronic commerce, 56-73, 2012
2672012
Hijacking bitcoin: Routing attacks on cryptocurrencies
M Apostolaki, A Zohar, L Vanbever
2017 IEEE Symposium on Security and Privacy (SP), 375-392, 2017
2532017
Inclusive block chain protocols
Y Lewenberg, Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 528-547, 2015
2372015
Bitcoin mining pools: A cooperative game theoretic analysis
Y Lewenberg, Y Bachrach, Y Sompolinsky, A Zohar, JS Rosenschein
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
1752015
SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
Y Sompolinsky, Y Lewenberg, A Zohar
IACR Cryptol. ePrint Arch. 2016, 1159, 2016
1592016
On the complexity of achieving proportional representation
AD Procaccia, JS Rosenschein, A Zohar
Social Choice and Welfare 30 (3), 353-362, 2008
1582008
Bitcoin: under the hood
A Zohar
Communications of the ACM 58 (9), 104-113, 2015
1412015
Interdomain routing and games
H Levin, M Schapira, A Zohar
SIAM Journal on Computing 40 (6), 1892-1912, 2011
1082011
Complexity of strategic behavior in multi-winner elections
R Meir, AD Procaccia, JS Rosenschein, A Zohar
Journal of Artificial Intelligence Research 33, 149-178, 2008
1032008
Mechanisms for multi-level marketing
Y Emek, R Karidi, M Tennenholtz, A Zohar
Proceedings of the 12th ACM conference on Electronic commerce, 209-218, 2011
792011
PHANTOM: A Scalable BlockDAG Protocol.
Y Sompolinsky, A Zohar
IACR Cryptol. ePrint Arch. 2018, 104, 2018
772018
Multi-winner elections: Complexity of manipulation, control and winner-determination
AD Procaccia, JS Rosenschein, A Zohar
Proceedings of the 20th International Joint Conference on Artificial …, 2007
672007
Exploiting problem symmetries in state-based planners
N Pochter, A Zohar, JS Rosenschein
Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
652011
Bitcoin's security model revisited
Y Sompolinsky, A Zohar
arXiv preprint arXiv:1605.09193, 2016
602016
Searching for stability in interdomain routing
R Sami, M Schapira, A Zohar
INFOCOM 2009, IEEE, 549-557, 2009
602009
Best-response mechanisms
N Nisan, M Schapira, G Valiant, A Zohar
Proc. Second Syposium on Innovations in Computer Science (ICS). To Appear, 2011
49*2011
Search space reduction using swamp hierarchies
N Pochter, A Zohar, JS Rosenschein, A Felner
Third Annual Symposium on Combinatorial Search, 2010
412010
The system can't perform the operation now. Try again later.
Articles 1–20