Aljosha Judmayer
Aljosha Judmayer
PhD Student at TU Wien and researcher at SBA Research
Verified email at 3-volution.net - Homepage
Title
Cited by
Cited by
Year
The other side of the coin: User experiences with bitcoin security and privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
International conference on financial cryptography and data security, 555-580, 2016
892016
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 9 (1), 1-123, 2017
672017
Merged mining: Curse or cure?
A Judmayer, A Zamyatin, N Stifter, AG Voyiatzis, E Weippl
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 316-333, 2017
532017
A wild velvet fork appears! inclusive blockchain protocol changes in practice
A Zamyatin, N Stifter, A Judmayer, P Schindler, E Weippl, WJ Knottenbelt
International Conference on Financial Cryptography and Data Security, 31-42, 2018
452018
Agreement with satoshi–on the formalization of nakamoto consensus
N Stifter, A Judmayer, P Schindler, A Zamyatin, E Weippl
302018
A deep dive into bitcoin mining pools: An empirical analysis of mining shares
M Romiti, A Judmayer, A Zamyatin, B Haslhofer
arXiv preprint arXiv:1905.05999, 2019
242019
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gazi, S Meiklejohn, ...
IACR Cryptol. ePrint Arch. 2019, 775, 2019
232019
Hydrand: Practical continuous distributed randomness
P Schindler, A Judmayer, N Stifter, E Weippl
222020
Pitchforks in cryptocurrencies
A Judmayer, N Stifter, P Schindler, E Weippl
Data privacy management, cryptocurrencies and blockchain technology, 197-206, 2018
182018
On the security of security extensions for IP-based KNX networks
A Judmayer, L Krammer, W Kastner
2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), 1-10, 2014
152014
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts.
P Schindler, A Judmayer, N Stifter, ER Weippl
IACR Cryptol. ePrint Arch. 2019, 985, 2019
112019
Hydrand: Efficient continuous distributed randomness
P Schindler, A Judmayer, N Stifter, E Weippl
2020 IEEE Symposium on Security and Privacy (SP), 73-89, 2020
92020
Lightweight address hopping for defending the IPv6 IoT
A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl
Proceedings of the 12th international conference on availability …, 2017
82017
& Weippl, E.(2019)
A Judmayer, N Stifter, A Zamyatin, I Tsabary, I Eyal, P Gaži
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies, 0
8
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids
J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
62018
Echoes of the past: Recovering blockchain metrics from merged mining
N Stifter, P Schindler, A Judmayer, A Zamyatin, A Kern, E Weippl
International Conference on Financial Cryptography and Data Security, 527-549, 2019
52019
A holistic approach to smart contract security
N Stifter, A Judmayer, E Weippl
Blockchain Engineering, 17, 2017
42017
Condensed cryptographic currencies crash course (c5)
A Judmayer, E Weippl
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
42016
Randrunner: Distributed randomness from trapdoor vdfs with strong uniqueness
P Schindler, A Judmayer, M Hittmeir, N Stifter, E Weippl
32021
Revisiting practical byzantine fault tolerance through blockchain technologies
N Stifter, A Judmayer, E Weippl
Security and Quality in Cyber-Physical Systems Engineering, 471-495, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20