Aviv Zohar

According to our database1, Aviv Zohar authored at least 61 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Redesigning Bitcoin's fee market.
Proceedings of the World Wide Web Conference, 2019

2018
PHANTOM: A Scalable BlockDAG Protocol.
IACR Cryptology ePrint Archive, 2018

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction.
CoRR, 2018

Database Perspectives on Blockchains.
CoRR, 2018

Bitcoin's underlying incentives.
Commun. ACM, 2018

Avoiding Deadlocks in Payment Channel Networks.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Bitcoin's Underlying Incentives.
ACM Queue, 2017

How to Charge Lightning.
CoRR, 2017

Redesigning Bitcoin's fee market.
CoRR, 2017

Recent trends in decentralized cryptocurrencies (invited talk).
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Securing and scaling cryptocurrencies.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Memory-Based Mechanisms for Economic Agents.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
The Axiomatic Approach and the Internet.
Proceedings of the Handbook of Computational Social Choice, 2016

SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
IACR Cryptology ePrint Archive, 2016

Bitcoin's Security Model Revisited.
CoRR, 2016

Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies.
CoRR, 2016

Online Pricing with Strategic and Patient Buyers.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Optimal Selfish Mining Strategies in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Eclipse Attacks on Bitcoin's Peer-to-Peer Network.
IACR Cryptology ePrint Archive, 2015

Optimal Selfish Mining Strategies in Bitcoin.
CoRR, 2015

An Axiomatic Approach to Routing.
Proceedings of the Proceedings Fifteenth Conference on Theoretical Aspects of Rationality and Knowledge, 2015

Bitcoin: under the hood.
Commun. ACM, 2015

Eclipse Attacks on Bitcoin's Peer-to-Peer Network.
Proceedings of the 24th USENIX Security Symposium, 2015

Secure High-Rate Transaction Processing in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

Inclusive Block Chain Protocols.
Proceedings of the Financial Cryptography and Data Security, 2015

Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

An Axiomatic Approach to Link Prediction.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2013
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains.
IACR Cryptology ePrint Archive, 2013

2012
Economics of BitTorrent communities.
Proceedings of the 21st World Wide Web Conference 2012, 2012

On bitcoin and red balloons.
Proceedings of the 13th ACM Conference on Electronic Commerce, 2012

2011
When is it best to best-respond?
SIGecom Exchanges, 2011

On Bitcoin and red balloons.
SIGecom Exchanges, 2011

Interdomain Routing and Games.
SIAM J. Comput., 2011

On Bitcoin and Red Balloons
CoRR, 2011

Best-response auctions.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Mechanisms for multi-level marketing.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Incentive-compatible distributed greedy protocols.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Best-Response Mechanisms.
Proceedings of the Innovations in Computer Science, 2011

Exploiting Problem Symmetries in State-Based Planners.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Search Space Reduction Using Swamp Hierarchies.
Proceedings of the Third Annual Symposium on Combinatorial Search, 2010

Incentive compatibility and dynamics of congestion control.
Proceedings of the SIGMETRICS 2010, 2010

Search Space Reduction Using Swamp Hierarchies.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Competing Schedulers.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
The learnability of voting rules.
Artif. Intell., 2009

Searching for Stability in Interdomain Routing.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Adding incentives to file-sharing systems.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Learning equilibria in repeated congestion games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Using swamps to improve optimal pathfinding.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
On the complexity of achieving proportional representation.
Social Choice and Welfare, 2008

Complexity of Strategic Behavior in Multi-Winner Elections.
J. Artif. Intell. Res., 2008

Mechanisms for information elicitation.
Artif. Intell., 2008

Asynchronous Best-Reply Dynamics.
Proceedings of the Internet and Network Economics, 4th International Workshop, 2008

Interdomain routing and games.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Automated design of scoring rules by learning from examples.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination.
Proceedings of the IJCAI 2007, 2007

Learning Voting Trees.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Robust mechanisms for information elicitation.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Robust Mechanisms for Information Elicitation.
Proceedings of the Proceedings, 2006

Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth.
Proceedings of the Proceedings, 2006

2005
Using tags to evolve trust and cooperation between groups.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005


  Loading...