Aviv Zohar

According to our database1, Aviv Zohar authored at least 60 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020

Optimizing Off-Chain Payment Networks in Cryptocurrencies.
CoRR, 2020

Flood & Loot: A Systemic Attack On The Lightning Network.
CoRR, 2020

Pricing ASICs for Cryptocurrency Mining.
CoRR, 2020

Congestion Attacks in Payment Channel Networks.
CoRR, 2020

Reasoning about the Future in Blockchain Databases.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

SOK: cryptocurrency networking context, state-of-the-art, challenges.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff.
CoRR, 2019

Redesigning Bitcoin's fee market.
Proceedings of the World Wide Web Conference, 2019

2018
PHANTOM: A Scalable BlockDAG Protocol.
IACR Cryptol. ePrint Arch., 2018

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction.
CoRR, 2018

Database Perspectives on Blockchains.
CoRR, 2018

Bitcoin's underlying incentives.
Commun. ACM, 2018

Avoiding Deadlocks in Payment Channel Networks.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
How to Charge Lightning.
CoRR, 2017

Recent trends in decentralized cryptocurrencies (invited talk).
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Securing and scaling cryptocurrencies.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Memory-Based Mechanisms for Economic Agents.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
The Axiomatic Approach and the Internet.
Proceedings of the Handbook of Computational Social Choice, 2016

SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
IACR Cryptol. ePrint Arch., 2016

Bitcoin's Security Model Revisited.
CoRR, 2016

Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies.
CoRR, 2016

Online Pricing with Strategic and Patient Buyers.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Optimal Selfish Mining Strategies in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Eclipse Attacks on Bitcoin's Peer-to-Peer Network.
IACR Cryptol. ePrint Arch., 2015

An Axiomatic Approach to Routing.
Proceedings of the Proceedings Fifteenth Conference on Theoretical Aspects of Rationality and Knowledge, 2015

Bitcoin: under the hood.
Commun. ACM, 2015

Secure High-Rate Transaction Processing in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

Inclusive Block Chain Protocols.
Proceedings of the Financial Cryptography and Data Security, 2015

Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

An Axiomatic Approach to Link Prediction.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2013
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains.
IACR Cryptol. ePrint Arch., 2013

2012
Economics of BitTorrent communities.
Proceedings of the 21st World Wide Web Conference 2012, 2012

2011
When is it best to best-respond?
SIGecom Exch., 2011

On Bitcoin and red balloons.
SIGecom Exch., 2011

Interdomain Routing and Games.
SIAM J. Comput., 2011

Best-response auctions.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Mechanisms for multi-level marketing.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Incentive-compatible distributed greedy protocols.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Best-Response Mechanisms.
Proceedings of the Innovations in Computer Science, 2011

Exploiting Problem Symmetries in State-Based Planners.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Incentive compatibility and dynamics of congestion control.
Proceedings of the SIGMETRICS 2010, 2010

Search Space Reduction Using Swamp Hierarchies.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Competing Schedulers.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
The learnability of voting rules.
Artif. Intell., 2009

Searching for Stability in Interdomain Routing.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Adding incentives to file-sharing systems.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Learning equilibria in repeated congestion games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Using swamps to improve optimal pathfinding.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
On the complexity of achieving proportional representation.
Soc. Choice Welf., 2008

Complexity of Strategic Behavior in Multi-Winner Elections.
J. Artif. Intell. Res., 2008

Mechanisms for information elicitation.
Artif. Intell., 2008

Asynchronous Best-Reply Dynamics.
Proceedings of the Internet and Network Economics, 4th International Workshop, 2008

Automated design of scoring rules by learning from examples.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination.
Proceedings of the IJCAI 2007, 2007

Learning Voting Trees.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Robust Mechanisms for Information Elicitation.
Proceedings of the Proceedings, 2006

Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth.
Proceedings of the Proceedings, 2006

2005
Using tags to evolve trust and cooperation between groups.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005


  Loading...