Craig S. Wright

Affiliations:
  • nChain, London, UK
  • Charles Sturt University, School of Computing and Mathematics, Sydney, NSW, Australia


According to our database1, Craig S. Wright authored at least 15 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2010, "For contributions to parallel magnetic resonance imaging methods and systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Using the Singular Value Decomposition to Generate Composite NFTs.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2019
A Proof of Turing Completeness in Bitcoin Script.
Proceedings of the Intelligent Systems and Applications, 2019

Bitcoin: A Total Turing Machine.
Proceedings of the Intelligent Systems and Applications, 2019

A Distribution Protocol for Dealerless Secret Distribution.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Decentralized Autonomous Corporations.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Systems and Methods for Implementing Deterministic Finite Automata (DFA) via a Blockchain.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Agent-based Turing Complete Transactions integrating feedback within a Blockchain System.
Proceedings of the 16th International Multi-Conference on Systems, Signals & Devices, 2019

2018
Modeling a Double-Spending Detection System for the Bitcoin Network.
CoRR, 2018

From Bitcoin to Bitcoin Cash: a network analysis.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

2017
Sustainable blockchain-enabled services: Smart contracts.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2011
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Quantitative Analysis into the Economics of Correcting Software Bugs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Compliance or Security, What Cost? (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software.
Proceedings of the Trusted Systems - Second International Conference, 2010

2008
Overwriting Hard Drive Data: The Great Wiping Controversy.
Proceedings of the Information Systems Security, 4th International Conference, 2008


  Loading...