Aviv Zohar
Title
Cited by
Cited by
Year
Secure high-rate transaction processing in bitcoin
Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 507-527, 2015
666*2015
Eclipse attacks on bitcoin’s peer-to-peer network
E Heilman, A Kendler, A Zohar, S Goldberg
24th {USENIX} Security Symposium ({USENIX} Security 15), 129-144, 2015
5042015
Optimal selfish mining strategies in Bitcoin
A Sapirshtein, Y Sompolinsky, A Zohar
Financial Cryptography 2016, 2016
4232016
Hijacking bitcoin: Routing attacks on cryptocurrencies
M Apostolaki, A Zohar, L Vanbever
2017 IEEE Symposium on Security and Privacy (SP), 375-392, 2017
2852017
On bitcoin and red balloons
M Babaioff, S Dobzinski, S Oren, A Zohar
Proceedings of the 13th ACM conference on electronic commerce, 56-73, 2012
2842012
Inclusive block chain protocols
Y Lewenberg, Y Sompolinsky, A Zohar
International Conference on Financial Cryptography and Data Security, 528-547, 2015
2632015
Bitcoin mining pools: A cooperative game theoretic analysis
Y Lewenberg, Y Bachrach, Y Sompolinsky, A Zohar, JS Rosenschein
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
1912015
SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
Y Sompolinsky, Y Lewenberg, A Zohar
IACR Cryptol. ePrint Arch. 2016, 1159, 2016
1742016
On the complexity of achieving proportional representation
AD Procaccia, JS Rosenschein, A Zohar
Social Choice and Welfare 30 (3), 353-362, 2008
1612008
Bitcoin: under the hood
A Zohar
Communications of the ACM 58 (9), 104-113, 2015
1532015
Interdomain routing and games
H Levin, M Schapira, A Zohar
SIAM Journal on Computing 40 (6), 1892-1912, 2011
1082011
Complexity of strategic behavior in multi-winner elections
R Meir, AD Procaccia, JS Rosenschein, A Zohar
Journal of Artificial Intelligence Research 33, 149-178, 2008
1072008
PHANTOM: A Scalable BlockDAG Protocol.
Y Sompolinsky, A Zohar
IACR Cryptol. ePrint Arch. 2018, 104, 2018
852018
Mechanisms for multi-level marketing
Y Emek, R Karidi, M Tennenholtz, A Zohar
Proceedings of the 12th ACM conference on Electronic commerce, 209-218, 2011
802011
Exploiting problem symmetries in state-based planners
N Pochter, A Zohar, JS Rosenschein
Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
682011
Multi-winner elections: Complexity of manipulation, control and winner-determination
AD Procaccia, JS Rosenschein, A Zohar
Proceedings of the 20th International Joint Conference on Artificial …, 2007
682007
Bitcoin's security model revisited
Y Sompolinsky, A Zohar
arXiv preprint arXiv:1605.09193, 2016
662016
Searching for stability in interdomain routing
R Sami, M Schapira, A Zohar
INFOCOM 2009, IEEE, 549-557, 2009
602009
Best-response mechanisms
N Nisan, M Schapira, G Valiant, A Zohar
Proc. Second Syposium on Innovations in Computer Science (ICS). To Appear, 2011
50*2011
Search Space Reduction Using Swamp Hierarchies.
N Pochter, A Zohar, JS Rosenschein, A Felner
AAAI, 2010
442010
The system can't perform the operation now. Try again later.
Articles 1–20