default search action
Aljosha Judmayer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Walid Fdhila, Nicholas Stifter, Aljosha Judmayer:
Challenges and Opportunities of Blockchain for Auditable Processes in the Healthcare Sector. BPM (Blockchain and RPA Forum) 2022: 68-83 - [c20]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl:
Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork. ESORICS (1) 2022: 46-66 - [c19]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Estimating (Miner) Extractable Value is Hard, Let's Go Shopping! Financial Cryptography Workshops 2022: 74-92 - [c18]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. WWW (Companion Volume) 2022: 467-477 - [i18]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. IACR Cryptol. ePrint Arch. 2022: 359 (2022) - [i17]Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics & PayJoin Transactions. IACR Cryptol. ePrint Arch. 2022: 589 (2022) - 2021
- [c17]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 507-532 - [c16]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 533-549 - [c15]Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics and PayJoin Transactions. HCI (38) 2021: 416-424 - [c14]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. NDSS 2021 - [i16]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila:
What is Meant by Permissionless Blockchains? IACR Cryptol. ePrint Arch. 2021: 23 (2021) - [i15]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl:
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork. IACR Cryptol. ePrint Arch. 2021: 1182 (2021) - [i14]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Estimating (Miner) Extractable Value is Hard, Letâs Go Shopping! IACR Cryptol. ePrint Arch. 2021: 1231 (2021) - 2020
- [c13]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Efficient Continuous Distributed Randomness. SP 2020: 73-89 - [i13]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. IACR Cryptol. ePrint Arch. 2020: 942 (2020) - [i12]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [c12]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics from Merged Mining. Financial Cryptography 2019: 527-549 - [p1]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. Security and Quality in Cyber-Physical Systems Engineering 2019: 471-495 - [i11]Matteo Romiti, Aljosha Judmayer, Alexei Zamyatin, Bernhard Haslhofer:
A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares. CoRR abs/1905.05999 (2019) - [i10]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - [i9]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 985 (2019) - 2018
- [c11]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper). DPM/CBT@ESORICS 2018: 197-206 - [c10]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper). Financial Cryptography Workshops 2018: 31-42 - [c9]Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. RAID 2018: 184-203 - [i8]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. IACR Cryptol. ePrint Arch. 2018: 87 (2018) - [i7]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Practical Continuous Distributed Randomness. IACR Cryptol. ePrint Arch. 2018: 319 (2018) - [i6]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar R. Weippl:
Agreement with Satoshi - On the Formalization of Nakamoto Consensus. IACR Cryptol. ePrint Arch. 2018: 400 (2018) - [i5]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. IACR Cryptol. ePrint Arch. 2018: 836 (2018) - [i4]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining. IACR Cryptol. ePrint Arch. 2018: 1134 (2018) - 2017
- [b1]Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar R. Weippl:
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01224-2 - [c8]Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. ARES 2017: 20:1-20:10 - [c7]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse or Cure? DPM/CBT@ESORICS 2017: 316-333 - [c6]Aljosha Judmayer, Georg Merzdovnik, Johanna Ullrich, Artemios G. Voyiatzis, Edgar R. Weippl:
A Performance Assessment of Network Address Shuffling in IoT Systems. EUROCAST (1) 2017: 197-204 - [i3]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Edgar R. Weippl:
Bitcoin - Cryptocurrencies and Alternative Applications. ERCIM News 2017(110) (2017) - [i2]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
A Holistic Approach to Smart Contract Security. ERCIM News 2017(110) (2017) - [i1]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse of Cure? IACR Cryptol. ePrint Arch. 2017: 791 (2017) - 2016
- [c5]Aljosha Judmayer, Edgar R. Weippl:
Condensed Cryptographic Currencies Crash Course (C5). CCS 2016: 1857-1858 - [c4]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. Financial Cryptography 2016: 555-580 - [c3]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. Sicherheit 2016: 137-148 - [c2]Aljosha Judmayer, Edgar R. Weippl:
Cryptographic Currencies Crash Course (C4): Tutorial. WWW (Companion Volume) 2016: 1021-1024 - 2014
- [c1]Aljosha Judmayer, Lukas Krammer, Wolfgang Kastner:
On the security of security extensions for IP-based KNX networks. WFCS 2014: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint