• Publications
  • Influence
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
tl;dr
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Expand
  • 840
  • 99
Bitcoin-NG: A Scalable Blockchain Protocol
tl;dr
We present Bitcoin-NG, a scalable blockchain protocol, based on the same trust model as Bitcoin. Expand
  • 734
  • 84
  • Open Access
Meridian: a lightweight network location service without virtual coordinates
tl;dr
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location without having to compute absolute coordinates. Expand
  • 443
  • 46
  • Open Access
Majority is not enough
tl;dr
We show that the Bitcoin mining protocol is not incentive-compatible. Expand
  • 402
  • 42
  • Open Access
SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks
tl;dr
A central challenge in ad hoc networks is the design of routing protocols that can adapt their behavior to frequent and rapid changes in the network. Expand
  • 296
  • 34
  • Open Access
Merlin: A Language for Provisioning Network Resources
tl;dr
This paper presents Merlin, a new framework for managing resources in software-defined networks. Expand
  • 158
  • 29
  • Open Access
Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts
tl;dr
We present Octant, a novel, comprehensive framework for determining the location of Internet hosts in the real world based solely on network measurements. Expand
  • 195
  • 26
  • Open Access
On Scaling Decentralized Blockchains - (A Position Paper)
tl;dr
We analyze how fundamental and circumstantial bottlenecks in Bitcoin limit the ability of its current peer-to-peer overlay network to support substantially higher throughputs and lower latencies. Expand
  • 397
  • 23
  • Open Access
Experience with an Object Reputation System for Peer-to-Peer Filesharing
tl;dr
The present invention relates to an actuator for an electric starter, comprising a thin sleeve of which the periphery comprises two flanges between which a two-piece collar is placed. Expand
  • 272
  • 23
  • Open Access
KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing
tl;dr
We propose an economic framework for discouraging freeloader-like behavior in a peer-to-peer system that incentivizes participating nodes to contribute resources to a global pool. Expand
  • 350
  • 22
  • Open Access