Lefteris Kokoris Kogias
Kokoris Group
38 Publications
2024 | Published | Conference Paper | IST-REx-ID: 18071 |
Tsimos, Giorgos, et al. “HammerHead: Leader Reputation for Dynamic Scheduling.” Proceedings - International Conference on Distributed Computing Systems, IEEE, 2024, pp. 1377–87, doi:10.1109/ICDCS60910.2024.00129.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2023 | Published | Conference Paper | IST-REx-ID: 14516 |
Beaver, Donald, et al. “STROBE: Streaming Threshold Random Beacons.” 5th Conference on Advances in Financial Technologies, vol. 282, 7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2023, doi:10.4230/LIPIcs.AFT.2023.7.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14609 |
Das, Sourav, et al. “Practical Asynchronous High-Threshold Distributed Key Generation and Distributed Polynomial Sampling.” 32nd USENIX Security Symposium, vol. 8, Usenix, 2023, pp. 5359–76.
[Published Version]
View
| Files available
| Download Published Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14735 |
Stefo, Christos, et al. “Executing and Proving over Dirty Ledgers.” 27th International Conference on Financial Cryptography and Data Security, vol. 13950, Springer Nature, 2023, pp. 3–20, doi:10.1007/978-3-031-47754-6_1.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14743 |
Tennage, Pasindu, et al. “QuePaxa: Escaping the Tyranny of Timeouts in Consensus.” Proceedings of the 29th Symposium on Operating Systems Principles, Association for Computing Machinery, 2023, pp. 281–97, doi:10.1145/3600006.3613150.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14744
Avarikioti, Zeta, et al. “Divide & Scale: Formalization and Roadmap to Robust Sharding.” 30th International Colloquium on Structural Information and Communication Complexity, vol. 13892, Springer Nature, 2023, pp. 199–245, doi:10.1007/978-3-031-32733-9_10.
View
| DOI
2023 | Published | Conference Paper | IST-REx-ID: 14829 |
Cohen, Shir, et al. “Proof of Availability and Retrieval in a Modular Blockchain Architecture.” 27th International Conference on Financial Cryptography and Data Security, vol. 13951, Springer Nature, 2023, pp. 36–53, doi:10.1007/978-3-031-47751-5_3.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14989 |
Malvai, Harjasleen, et al. “Parakeet: Practical Key Transparency for End-to-End EEncrypted Messaging.” Proceedings of the 2023 Network and Distributed System Security Symposium, Internet Society, 2023, doi:10.14722/ndss.2023.24545.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2022 | Published | Conference Paper | IST-REx-ID: 11331 |
Danezis, George, et al. “Narwhal and Tusk: A DAG-Based Mempool and Efficient BFT Consensus.” Proceedings of the 17th European Conference on Computer Systems, Association for Computing Machinery, 2022, pp. 34–50, doi:10.1145/3492321.3519594.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12160
De la Rocha, Alfonso, et al. “Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains.” 42nd International Conference on Distributed Computing Systems Workshops, vol. 2022, Institute of Electrical and Electronics Engineers, 2022, pp. 45–52, doi:10.1109/icdcsw56584.2022.00018.
View
| DOI
| WoS
2022 | Published | Conference Paper | IST-REx-ID: 12168 |
Cohen, Shir, et al. “Be Aware of Your Leaders.” International Conference on Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 279–95, doi:10.1007/978-3-031-18283-9_13.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12229 |
Spiegelman, Alexander, et al. “Bullshark: DAG BFT Protocols Made Practical.” Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2022, pp. 2705–2718, doi:10.1145/3548606.3559361.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12298 |
Gelashvili, Rati, et al. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 296–315, doi:10.1007/978-3-031-18283-9_14.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12300 |
Das, Sourav, et al. “Practical Asynchronous Distributed Key Generation.” 2022 IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers, 2022, pp. 2518–34, doi:10.1109/sp46214.2022.9833584.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2021 | Published | Conference Paper | IST-REx-ID: 10076 |
Blackshear, Sam, et al. “Reactive Key-Loss Protection in Blockchains.” FC 2021 Workshops, vol. 12676, Springer Nature, 2021, pp. 431–50, doi:10.1007/978-3-662-63958-0_34.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2021 | Published | Conference Paper | IST-REx-ID: 10324 |
Avarikioti, Zeta, et al. “Brick: Asynchronous Incentive-Compatible Payment Channels.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 209–30, doi:10.1007/978-3-662-64331-0_11.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2021 | Published | Conference Paper | IST-REx-ID: 10325 |
Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 3–36, doi:10.1007/978-3-662-64331-0_1.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2021 | Published | Conference Paper | IST-REx-ID: 10553 |
Gelashvili, Rati, et al. “Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 187–90, doi:10.1145/3465084.3467941.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2021 | Published | Conference Paper | IST-REx-ID: 10554 |
Keidar, Idit, et al. “All You Need Is DAG.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 165–75, doi:10.1145/3465084.3467905.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2020 | Published | Conference Paper | IST-REx-ID: 10556 |
Kokoris Kogias, Eleftherios, et al. “Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.” Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2020, pp. 1751–1767, doi:10.1145/3372297.3423364.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2020 | Patent | IST-REx-ID: 10557 |
Ford, Bryan, et al. Cryptographically Verifiable Data Structure Having Multi-Hop Forward and Backwards Links and Associated Systems and Methods. 2020.
[Published Version]
View
| Files available
| Download Published Version (ext.)
2020 | Submitted | Preprint | IST-REx-ID: 8307 |
Stewart, Alistair, and Eleftherios Kokoris Kogias. “GRANDPA: A Byzantine Finality Gadget.” ArXiv, 2007.01560.
[Preprint]
View
| Download Preprint (ext.)
| arXiv
2020 | Published | Journal Article | IST-REx-ID: 9011 |
Kokoris Kogias, Eleftherios, et al. “CALYPSO: Private Data Management for Decentralized Ledgers.” Proceedings of the VLDB Endowment, vol. 14, no. 4, Association for Computing Machinery, 2020, pp. 586–99, doi:10.14778/3436905.3436917.
[Published Version]
View
| DOI
| Download Published Version (ext.)
| WoS
2019 | Published | Conference Paper | IST-REx-ID: 8296
Alp, Enis Ceyhun, et al. “Rethinking General-Purpose Decentralized Computing.” Proceedings of the Workshop on Hot Topics in Operating Systems, ACM, 2019, pp. 105–12, doi:10.1145/3317550.3321448.
View
| DOI
2019 | Submitted | Preprint | IST-REx-ID: 8303 |
Kokoris Kogias, Eleftherios. “Robust and Scalable Consensus for Sharded Distributed Ledgers.” Cryptology EPrint Archive, 2019/676.
[Preprint]
View
| Download Preprint (ext.)
2019 | Submitted | Preprint | IST-REx-ID: 8304 |
Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” Cryptology EPrint Archive, 2019/1128.
[Preprint]
View
| Download Preprint (ext.)
2019 | Submitted | Preprint | IST-REx-ID: 8305 |
Kokoris Kogias, Eleftherios, et al. “Bootstrapping Consensus without Trusted Setup: Fully Asynchronous Distributed Key Generation.” Cryptology EPrint Archive, 2019/1015.
[Preprint]
View
| Download Preprint (ext.)
2019 | Published | Thesis | IST-REx-ID: 8311 |
Kokoris Kogias, Eleftherios. Secure, Confidential Blockchains Providing High Throughput and Low Latency. École Polytechnique Fédérale de Lausanne, 2019, doi:10.5075/epfl-thesis-7101.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2019 | Patent | IST-REx-ID: 8313 |
Ford, Bryan, et al. Methods and Systems for Secure Data Exchange. 2019.
[Published Version]
View
| Download Published Version (ext.)
2019 | Submitted | Preprint | IST-REx-ID: 8314 |
Avarikioti, Georgia, et al. “Brick: Asynchronous Payment Channels.” ArXiv, 1905.11360.
[Preprint]
View
| Download Preprint (ext.)
| arXiv
2019 | Submitted | Preprint | IST-REx-ID: 8315 |
Avarikioti, Georgia, et al. “Divide and Scale: Formalization of Distributed Ledger Sharding Protocols.” ArXiv, 1910.10434.
[Preprint]
View
| Download Preprint (ext.)
| arXiv
2018 | Published | Conference Paper | IST-REx-ID: 8297 |
Kokoris Kogias, Eleftherios, et al. “OmniLedger: A Secure, Scale-out, Decentralized Ledger via Sharding.” 2018 IEEE Symposium on Security and Privacy, IEEE, 2018, pp. 583–98, doi:10.1109/sp.2018.000-5.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2018 | Published | Conference Paper | IST-REx-ID: 8298
Androulaki, Elli, et al. “Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.” Computer Security, vol. 11098, Springer Nature, 2018, pp. 111–31, doi:10.1007/978-3-319-99073-6_6.
View
| DOI
2017 | Published | Conference Paper | IST-REx-ID: 8299
Borge, Maria, et al. “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.” 2017 IEEE European Symposium on Security and Privacy Workshops, 7966966, IEEE, 2017, doi:10.1109/eurospw.2017.46.
View
| DOI
2017 | Published | Conference Paper | IST-REx-ID: 8301 |
Nikitin, Kirill, et al. “CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.” Proceedings of the 26th USENIX Conference on Security Symposium, USENIX Association, 2017, pp. 1271–1287.
[Published Version]
View
| Download Published Version (ext.)
2017 | Published | Conference Paper | IST-REx-ID: 8306 |
Syta, E., et al. “Scalable Bias-Resistant Distributed Randomness.” 2017 IEEE Symposium on Security and Privacy, IEEE, 2017, pp. 444–60, doi:10.1109/SP.2017.45.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2016 | Published | Conference Paper | IST-REx-ID: 8300
Kokoris Kogias, Eleftherios, et al. “TRM-SIoT: A Scalable Hybrid Trust & Reputation Model for the Social Internet of Things.” 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, 7733612, IEEE, 2016, doi:10.1109/etfa.2016.7733612.
View
| DOI
2016 | Published | Conference Paper | IST-REx-ID: 8302 |
Kokoris Kogias, Eleftherios, et al. “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.” Proceedings of the 25th USENIX Conference on Security Symposium, USENIX Association, 2016, pp. 279–296.
[Published Version]
View
| Download Published Version (ext.)
| arXiv
Grants
38 Publications
2024 | Published | Conference Paper | IST-REx-ID: 18071 |
Tsimos, Giorgos, et al. “HammerHead: Leader Reputation for Dynamic Scheduling.” Proceedings - International Conference on Distributed Computing Systems, IEEE, 2024, pp. 1377–87, doi:10.1109/ICDCS60910.2024.00129.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2023 | Published | Conference Paper | IST-REx-ID: 14516 |
Beaver, Donald, et al. “STROBE: Streaming Threshold Random Beacons.” 5th Conference on Advances in Financial Technologies, vol. 282, 7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2023, doi:10.4230/LIPIcs.AFT.2023.7.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14609 |
Das, Sourav, et al. “Practical Asynchronous High-Threshold Distributed Key Generation and Distributed Polynomial Sampling.” 32nd USENIX Security Symposium, vol. 8, Usenix, 2023, pp. 5359–76.
[Published Version]
View
| Files available
| Download Published Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14735 |
Stefo, Christos, et al. “Executing and Proving over Dirty Ledgers.” 27th International Conference on Financial Cryptography and Data Security, vol. 13950, Springer Nature, 2023, pp. 3–20, doi:10.1007/978-3-031-47754-6_1.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14743 |
Tennage, Pasindu, et al. “QuePaxa: Escaping the Tyranny of Timeouts in Consensus.” Proceedings of the 29th Symposium on Operating Systems Principles, Association for Computing Machinery, 2023, pp. 281–97, doi:10.1145/3600006.3613150.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14744
Avarikioti, Zeta, et al. “Divide & Scale: Formalization and Roadmap to Robust Sharding.” 30th International Colloquium on Structural Information and Communication Complexity, vol. 13892, Springer Nature, 2023, pp. 199–245, doi:10.1007/978-3-031-32733-9_10.
View
| DOI
2023 | Published | Conference Paper | IST-REx-ID: 14829 |
Cohen, Shir, et al. “Proof of Availability and Retrieval in a Modular Blockchain Architecture.” 27th International Conference on Financial Cryptography and Data Security, vol. 13951, Springer Nature, 2023, pp. 36–53, doi:10.1007/978-3-031-47751-5_3.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2023 | Published | Conference Paper | IST-REx-ID: 14989 |
Malvai, Harjasleen, et al. “Parakeet: Practical Key Transparency for End-to-End EEncrypted Messaging.” Proceedings of the 2023 Network and Distributed System Security Symposium, Internet Society, 2023, doi:10.14722/ndss.2023.24545.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2022 | Published | Conference Paper | IST-REx-ID: 11331 |
Danezis, George, et al. “Narwhal and Tusk: A DAG-Based Mempool and Efficient BFT Consensus.” Proceedings of the 17th European Conference on Computer Systems, Association for Computing Machinery, 2022, pp. 34–50, doi:10.1145/3492321.3519594.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12160
De la Rocha, Alfonso, et al. “Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains.” 42nd International Conference on Distributed Computing Systems Workshops, vol. 2022, Institute of Electrical and Electronics Engineers, 2022, pp. 45–52, doi:10.1109/icdcsw56584.2022.00018.
View
| DOI
| WoS
2022 | Published | Conference Paper | IST-REx-ID: 12168 |
Cohen, Shir, et al. “Be Aware of Your Leaders.” International Conference on Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 279–95, doi:10.1007/978-3-031-18283-9_13.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12229 |
Spiegelman, Alexander, et al. “Bullshark: DAG BFT Protocols Made Practical.” Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2022, pp. 2705–2718, doi:10.1145/3548606.3559361.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12298 |
Gelashvili, Rati, et al. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 296–315, doi:10.1007/978-3-031-18283-9_14.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2022 | Published | Conference Paper | IST-REx-ID: 12300 |
Das, Sourav, et al. “Practical Asynchronous Distributed Key Generation.” 2022 IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers, 2022, pp. 2518–34, doi:10.1109/sp46214.2022.9833584.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2021 | Published | Conference Paper | IST-REx-ID: 10076 |
Blackshear, Sam, et al. “Reactive Key-Loss Protection in Blockchains.” FC 2021 Workshops, vol. 12676, Springer Nature, 2021, pp. 431–50, doi:10.1007/978-3-662-63958-0_34.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2021 | Published | Conference Paper | IST-REx-ID: 10324 |
Avarikioti, Zeta, et al. “Brick: Asynchronous Incentive-Compatible Payment Channels.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 209–30, doi:10.1007/978-3-662-64331-0_11.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2021 | Published | Conference Paper | IST-REx-ID: 10325 |
Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” 25th International Conference on Financial Cryptography and Data Security, vol. 12675, Springer Nature, 2021, pp. 3–36, doi:10.1007/978-3-662-64331-0_1.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2021 | Published | Conference Paper | IST-REx-ID: 10553 |
Gelashvili, Rati, et al. “Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 187–90, doi:10.1145/3465084.3467941.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2021 | Published | Conference Paper | IST-REx-ID: 10554 |
Keidar, Idit, et al. “All You Need Is DAG.” Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, Association for Computing Machinery, 2021, pp. 165–75, doi:10.1145/3465084.3467905.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2020 | Published | Conference Paper | IST-REx-ID: 10556 |
Kokoris Kogias, Eleftherios, et al. “Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.” Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2020, pp. 1751–1767, doi:10.1145/3372297.3423364.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2020 | Patent | IST-REx-ID: 10557 |
Ford, Bryan, et al. Cryptographically Verifiable Data Structure Having Multi-Hop Forward and Backwards Links and Associated Systems and Methods. 2020.
[Published Version]
View
| Files available
| Download Published Version (ext.)
2020 | Submitted | Preprint | IST-REx-ID: 8307 |
Stewart, Alistair, and Eleftherios Kokoris Kogias. “GRANDPA: A Byzantine Finality Gadget.” ArXiv, 2007.01560.
[Preprint]
View
| Download Preprint (ext.)
| arXiv
2020 | Published | Journal Article | IST-REx-ID: 9011 |
Kokoris Kogias, Eleftherios, et al. “CALYPSO: Private Data Management for Decentralized Ledgers.” Proceedings of the VLDB Endowment, vol. 14, no. 4, Association for Computing Machinery, 2020, pp. 586–99, doi:10.14778/3436905.3436917.
[Published Version]
View
| DOI
| Download Published Version (ext.)
| WoS
2019 | Published | Conference Paper | IST-REx-ID: 8296
Alp, Enis Ceyhun, et al. “Rethinking General-Purpose Decentralized Computing.” Proceedings of the Workshop on Hot Topics in Operating Systems, ACM, 2019, pp. 105–12, doi:10.1145/3317550.3321448.
View
| DOI
2019 | Submitted | Preprint | IST-REx-ID: 8303 |
Kokoris Kogias, Eleftherios. “Robust and Scalable Consensus for Sharded Distributed Ledgers.” Cryptology EPrint Archive, 2019/676.
[Preprint]
View
| Download Preprint (ext.)
2019 | Submitted | Preprint | IST-REx-ID: 8304 |
Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” Cryptology EPrint Archive, 2019/1128.
[Preprint]
View
| Download Preprint (ext.)
2019 | Submitted | Preprint | IST-REx-ID: 8305 |
Kokoris Kogias, Eleftherios, et al. “Bootstrapping Consensus without Trusted Setup: Fully Asynchronous Distributed Key Generation.” Cryptology EPrint Archive, 2019/1015.
[Preprint]
View
| Download Preprint (ext.)
2019 | Published | Thesis | IST-REx-ID: 8311 |
Kokoris Kogias, Eleftherios. Secure, Confidential Blockchains Providing High Throughput and Low Latency. École Polytechnique Fédérale de Lausanne, 2019, doi:10.5075/epfl-thesis-7101.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2019 | Patent | IST-REx-ID: 8313 |
Ford, Bryan, et al. Methods and Systems for Secure Data Exchange. 2019.
[Published Version]
View
| Download Published Version (ext.)
2019 | Submitted | Preprint | IST-REx-ID: 8314 |
Avarikioti, Georgia, et al. “Brick: Asynchronous Payment Channels.” ArXiv, 1905.11360.
[Preprint]
View
| Download Preprint (ext.)
| arXiv
2019 | Submitted | Preprint | IST-REx-ID: 8315 |
Avarikioti, Georgia, et al. “Divide and Scale: Formalization of Distributed Ledger Sharding Protocols.” ArXiv, 1910.10434.
[Preprint]
View
| Download Preprint (ext.)
| arXiv
2018 | Published | Conference Paper | IST-REx-ID: 8297 |
Kokoris Kogias, Eleftherios, et al. “OmniLedger: A Secure, Scale-out, Decentralized Ledger via Sharding.” 2018 IEEE Symposium on Security and Privacy, IEEE, 2018, pp. 583–98, doi:10.1109/sp.2018.000-5.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2018 | Published | Conference Paper | IST-REx-ID: 8298
Androulaki, Elli, et al. “Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.” Computer Security, vol. 11098, Springer Nature, 2018, pp. 111–31, doi:10.1007/978-3-319-99073-6_6.
View
| DOI
2017 | Published | Conference Paper | IST-REx-ID: 8299
Borge, Maria, et al. “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.” 2017 IEEE European Symposium on Security and Privacy Workshops, 7966966, IEEE, 2017, doi:10.1109/eurospw.2017.46.
View
| DOI
2017 | Published | Conference Paper | IST-REx-ID: 8301 |
Nikitin, Kirill, et al. “CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.” Proceedings of the 26th USENIX Conference on Security Symposium, USENIX Association, 2017, pp. 1271–1287.
[Published Version]
View
| Download Published Version (ext.)
2017 | Published | Conference Paper | IST-REx-ID: 8306 |
Syta, E., et al. “Scalable Bias-Resistant Distributed Randomness.” 2017 IEEE Symposium on Security and Privacy, IEEE, 2017, pp. 444–60, doi:10.1109/SP.2017.45.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2016 | Published | Conference Paper | IST-REx-ID: 8300
Kokoris Kogias, Eleftherios, et al. “TRM-SIoT: A Scalable Hybrid Trust & Reputation Model for the Social Internet of Things.” 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, 7733612, IEEE, 2016, doi:10.1109/etfa.2016.7733612.
View
| DOI
2016 | Published | Conference Paper | IST-REx-ID: 8302 |
Kokoris Kogias, Eleftherios, et al. “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.” Proceedings of the 25th USENIX Conference on Security Symposium, USENIX Association, 2016, pp. 279–296.
[Published Version]
View
| Download Published Version (ext.)
| arXiv