Andrew Miller
Title
Cited by
Cited by
Year
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
13022016
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
12452016
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE symposium on security and privacy, 104-121, 2015
8842015
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
8012016
VizWiz: nearly real-time answers to visual questions
JP Bigham, C Jayant, H Ji, G Little, A Miller, RC Miller, R Miller, ...
Proceedings of the 23nd annual ACM symposium on User interface software and …, 2010
6952010
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
K Delmolino, M Arnett, A Kosba, A Miller, E Shi
International conference on financial cryptography and data security, 79-94, 2016
4032016
Enabling blockchain innovations with pegged sidechains
A Back, M Corallo, L Dashjr, M Friedenbach, G Maxwell, A Miller, ...
URL: http://www. opensciencereview. com/papers/123/enablingblockchain …, 2014
3542014
The honey badger of BFT protocols
A Miller, Y Xia, K Croman, E Shi, D Song
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3272016
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
International Conference on Financial Cryptography and Data Security, 486-504, 2014
3052014
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack
K Nayak, S Kumar, A Miller, E Shi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016
2962016
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
2382014
Sprites: Payment channels that go faster than lightning
A Miller, I Bentov, R Kumaresan, P McCorry
CoRR abs/1702.05812 306, 2017
165*2017
The wiimote and beyond: Spatially convenient devices for 3d user interfaces
CA Wingrave, B Williamson, PD Varcholik, J Rose, A Miller, ...
IEEE Computer Graphics and Applications 30 (2), 71-85, 2009
1562009
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
R Cheng, F Zhang, J Kos, W He, N Hynes, N Johnson, A Juels, A Miller, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 185-200, 2019
1172019
An empirical analysis of traceability in the monero blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 143-163, 2018
1072018
Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions
A Miller, A Kosba, J Katz, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
972015
Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin
A Miller, JJ LaViola Jr
University of Central Florida Tech. Report CS-TR-14-01 (accessed 5 June 2019 …, 2014
952014
Authenticated data structures, generically
A Miller, M Hicks, J Katz, E Shi
ACM SIGPLAN Notices 49 (1), 411-423, 2014
752014
Enabling blockchain innovations with pegged sidechains (2014)
A Back, M Corallo, L Dashjr, M Friedenbach, G Maxwell, A Miller, ...
URL: tinyurl. com/mj656p7, 2014
642014
Non-interactive proofs of proof-of-work
A Kiayias, A Miller, D Zindros
International Conference on Financial Cryptography and Data Security, 505-522, 2020
632020
The system can't perform the operation now. Try again later.
Articles 1–20