default search action
George Dean Bissias
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j4]Dan Zhang, Ryan McKenna, Ios Kotsogiannis, George Bissias, Michael Hay, Ashwin Machanavajjhala, Gerome Miklau:
ϵKTELO: A Framework for Defining Differentially Private Computations. ACM Trans. Database Syst. 45(1): 2:1-2:44 (2020) - 2019
- [j3]Zhiqi Huang, Ryan McKenna, George Bissias, Gerome Miklau, Michael Hay, Ashwin Machanavajjhala:
PSynDB: Accurate and Accessible Private Data Generation. Proc. VLDB Endow. 12(12): 1918-1921 (2019) - [j2]Dan Zhang, Ryan McKenna, Ios Kotsogiannis, George Bissias, Michael Hay, Ashwin Machanavajjhala, Gerome Miklau:
#8712;: A Framework for Defining Differentially-Private Computations. SIGMOD Rec. 48(1): 15-22 (2019) - 2017
- [j1]George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty:
Forensic Identification of Anonymous Sources in OneSwarm. IEEE Trans. Dependable Secur. Comput. 14(6): 620-632 (2017)
Conference and Workshop Papers
- 2023
- [c15]Patrik Keller, Ben Glickenhaus, George Bissias, Gregory Griffith:
Tailstorm: A Secure and Fair Blockchain for Cash Transactions. AFT 2023: 6:1-6:26 - 2020
- [c14]George Bissias:
Radium: Improving Dynamic PoW Targeting. DPM/CBT@ESORICS 2020: 374-389 - [c13]George Bissias, Brian Neil Levine:
Bobtail: Improved Blockchain Security with Low-Variance Mining. NDSS 2020 - 2019
- [c12]George Bissias, David Thibodeau, Brian Neil Levine:
Bonded Mining: Difficulty Adjustment by Miner Commitment. DPM/CBT@ESORICS 2019: 372-390 - [c11]A. Pinar Ozisik, Gavin Andresen, Brian Neil Levine, Darren Tapp, George Bissias, Sunny Katkuri:
Graphene: efficient interactive set reconciliation applied to blockchain propagation. SIGCOMM 2019: 303-317 - 2018
- [c10]George Bissias, Brian Neil Levine, David Thibodeau:
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. DPM/CBT@ESORICS 2018: 155-172 - 2017
- [c9]A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:
Graphene: A New Protocol for Block Propagation Using Set Reconciliation. DPM/CBT@ESORICS 2017: 420-428 - [c8]George Bissias, Brian Neil Levine, Nikunj Kapadia:
Market-based Security for Distributed Applications. NSPW 2017: 19-34 - 2016
- [c7]Michael Hay, Ashwin Machanavajjhala, Gerome Miklau, Yan Chen, Dan Zhang, George Bissias:
Exploring Privacy-Accuracy Tradeoffs using DPComp. SIGMOD Conference 2016: 2101-2104 - 2014
- [c6]George Dean Bissias, A. Pinar Ozisik, Brian Neil Levine, Marc Liberatore:
Sybil-Resistant Mixing for Bitcoin. WPES 2014: 149-158 - 2010
- [c5]George Dean Bissias, Brian Neil Levine, Ramesh K. Sitaraman:
Assessing the vulnerability of replicated network services. CoNEXT 2010: 24 - 2007
- [c4]John Burgess, George Dean Bissias, Mark D. Corner, Brian Neil Levine:
Surviving attacks on disruption-tolerant networks without authentication. MobiHoc 2007: 61-70 - [c3]George Dean Bissias, Brian Neil Levine, Arnold L. Rosenberg:
Bounding damage from link destruction, with application to the internet. SIGMETRICS 2007: 367-368 - 2005
- [c2]George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine:
Privacy Vulnerabilities in Encrypted HTTP Streams. Privacy Enhancing Technologies 2005: 1-11 - 2003
- [c1]Jerod J. Weinman, George Dean Bissias, Joseph Horowitz, Edward M. Riseman, Allen R. Hanson:
Nonlinear Diffusion Scale-Space and Fast Marching Level Sets for Segmentation of MR Imagery and Volume Estimation of Stroke Lesions. MICCAI (2) 2003: 496-504
Informal and Other Publications
- 2023
- [i12]Patrik Keller, Ben Glickenhaus, George Bissias, Gregory Griffith:
Tailstorm: A Secure and Fair Blockchain for Cash Transactions. CoRR abs/2306.12206 (2023) - [i11]Patrik Keller, George Bissias:
Generic Selfish Mining MDP for DAG Protocols. CoRR abs/2309.11924 (2023) - 2020
- [i10]George Bissias:
Radium: Improving Dynamic PoW Targeting. CoRR abs/2007.05991 (2020) - [i9]George Bissias, Rainer Böhme, David Thibodeau, Brian Neil Levine:
Pricing Security in Proof-of-Work Systems. CoRR abs/2012.03706 (2020) - 2019
- [i8]George Bissias:
An Algorithm for Bounding the Probability of r-core Formation in k-uniform Random Hypergraphs. CoRR abs/1901.04934 (2019) - [i7]George Bissias, Brian Neil Levine, David Thibodeau:
Bonded Mining: Difficulty Adjustment by Miner Commitment. CoRR abs/1907.00302 (2019) - [i6]George Bissias, Brian Neil Levine, David Thibodeau:
Greedy but Cautious: Conditions for Miner Convergence to Resource Allocation Equilibrium. CoRR abs/1907.09883 (2019) - 2018
- [i5]George Bissias, Brian Neil Levine, David Thibodeau:
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. CoRR abs/1806.07189 (2018) - 2017
- [i4]George Dean Bissias, Brian Neil Levine, Nikunj Kapadia:
Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT). CoRR abs/1701.03945 (2017) - [i3]A. Pinar Ozisik, George Bissias, Brian Neil Levine:
Estimation of Miner Hash Rates and Consensus on Blockchains (draft). CoRR abs/1707.00082 (2017) - [i2]George Bissias, Brian Neil Levine:
Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft). CoRR abs/1709.08750 (2017) - 2016
- [i1]George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr:
An Analysis of Attacks on Blockchain Consensus. CoRR abs/1610.07985 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint