Show simple item record

dc.contributor.authorWang, Xuechao
dc.contributor.authorMuppirala, Viswa Virinchi
dc.contributor.authorYang, Lei
dc.contributor.authorKannan, Sreeram
dc.contributor.authorViswanath, Pramod
dc.date.accessioned2022-11-10T14:24:25Z
dc.date.available2022-11-10T14:24:25Z
dc.date.issued2021-11-12
dc.identifier.isbn978-1-4503-8454-4
dc.identifier.urihttps://hdl.handle.net/1721.1/146304
dc.publisherACM|Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Securityen_US
dc.relation.isversionofhttps://doi.org/10.1145/3460120.3485254en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceACM|Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Securityen_US
dc.titleSecuring Parallel-chain Protocols under Variable Mining Poweren_US
dc.typeArticleen_US
dc.identifier.citationWang, Xuechao, Muppirala, Viswa Virinchi, Yang, Lei, Kannan, Sreeram and Viswanath, Pramod. 2021. "Securing Parallel-chain Protocols under Variable Mining Power."
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.identifier.mitlicensePUBLISHER_POLICY
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2022-11-02T22:16:22Z
dc.language.rfc3066en
dc.rights.holderACM
dspace.date.submission2022-11-02T22:16:22Z
mit.licensePUBLISHER_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record