Andrew Miller
Cited by
Cited by
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE symposium on security and privacy, 104-121, 2015
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
VizWiz: nearly real-time answers to visual questions
JP Bigham, C Jayant, H Ji, G Little, A Miller, RC Miller, R Miller, ...
Proceedings of the 23nd annual ACM symposium on User interface software and …, 2010
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
K Delmolino, M Arnett, A Kosba, A Miller, E Shi
International conference on financial cryptography and data security, 79-94, 2016
Enabling blockchain innovations with pegged sidechains
A Back, M Corallo, L Dashjr, M Friedenbach, G Maxwell, A Miller, ...
URL: http://www. opensciencereview. com/papers/123/enablingblockchain …, 2014
The honey badger of BFT protocols
A Miller, Y Xia, K Croman, E Shi, D Song
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack
K Nayak, S Kumar, A Miller, E Shi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
International Conference on Financial Cryptography and Data Security, 486-504, 2014
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
Sprites: Payment channels that go faster than lightning
A Miller, I Bentov, R Kumaresan, P McCorry
CoRR abs/1702.05812 306, 2017
The wiimote and beyond: Spatially convenient devices for 3d user interfaces
CA Wingrave, B Williamson, PD Varcholik, J Rose, A Miller, ...
IEEE Computer Graphics and Applications 30 (2), 71-85, 2009
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
R Cheng, F Zhang, J Kos, W He, N Hynes, N Johnson, A Juels, A Miller, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 185-200, 2019
An empirical analysis of traceability in the monero blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 143-163, 2018
Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions
A Miller, A Kosba, J Katz, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin
A Miller, JJ LaViola Jr
University of Central Florida Tech. Report CS-TR-14-01 (accessed 5 June 2019 …, 2014
Authenticated data structures, generically
A Miller, M Hicks, J Katz, E Shi
ACM SIGPLAN Notices 49 (1), 411-423, 2014
Landing a UAV on a runway using image registration
A Miller, M Shah, D Harper
2008 IEEE International Conference on Robotics and Automation, 182-187, 2008
Discovering bitcoin’s public topology and influential nodes
A Miller, J Litton, A Pachulski, N Gupta, D Levin, N Spring, ...
et al, 2015
The system can't perform the operation now. Try again later.
Articles 1–20