Andrew Miller
TitleCited byYear
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
9572016
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
8672016
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104-121, 2015
7022015
VizWiz: nearly real-time answers to visual questions
JP Bigham, C Jayant, H Ji, G Little, A Miller, RC Miller, R Miller, ...
Proceedings of the 23nd annual ACM symposium on User interface software and …, 2010
6212010
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International Conference on Financial Cryptography and Data Security, 106-125, 2016
6072016
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
K Delmolino, M Arnett, A Kosba, A Miller, E Shi
International Conference on Financial Cryptography and Data Security, 79-94, 2016
3032016
Enabling blockchain innovations with pegged sidechains
A Back, M Corallo, L Dashjr, M Friedenbach, G Maxwell, A Miller, ...
URL: http://www. opensciencereview. com/papers/123/enablingblockchain …, 2014
2732014
Mixcoin: Anonymity for Bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
International Conference on Financial Cryptography and Data Security, 486-504, 2014
2422014
The honey badger of BFT protocols
A Miller, Y Xia, K Croman, E Shi, D Song
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2402016
Stubborn mining: Generalizing selfish mining and combining with an eclipse attack
K Nayak, S Kumar, A Miller, E Shi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 305-320, 2016
2292016
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
1992014
The wiimote and beyond: Spatially convenient devices for 3d user interfaces
CA Wingrave, B Williamson, PD Varcholik, J Rose, A Miller, ...
IEEE Computer Graphics and Applications 30 (2), 71-85, 2009
1542009
An empirical analysis of traceability in the monero blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 143-163, 2018
1192018
Sprites and state channels: Payment networks that go faster than lightning
A Miller, I Bentov, S Bakshi, R Kumaresan, P McCorry
International Conference on Financial Cryptography and Data Security, 508-526, 2019
1092019
Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin
A Miller, JJ LaViola Jr
Available on line: http://nakamotoinstitute. org/research/anonymous …, 2014
812014
Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions
A Miller, A Kosba, J Katz, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
802015
Authenticated data structures, generically
A Miller, M Hicks, J Katz, E Shi
ACM SIGPLAN Notices 49 (1), 411-423, 2014
632014
Landing a UAV on a runway using image registration
A Miller, M Shah, D Harper
2008 IEEE International Conference on Robotics and Automation, 182-187, 2008
622008
Interactive 3D model acquisition and tracking of building block structures
A Miller, B White, E Charbonneau, Z Kanzler, JJ LaViola Jr
IEEE transactions on visualization and computer graphics 18 (4), 651-659, 2012
542012
Discovering bitcoin’s public topology and influential nodes
A Miller, J Litton, A Pachulski, N Gupta, D Levin, N Spring, ...
et al, 2015
462015
The system can't perform the operation now. Try again later.
Articles 1–20