Follow
Surya Bakshi
Title
Cited by
Cited by
Year
Sprites and State Channels: Payment Networks that Go Faster than Lightning
A Miller, I Bentov, S Bakshi, R Kumaresan, P McCorry
Financial Cryptography and Data Security, 2019
4222019
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
1342019
Erays: reverse engineering ethereum's opaque smart contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th USENIX security symposium (USENIX Security 18), 1371-1385, 2018
1222018
TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
S Delgado-Segura, S Bakshi, C Pérez-Solà, J Litton, A Miller, ...
Financial Cryptography and Data Security, 2019
1152019
Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees
G Fanti, SB Venkatakrishnan, S Bakshi, B Denby, S Bhargava, A Miller, ...
Proceedings of the ACM on Measurement and Analysis of Computing Systems 2 (2 …, 2018
1102018
You sank my battleship! a case study to evaluate state channels as a scaling solution for cryptocurrencies
P McCorry, B Chris, S Bakshi, K Wüst, A Miller
Financial Cryptography and Data Security: FC 2019 International Workshops …, 2020
302020
University of Illinois at Urbana-Champaign
W Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
United States, 2018
282018
You sank my battleship
P McCorry, C Buckland, S Bakshi, K Wüst, A Miller
A case study to evaluate state channels as a scaling solution for …, 2018
62018
Sprites and state channels: Payment networks that go faster than lightning
P Mc Corry, A Miller, S Bakshi, I Bentov, R Kumaresan
Financial Cryptography and Data Security, 508, 2019
22019
Bootstrapping a stable computation token
J Teutsch, S Mäkelä, S Bakshi
arXiv preprint arXiv:1908.02946, 2019
12019
Privacy preserving outsourcing of state channel arbitration in microraiden
S Bakshi
University of Illinois at Urbana-Champaign, 2018
2018
Security Testbed: Scalable Infrastructure for Interactive Attack Replay and Testing of Security Monitoring Tools
SK Kim, S Bakshi, P Cao, EC Badger, ZT Kalbarczyk, RK Iyer
The system can't perform the operation now. Try again later.
Articles 1–12