Ren Zhang
Ren Zhang
Nervos and Cryptape Co. Ltd.
Verified email at
Cited by
Cited by
Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin
R Zhang, B Preneel
RSA Conference Cryptographers’ Track, 16, 2017
Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
R Zhang, B Preneel
the 40th IEEE Symposium on Security and Privacy, 2019
Sc2share: Smart contract for secure car sharing
M Akash, I Symeonidis, M A Mustafa, B Preneel, R Zhang
International Conference on Information Systems Security and Privacy (ICISSP), 2019
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
R Zhang, B Preneel
The 13th International Conference on emerging Networking EXperiments and …, 2017
Making eclipse attacks computationally infeasible in large-scale DHTs
R Zhang, J Zhang, Y Chen, N Qin, B Liu, Y Zhang
30th IEEE International Performance Computing and Communications Conference, 1-8, 2011
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
R Zhang, D Zhang, Q Wang, S Wu, J Xie, B Preneel
The Network and Distributed System Security (NDSS) Symposium 2022, 18, 2022
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
R Zhang, B Preneel
Analysing and improving shard allocation protocols for sharded blockchains
R Han, J Yu, R Zhang
Proceedings of the 4th ACM Conference on Advances in Financial Technologies …, 2022
Censorship-Resistant and Privacy-Preserving Distributed Web Search
M Herrmann, R Zhang, KC Ning, C Diaz, B Preneel
IEEE International Conference on Peer-to-Peer Computing, 2014
Authenticated and auditable data sharing via smart contract
V Reniers, Y Gao, R Zhang, P Viviani, A Madhusudan, B Lagaisse, ...
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 324-331, 2020
VOProof: Efficient zkSNARKs from Vector Oracle Compilers
Y Zhang, A Szepieniec, R Zhang, S Sun, G Wang, D Gu
2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services
X Xiang, R Zhang, H Wen, X Gong, B Liu
2021 ACM SIGSAC Conference on Computer and Communications Security, 1581–1597, 2021
A voucher-based security middleware for secure Business Process Outsourcing
WJ Emad Heydari Beni, Bert Lagaisse, Ren Zhang, Danny De Cock, Filipe Beato
International Symposium on Engineering Secure Software and Systems, 19-35, 2017
When is Slower Block Propagation More Profitable for Large Miners?
Z Lu, R Zhang
European Symposium on Research in Computer Security, 285-305, 2023
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
S Wu, P Wei, R Zhang, B Jiang
Cryptology ePrint Archive, 2023
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate
J Niu, F Gai, R Han, R Zhang, Y Zhang, C Feng
IEEE Transactions on Dependable and Secure Computing 20 (5), 4154-4168, 2022
The system can't perform the operation now. Try again later.
Articles 1–16