| SoK: Consensus in the age of blockchains S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ... Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 802 | 2019 |
| A smart contract for boardroom voting with maximum voter privacy P McCorry, SF Shahandashti, F Hao International conference on financial cryptography and data security, 357-375, 2017 | 738 | 2017 |
| Sprites and state channels: Payment networks that go faster than lightning A Miller, I Bentov, S Bakshi, R Kumaresan, P McCorry International conference on financial cryptography and data security, 508-526, 2019 | 534 | 2019 |
| Sok: Layer-two blockchain protocols L Gudgeon, P Moreno-Sanchez, S Roos, P McCorry, A Gervais International Conference on Financial Cryptography and Data Security, 201-226, 2020 | 433 | 2020 |
| Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing C Dong, Y Wang, A Aldweesh, P McCorry, A Van Moorsel Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 233 | 2017 |
| Sok: Off the chain transactions L Gudgeon, P Moreno-Sanchez, S Roos, P McCorry, A Gervais IACR Cryptol. ePrint Arch., 2019 | 188 | 2019 |
| Pisa: Arbitration outsourcing for state channels P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 180 | 2019 |
| PosterVote: expanding the action repertoire for local political activism V Vlachokyriakos, R Comber, K Ladha, N Taylor, P Dunphy, P McCorry, ... Proceedings of the 2014 conference on Designing interactive systems, 795-804, 2014 | 153 | 2014 |
| Smart contracts for bribing miners P McCorry, A Hicks, S Meiklejohn International Conference on Financial Cryptography and Data Security, 3-18, 2018 | 148 | 2018 |
| Towards bitcoin payment networks P McCorry, M Möser, SF Shahandasti, F Hao Australasian conference on information security and privacy, 57-76, 2016 | 121 | 2016 |
| ZombieCoin 2.0: managing next-generation botnets using Bitcoin ST Ali, P McCorry, PHJ Lee, F Hao International Journal of Information Security 17 (4), 411-422, 2018 | 84 | 2018 |
| Zombiecoin: Powering next-generation botnets with bitcoin ST Ali, P McCorry, PHJ Lee, F Hao International Conference on Financial Cryptography and Data Security, 34-48, 2015 | 81 | 2015 |
| Bitcoin: perils of an unregulated global P2P currency (Transcript of Discussion) ST Ali Cambridge international workshop on security protocols, 294-306, 2015 | 80 | 2015 |
| Sok: Validating bridges as a scaling solution for blockchains P McCorry, C Buckland, B Yee, D Song Cryptology ePrint Archive, 2021 | 78 | 2021 |
| Refund attacks on Bitcoin’s payment protocol P McCorry, SF Shahandashti, F Hao International Conference on Financial Cryptography and Data Security, 581-599, 2016 | 58 | 2016 |
| Betting on blockchain consensus with fantomette S Azouvi, P McCorry, S Meiklejohn arXiv preprint arXiv:1805.06786, 2018 | 47 | 2018 |
| Why preventing a cryptocurrency exchange heist isn’t good enough P McCorry, M Möser, ST Ali Cambridge International Workshop on Security Protocols, 225-233, 2018 | 43 | 2018 |
| You sank my battleship! a case study to evaluate state channels as a scaling solution for cryptocurrencies P McCorry, C Buckland, S Bakshi, K Wüst, A Miller International Conference on Financial Cryptography and Data Security, 35-49, 2019 | 37 | 2019 |
| On secure e-voting over blockchain P McCorry, M Mehrnezhad, E Toreini, SF Shahandashti, F Hao Digital Threats: Research and Practice (DTRAP) 2 (4), 1-13, 2021 | 36 | 2021 |
| Winning the caucus race: Continuous leader election via public randomness S Azouvi, P McCorry, S Meiklejohn arXiv preprint arXiv:1801.07965, 2018 | 34 | 2018 |