GI

Georgy Ishmaev

19 records found

Authored

DESCAN

Censorship-resistant indexing and search for Web3

The popularity of blockchain technology has bootstrapped many “Web3” applications, e.g., Ethereum and IPFS, that apply distributed ledger technology to store transactions. The amount of transactions generated and stored in such Web3 applications is significant and, in its raw ...

Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. Fair distribution of rewards, however, is still a persistent problem in the current generation of decentralized applications using token-based in ...

LO

An Accountable Mempool for MEV Resistance

Manipulation of user transactions by miners in permissionless blockchain systems is a growing concern. This problem is a pervasive and systemic issue that incurs high costs for users of decentralised applications and is known as Miner Extractable Value (MEV). Furthermore, tran ...

Catalyzed by the popularity of blockchain technology, there has recently been a renewed interest in the design, implementation and evaluation of decentralized systems. Most of these systems are intended to be deployed at scale and in heterogeneous environments with real users and ...

MeritRank

Sybil Tolerant Reputation for Merit-based Tokenomics

Decentralized reputation schemes present a promising area of experimentation in blockchain applications. These solutions aim to overcome the shortcomings of simple monetary incentive mechanisms of naive tokenomics. However, there is a significant research gap regarding the limita ...

The landscape of electronic marketplaces has been monopolized by a handful of market operators that have accumulated tremendous power during the last decades. This trend raises concerns about fairness and market manipulation by these operators acting as gatekeepers. These conc ...

The growing number of implementations of blockchain systems stands in stark contrast with still limited research on a systematic comparison of performance characteristics of these solutions. Such research is crucial for evaluating fundamental trade-offs introduced by novel consen ...

In this paper, we explore solution directions for the implementation of Safe by Design (SbD) in safety regimes for academic experimentation. SbD is a dynamic and anticipatory strategy for safety regulation in academic research. In this strategy, safety is taken in a broader se ...

Ethics in the COVID-19 pandemic

Myths, false dilemmas, and moral overload

Existing digital identity management systems fail to deliver the desirable properties of control by the users of their own identity data, credibility of disclosed identity data, and network-level anonymity. The recently proposed Self-Sovereign Identity (SSI) approach promises to ...

MATCH

A Decentralized Middleware for Fair Matchmaking In Peer-to-Peer Markets

Matchmaking is a core enabling element in peer-to-peer markets. To date, matchmaking is predominantly performed by proprietary algorithms, fully controlled by market operators. This raises fairness concerns as market operators effectively can hide, prioritize, or delay the orders ...

Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued ...

Fictions and frictions

Promises, transaction costs and the innovation of network technologies

New network technologies are framed as eliminating ‘transaction costs’, a notion first developed in economic theory that now drives the design of market systems. However, the actual promise of the elimination of transaction costs seems unfeasible, because of a cyclical pattern ...

The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler fo ...
This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest presents solutions aimed at reorganizing data flows in the Internet of Th ...
This chapter argues that the choice of trust conceptualisations in the context of consumer Internet of Things (IoT) can have a significant impact on the understanding and implementations of a user’s private data protection. Narrow instrumental interpretations of trust as a mere p ...

This paper argues that the practical implementation of blockchain technology can be considered an institution of property similar to legal institutions. Invoking Penner's theory of property and Hegel's system of property rights, and using the example of bitcoin, it is possible ...

Contributed

This open access book shows how value sensitive design (VSD), responsible innovation, and comprehensive engineering can guide the rapid development of technological responses to the COVID-19 crisis. Responding to the ethical challenges of data-driven technologies and other tools ...
This open access book shows how value sensitive design (VSD), responsible innovation, and comprehensive engineering can guide the rapid development of technological responses to the COVID-19 crisis. Responding to the ethical challenges of data-driven technologies and other tools ...
This open access book shows how value sensitive design (VSD), responsible innovation, and comprehensive engineering can guide the rapid development of technological responses to the COVID-19 crisis. Responding to the ethical challenges of data-driven technologies and other tools ...