default search action
23rd Financial Cryptography 2019: St. Kitts, St. Kitts and Nevis - Workshops
- Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11599, Springer 2020, ISBN 978-3-030-43724-4
Trusted Smart Contracts
- Chris Buckland, Patrick McCorry:
Two-Party State Channels with Assertions. 3-11 - Taisei Takahashi, Akira Otsuka:
Short Paper: Secure Offline Payments in Bitcoin. 12-20 - Aggelos Kiayias, Dionysis Zindros:
Proof-of-Work Sidechains. 21-34 - Patrick McCorry, Chris Buckland, Surya Bakshi, Karl Wüst, Andrew Miller:
You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies. 35-49 - Mahmudun Nabi, Sepideh Avizheh, Muni Venkateswarlu Kumaramangalam, Reihaneh Safavi-Naini:
Game-Theoretic Analysis of an Incentivized Verifiable Computation System. 50-66 - Beltran Borja Fiz Pontiveros, Christof Ferreira Torres, Radu State:
Sluggish Mining: Profiting from the Verifier's Dilemma. 67-81 - Muhammad ElSheikh, Jeremy Clark, Amr M. Youssef:
Short Paper: Deploying PayWord on Ethereum. 82-90 - Monika Di Angelo, Christian Sack, Gernot Salzer:
SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course. 91-105 - Richard Banach:
Verification-Led Smart Contracts. 106-121 - Fausto Spoto:
A Java Framework for Smart Contracts. 122-137 - Silvia Crafa, Matteo Di Pirro, Elena Zucca:
Is Solidity Solid Enough? 138-153 - Weifeng Xu, Glenn A. Fink:
Building Executable Secure Design Models for Smart Contracts with Formal Methods. 154-169 - Shayan Eskandari, Seyedehmahsa Moosavi, Jeremy Clark:
SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain. 170-189 - Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum. 190-207
Advances in Secure Electronic Voting Schemes
- Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Election Manipulation 100. 211-225 - Kellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Philip B. Stark:
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. 226-241 - Mayuri Sridhar, Ronald L. Rivest:
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits. 242-256 - Karola Marky, Marie-Laure Zollinger, Markus Funk, Peter Y. A. Ryan, Max Mühlhäuser:
How to Assess the Usability Metrics of E-Voting Schemes. 257-271 - Rolf Haenni, Philipp Locher, Nicolas Gailly:
Improving the Performance of Cryptographic Voting Protocols. 272-288 - Hua Wu, Poorvi L. Vora, Filip Zagórski:
PrivApollo - Secret Ballot E2E-V Internet Voting. 299-313 - Olivier Pereira, Peter B. Rønne:
End-to-End Verifiable Quadratic Voting with Everlasting Privacy. 314-329 - Núria Costa, Ramiro Martínez, Paz Morillo:
Lattice-Based Proof of a Shuffle. 330-346
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.