Search

Showing total 302,956 results

Search Constraints

Start Over You searched for: Database Jio Institute Digital Library Catalog Remove constraint Database: Jio Institute Digital Library Catalog Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
302,956 results

Search Results

1. Short Paper: Ballot Secrecy for Liquid Democracy

3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

4. Short Paper: Debt Representation in UTXO Blockchains

5. Hostile Blockchain Takeovers (Short Paper)

6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)

7. Artificial life and intelligent agents: second international symposium, ALIA 2016, Birmingham, UK, June 14-15, 2016, revised selected papers.

9. Paper-Based Inkjet Electrodes : Experimental Study for ECG Applications

10. Cross-Layer Deanonymization Methods in the Lightning Protocol

11. An Empirical Analysis of Privacy in the Lightning Network

12. ACeD: Scalable Data Availability Oracle

13. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

15. On-Chain Smart Contract Verification over Tendermint

16. DeFi as an Information Aggregator

17. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies

19. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

20. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

21. Artificial intelligence for knowledge management : second IFIP WG 12.6 International Workshop, AI4KM 2014, Warsaw, Poland, September 7-10, 2014, revised selected papers.

22. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

23. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

24. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

25. Speculative Dereferencing: Reviving Foreshadow

26. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

27. Improving the Efficiency of AES Protocols in Multi-Party Computation

28. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)

29. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts

30. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies

31. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

32. Liquidations: DeFi on a Knife-Edge

33. Fast Isomorphic State Channels

34. Congestion Attacks in Payment Channel Networks

35. Ignore the Extra Zeroes: Variance-Optimal Mining Pools

36. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments

37. Brick: Asynchronous Incentive-Compatible Payment Channels

38. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin

45. EthVer: Formal Verification of Randomized Ethereum Smart Contracts

46. Empirical Analysis of On-chain Voting with Smart Contracts

47. Absentia: Secure Multiparty Computation on Ethereum

48. Publicly Verifiable and Secrecy Preserving Periodic Auctions

49. Red-Black Coins: Dai Without Liquidations

50. Mobile Voting – Still Too Risky?