Search

Showing total 302,952 results

Search Constraints

Start Over You searched for: Publication Type Reviews Remove constraint Publication Type: Reviews Publication Type eBooks Remove constraint Publication Type: eBooks Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
302,952 results

Search Results

1. Short Paper: Ballot Secrecy for Liquid Democracy

3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

4. Short Paper: Debt Representation in UTXO Blockchains

5. Hostile Blockchain Takeovers (Short Paper)

6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)

8. Paper-Based Inkjet Electrodes : Experimental Study for ECG Applications

9. Cross-Layer Deanonymization Methods in the Lightning Protocol

10. An Empirical Analysis of Privacy in the Lightning Network

11. ACeD: Scalable Data Availability Oracle

12. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

14. On-Chain Smart Contract Verification over Tendermint

15. DeFi as an Information Aggregator

16. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies

18. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

19. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

20. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

21. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

22. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

23. Speculative Dereferencing: Reviving Foreshadow

24. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

25. Improving the Efficiency of AES Protocols in Multi-Party Computation

26. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)

27. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts

28. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies

29. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

30. Liquidations: DeFi on a Knife-Edge

31. Fast Isomorphic State Channels

32. Congestion Attacks in Payment Channel Networks

33. Ignore the Extra Zeroes: Variance-Optimal Mining Pools

34. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments

35. Brick: Asynchronous Incentive-Compatible Payment Channels

36. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin

43. EthVer: Formal Verification of Randomized Ethereum Smart Contracts

44. Empirical Analysis of On-chain Voting with Smart Contracts

45. Absentia: Secure Multiparty Computation on Ethereum

46. Publicly Verifiable and Secrecy Preserving Periodic Auctions

47. Red-Black Coins: Dai Without Liquidations

48. Mobile Voting – Still Too Risky?

49. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle

50. Auditing Hamiltonian Elections