Search

Showing total 6,472 results

Search Constraints

Start Over You searched for: Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publication Type eBooks Remove constraint Publication Type: eBooks Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
6,472 results

Search Results

1. Short Paper: Ballot Secrecy for Liquid Democracy

3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

4. Short Paper: Debt Representation in UTXO Blockchains

5. Hostile Blockchain Takeovers (Short Paper)

6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)

7. Cross-Layer Deanonymization Methods in the Lightning Protocol

8. An Empirical Analysis of Privacy in the Lightning Network

9. ACeD: Scalable Data Availability Oracle

10. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

12. On-Chain Smart Contract Verification over Tendermint

13. DeFi as an Information Aggregator

14. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies

15. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

16. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

17. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

18. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

19. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

20. Speculative Dereferencing: Reviving Foreshadow

21. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

22. Improving the Efficiency of AES Protocols in Multi-Party Computation

23. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)

24. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts

25. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies

26. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

27. Liquidations: DeFi on a Knife-Edge

28. Fast Isomorphic State Channels

29. Congestion Attacks in Payment Channel Networks

30. Ignore the Extra Zeroes: Variance-Optimal Mining Pools

31. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments

32. Brick: Asynchronous Incentive-Compatible Payment Channels

33. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin

40. EthVer: Formal Verification of Randomized Ethereum Smart Contracts

41. Empirical Analysis of On-chain Voting with Smart Contracts

42. Absentia: Secure Multiparty Computation on Ethereum

43. Publicly Verifiable and Secrecy Preserving Periodic Auctions

44. Red-Black Coins: Dai Without Liquidations

45. Mobile Voting – Still Too Risky?

46. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle

47. Auditing Hamiltonian Elections

48. Towards a Theory of Decentralized Finance

49. Formal Analysis of Composable DeFi Protocols

50. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis