Search

Showing total 3,161 results

Search Constraints

Start Over You searched for: Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publication Type eBooks Remove constraint Publication Type: eBooks Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
3,161 results

Search Results

1. Short Paper: Ballot Secrecy for Liquid Democracy

3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

4. Short Paper: Debt Representation in UTXO Blockchains

5. Hostile Blockchain Takeovers (Short Paper)

6. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice : (Short Paper)

7. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

8. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

9. Cross-Layer Deanonymization Methods in the Lightning Protocol

10. An Empirical Analysis of Privacy in the Lightning Network

11. ACeD: Scalable Data Availability Oracle

12. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

14. On-Chain Smart Contract Verification over Tendermint

15. DeFi as an Information Aggregator

16. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies

17. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)

18. Private eCash in Practice (Short Paper)

19. A Short Paper on Blind Signatures from Knowledge Assumptions

20. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

21. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

22. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

23. Speculative Dereferencing: Reviving Foreshadow

24. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

25. Improving the Efficiency of AES Protocols in Multi-Party Computation

26. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)

27. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts

28. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies

29. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

30. Liquidations: DeFi on a Knife-Edge

31. Fast Isomorphic State Channels

32. Congestion Attacks in Payment Channel Networks

33. Ignore the Extra Zeroes: Variance-Optimal Mining Pools

34. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments

35. Brick: Asynchronous Incentive-Compatible Payment Channels

36. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin

43. EthVer: Formal Verification of Randomized Ethereum Smart Contracts

44. Empirical Analysis of On-chain Voting with Smart Contracts

45. Absentia: Secure Multiparty Computation on Ethereum

46. Publicly Verifiable and Secrecy Preserving Periodic Auctions

47. Red-Black Coins: Dai Without Liquidations

48. Mobile Voting – Still Too Risky?

49. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle

50. Auditing Hamiltonian Elections