


default search action
23rd Financial Cryptography 2019: St. Kitts, St. Kitts and Nevis - Workshops
- Andrea Bracciali

, Jeremy Clark
, Federico Pintore
, Peter B. Rønne
, Massimiliano Sala
:
Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11599, Springer 2020, ISBN 978-3-030-43724-4
Trusted Smart Contracts
- Chris Buckland, Patrick McCorry:

Two-Party State Channels with Assertions. 3-11 - Taisei Takahashi

, Akira Otsuka:
Short Paper: Secure Offline Payments in Bitcoin. 12-20 - Aggelos Kiayias, Dionysis Zindros:

Proof-of-Work Sidechains. 21-34 - Patrick McCorry, Chris Buckland, Surya Bakshi, Karl Wüst, Andrew Miller:

You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies. 35-49 - Mahmudun Nabi

, Sepideh Avizheh, Muni Venkateswarlu Kumaramangalam, Reihaneh Safavi-Naini:
Game-Theoretic Analysis of an Incentivized Verifiable Computation System. 50-66 - Beltran Borja Fiz Pontiveros

, Christof Ferreira Torres
, Radu State:
Sluggish Mining: Profiting from the Verifier's Dilemma. 67-81 - Muhammad ElSheikh

, Jeremy Clark, Amr M. Youssef:
Short Paper: Deploying PayWord on Ethereum. 82-90 - Monika Di Angelo

, Christian Sack, Gernot Salzer
:
SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course. 91-105 - Richard Banach:

Verification-Led Smart Contracts. 106-121 - Fausto Spoto

:
A Java Framework for Smart Contracts. 122-137 - Silvia Crafa, Matteo Di Pirro, Elena Zucca:

Is Solidity Solid Enough? 138-153 - Weifeng Xu, Glenn A. Fink:

Building Executable Secure Design Models for Smart Contracts with Formal Methods. 154-169 - Shayan Eskandari, Seyedehmahsa Moosavi, Jeremy Clark:

SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain. 170-189 - Hisham S. Galal

, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum. 190-207
Advances in Secure Electronic Voting Schemes
- Michelle L. Blom

, Peter J. Stuckey, Vanessa J. Teague:
Election Manipulation 100. 211-225 - Kellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Philip B. Stark:

Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. 226-241 - Mayuri Sridhar, Ronald L. Rivest:

k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits. 242-256 - Karola Marky

, Marie-Laure Zollinger
, Markus Funk
, Peter Y. A. Ryan, Max Mühlhäuser
:
How to Assess the Usability Metrics of E-Voting Schemes. 257-271 - Rolf Haenni, Philipp Locher, Nicolas Gailly:

Improving the Performance of Cryptographic Voting Protocols. 272-288 - Hua Wu, Poorvi L. Vora, Filip Zagórski

:
PrivApollo - Secret Ballot E2E-V Internet Voting. 299-313 - Olivier Pereira, Peter B. Rønne

:
End-to-End Verifiable Quadratic Voting with Everlasting Privacy. 314-329 - Núria Costa, Ramiro Martínez

, Paz Morillo:
Lattice-Based Proof of a Shuffle. 330-346

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














