Search

Showing total 300,992 results

Search Constraints

Start Over You searched for: Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
300,992 results

Search Results

1. Short Paper: Ballot Secrecy for Liquid Democracy

3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

4. Short Paper: Debt Representation in UTXO Blockchains

5. Cross-Layer Deanonymization Methods in the Lightning Protocol

6. An Empirical Analysis of Privacy in the Lightning Network

7. ACeD: Scalable Data Availability Oracle

8. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

10. On-Chain Smart Contract Verification over Tendermint

11. DeFi as an Information Aggregator

12. Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies

13. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

14. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

15. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

16. Speculative Dereferencing: Reviving Foreshadow

17. Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

18. Improving the Efficiency of AES Protocols in Multi-Party Computation

19. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)

20. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts

21. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies

22. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

23. Liquidations: DeFi on a Knife-Edge

24. Fast Isomorphic State Channels

25. Congestion Attacks in Payment Channel Networks

26. Ignore the Extra Zeroes: Variance-Optimal Mining Pools

27. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments

28. Brick: Asynchronous Incentive-Compatible Payment Channels

29. FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin

36. EthVer: Formal Verification of Randomized Ethereum Smart Contracts

37. Empirical Analysis of On-chain Voting with Smart Contracts

38. Absentia: Secure Multiparty Computation on Ethereum

39. Publicly Verifiable and Secrecy Preserving Periodic Auctions

40. Red-Black Coins: Dai Without Liquidations

41. Mobile Voting – Still Too Risky?

42. Shorter Lattice-Based Zero-Knowledge Proofs for the Correctness of a Shuffle

43. Auditing Hamiltonian Elections

44. Towards a Theory of Decentralized Finance

45. Formal Analysis of Composable DeFi Protocols

46. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis

47. Market Based Mechanisms for Incentivising Exchange Liquidity Provision

48. Fairness in ERC Token Markets: A Case Study of CryptoKitties

49. Standardized Crypto-Loans on the Cardano Blockchain

50. Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks