


default search action
20th Financial Cryptography 2016: Christ Church, Barbados - Workshops
- Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:

Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7
Third Workshop on Bitcoin and Blockchain Research, BITCOIN 2016
- Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver:

Stressing Out: Bitcoin "Stress Testing". 3-18 - Joseph Bonneau:

Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus. 19-26 - Mathieu Turuani, Thomas Voegtlin, Michaël Rusinowitch:

Automated Verification of Electrum Wallet. 27-42 - Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:

Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. 43-60 - Aggelos Kiayias, Nikolaos Lamprou, Aikaterini-Panagiota Stouka:

Proofs of Proofs of Work with Sublinear Complexity. 61-78 - Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. 79-94 - Joseph Bonneau:

EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log. 95-105 - Kyle Croman, Christian Decker

, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). 106-125 - Malte Möser, Ittay Eyal, Emin Gün Sirer:

Bitcoin Covenants. 126-141 - Iddo Bentov, Ariel Gabizon, Alex Mizrahi:

Cryptocurrencies Without Proof of Work. 142-157
First Workshop on Secure Voting Systems, VOTING 2016
- Philipp Locher, Rolf Haenni, Reto E. Koenig:

Coercion-Resistant Internet Voting with Everlasting Privacy. 161-175 - Peter Y. A. Ryan

, Peter B. Rønne
, Vincenzo Iovino
:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. 176-192 - Rosario Giustolisi

, Vincenzo Iovino
, Peter B. Rønne
:
On the Possibility of Non-interactive E-Voting in the Public-Key Setting. 193-208 - Oksana Kulyk, Melanie Volkamer:

Efficiency Comparison of Various Approaches in E-Voting Protocols. 209-223 - Roberto Araújo, Amira Barki, Solenn Brunet, Jacques Traoré:

Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant. 224-232 - Alex Escala, Sandra Guasch, Javier Herranz

, Paz Morillo:
Universal Cast-as-Intended Verifiability. 233-250
4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016
- Gamze Tillem, Ömer Mert Candan, Erkay Savas, Kamer Kaya:

Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM. 253-270 - Liisi Kerik, Peeter Laud, Jaak Randmets:

Optimizing MPC for Robust and Scalable Integer and Floating-Point Arithmetic. 271-287 - Yarkin Doröz, Gizem S. Çetin, Berk Sunar:

On-the-fly Homomorphic Batching/Unbatching. 288-301 - Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler

, Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. 302-318 - Mamadou H. Diallo, Michael August, Roger Hallman

, Megan Kline, Henry Au, Vic Beach:
CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework. 319-327 - Erman Ayday:

Cryptographic Solutions for Genomic Privacy. 328-341

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














