default search action
22nd Financial Cryptography 2018: Nieuwpoort, Curaçao, The Netherlands
- Sarah Meiklejohn, Kazue Sako:
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10957, Springer 2018, ISBN 978-3-662-58386-9
Privacy
- George Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter:
"Major Key Alert!" Anomalous Keys in Tor Relays. 3-19 - David A. Basin, Søren Debois, Thomas T. Hildebrandt:
On Purpose and by Necessity: Compliance Under the GDPR. 20-37 - Rahul Parhi, Michael Schliep, Nicholas Hopper:
MP3: A More Efficient Private Presence Protocol. 38-57
Cryptographic Integrity
- Hovav Shacham:
Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model). 61-79 - Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. 80-98 - Ian Martiny, Ian Miers, Eric Wustrow:
Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers. 99-115
Economic and Usability Analysis
- Sadegh Farhang, Aron Laszka, Jens Grossklags:
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. 119-137 - Aron Laszka, Mingyi Zhao, Akash Malbari, Jens Grossklags:
The Rules of Engagement for Bug Bounty Programs. 138-159 - Sanchari Das, Andrew Dingman, L. Jean Camp:
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. 160-179
Privacy and Data Processing
- Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric:
High-Precision Privacy-Preserving Real-Valued Function Evaluation. 183-202 - Amanda Cristina Davi Resende, Diego F. Aranha:
Faster Unbalanced Private Set Intersection. 203-221 - Vladimir Kolesnikov, Mike Rosulek, Ni Trieu:
SWiM: Secure Wildcard Pattern Matching from OT Extension. 222-240
Attacks
- Maxime Meyer, Elizabeth A. Quaglia, Ben Smyth:
Attacks Against GSMA's M2M Remote Provisioning (Short Paper). 243-252 - Gildas Avoine, Loïc Ferreira:
Rescuing LoRaWAN 1.0. 253-271 - Jordan Holland, R. Joseph Connor, J. Parker Diamond, Jared M. Smith, Max Schuchard:
Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors. 272-287
Applied Cryptography
- Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition. 291-309 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
A Fourier Analysis Based Attack Against Physically Unclonable Functions. 310-328 - Jeremiah Blocki, Samson Zhou:
On the Computational Complexity of Minimal Cumulative Cost Graph Pebbling. 329-346
Anonymity in Distributed Systems
- Daniel G. Arce, Rainer Böhme:
Pricing Anonymity. 349-368 - Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:
A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. 369-387 - Ali El Kaafarani, Shuichi Katsumata, Ravital Solomon:
Anonymous Reputation Systems Achieving Full Dynamicity from Lattices. 388-406
Blockchain Measurements
- Danny Yuxing Huang, Kirill Levchenko, Alex C. Snoeren:
Estimating Profitability of Alternative Cryptocurrencies (Short Paper). 409-419 - Roman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle:
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. 420-438 - Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer:
Decentralization in Bitcoin and Ethereum Networks. 439-457
Blockchain Protocols
- Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. 461-479 - Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak:
SpaceMint: A Cryptocurrency Based on Proofs of Space. 480-499 - Bernardo David, Rafael Dowsley, Mario Larangeira:
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. 500-519
Blockchain Modeling
- Anastasia Mavridou, Aron Laszka:
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach. 523-540 - Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino:
A Formal Model of Bitcoin Transactions. 541-560
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.