default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2022
- Aydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis:
Multi-party Updatable Delegated Private Set Intersection. Financial Cryptography 2022: 100-119 - Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos:
Suborn Channels: Incentives Against Timelock Bribes. Financial Cryptography 2022: 488-511 - Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo:
Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. Financial Cryptography 2022: 358-373 - Sarah Azouvi, Alexander Hicks:
Decentralisation Conscious Players and System Reliability. Financial Cryptography 2022: 426-443 - Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang:
Short Paper: On the Claims of Weak Block Synchronization in Bitcoin. Financial Cryptography 2022: 663-671 - Massimo Bartoletti, James Hsin-yu Chiang, Alberto Lluch-Lafuente:
Maximizing Extractable Value from Automated Market Makers. Financial Cryptography 2022: 3-19 - Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. Financial Cryptography 2022: 337-357 - Christian Cachin, Jovana Micic, Nathalie Steinhauer, Luca Zanolini:
Quick Order Fairness. Financial Cryptography 2022: 316-333 - Ignacio Cascudo, Emanuele Giunta:
On Interactive Oracle Proofs for Boolean R1CS Statements. Financial Cryptography 2022: 230-247 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Blockchain Light Clients. Financial Cryptography 2022: 615-641 - Hongyin Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Linxuan Rong:
ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis. Financial Cryptography 2022: 407-425 - Tarun Chitra, Guillermo Angeris, Alex Evans:
Differential Privacy in Constant Function Market Makers. Financial Cryptography 2022: 149-178 - Shir Cohen, Rati Gelashvili, Eleftherios Kokoris-Kogias, Zekun Li, Dahlia Malkhi, Alberto Sonnino, Alexander Spiegelman:
Be Aware of Your Leaders. Financial Cryptography 2022: 279-295 - Nicolas Gailly, Mary Maller, Anca Nitulescu:
SnarkPack: Practical SNARK Aggregation. Financial Cryptography 2022: 203-229 - Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui:
Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. Financial Cryptography 2022: 20-37 - Rati Gelashvili, Guy Goren, Alexander Spiegelman:
Short Paper: On Game-Theoretically-Fair Leader Election. Financial Cryptography 2022: 531-538 - Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, Zhuolun Xiang:
Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback. Financial Cryptography 2022: 296-315 - Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Towards Overcoming the Undercutting Problem. Financial Cryptography 2022: 444-463 - Matthias Grundmann, Hedwig Amberg, Max Baumstark, Hannes Hartenstein:
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network. Financial Cryptography 2022: 694-704 - Lucjan Hanzlik, Kamil Kluczniak:
Explainable Arguments. Financial Cryptography 2022: 59-79 - Parikshit Hegde, Robert Streit, Yanni Georghiades, Chaya Ganesh, Sriram Vishwanath:
Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage. Financial Cryptography 2022: 642-660 - Ayelet Lotem, Sarah Azouvi, Patrick McCorry, Aviv Zohar:
Sliding Window Challenge Process for Congestion Detection. Financial Cryptography 2022: 512-530 - Malte Möser, Arvind Narayanan:
Resurrecting Address Clustering in Bitcoin. Financial Cryptography 2022: 386-403 - Joachim Neu, Ertem Nusret Tas, David Tse:
The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets. Financial Cryptography 2022: 541-559 - Duong Tung Nguyen, Ni Trieu:
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge. Financial Cryptography 2022: 80-99 - Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse:
Three Attacks on Proof-of-Stake Ethereum. Financial Cryptography 2022: 560-576 - István András Seres, Balázs Pejó, Péter Burcsi:
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? Financial Cryptography 2022: 123-148 - Tjerand Silde, Martin Strand:
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing. Financial Cryptography 2022: 179-199 - Nitin Singh, Pankaj Dayama, Vinayaka Pandit:
Zero Knowledge Proofs Towards Verifiable Decentralized AI Pipelines. Financial Cryptography 2022: 248-275 - Benjamin Terner:
Permissionless Consensus in the Resource Model. Financial Cryptography 2022: 577-593
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 17:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint