default search action
19th Financial Cryptography 2015: San Juan, Puerto Rico - Workshops
- Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8976, Springer 2015, ISBN 978-3-662-48050-2 - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
On the Malleability of Bitcoin Transactions. 1-18 - Malte Möser, Rainer Böhme:
Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. 19-33 - Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin: Powering Next-Generation Botnets with Bitcoin. 34-48 - John Tromp:
Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work. 49-62 - Aron Laszka, Benjamin Johnson, Jens Grossklags:
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools. 63-77 - David Vandervort, Dale E. Gaucas, Robert St. Jacques:
Issues in Designing a Bitcoin-like Community Currency. 78-91 - Garrick Hileman:
The Bitcoin Market Potential Index. 92-93 - Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. 94-111 - Luke Valenta, Brendan Rowan:
Blindcoin: Blinded, Accountable Mixes for Bitcoin. 112-126 - Sarah Meiklejohn, Claudio Orlandi:
Privacy-Enhancing Overlays in Bitcoin. 127-141 - Jung Hee Cheon, Miran Kim, Myungsun Kim:
Search-and-Compute on Encrypted Data. 142-159 - Wei Dai, Yarkin Doröz, Berk Sunar:
Accelerating SWHE Based PIRs Using GPUs. 160-171 - Pille Pullonen, Sander Siim:
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations. 172-183 - Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 184-193 - Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. 194-212 - Mayank Varia, Sophia Yakoubov, Yang Yang:
HEtest: A Homomorphic Encryption Testing Framework. 213-230 - Vivian Genaro Motti, Kelly Caine:
Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected. 231-244 - Mohsen Toorani:
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard. 245-260 - Patrik Lantz, Björn Johansson, Martin Hell, Ben J. M. Smeets:
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. 261-273 - Katharina Krombholz, Adrian Dabrowski, Matthew Smith, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. 274-280 - Dhruv Kumar Yadav, Beatrice Ionascu, Sai Vamsi Krishna Ongole, Aditi Roy, Nasir D. Memon:
Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass. 281-297 - Pan Chan, Tzipora Halevi, Nasir D. Memon:
Glass OTP: Secure and Convenient User Authentication on Google Glass. 298-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.