


default search action
22nd Financial Cryptography 2018: Nieuwpoort, Curaçao, The Netherlands
- Sarah Meiklejohn, Kazue Sako:

Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10957, Springer 2018, ISBN 978-3-662-58386-9
Privacy
- George Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter:

"Major Key Alert!" Anomalous Keys in Tor Relays. 3-19 - David A. Basin, Søren Debois, Thomas T. Hildebrandt:

On Purpose and by Necessity: Compliance Under the GDPR. 20-37 - Rahul Parhi

, Michael Schliep, Nicholas Hopper:
MP3: A More Efficient Private Presence Protocol. 38-57
Cryptographic Integrity
- Hovav Shacham:

Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model). 61-79 - Marten van Dijk

, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
:
Weak-Unforgeable Tags for Secure Supply Chain Management. 80-98 - Ian Martiny, Ian Miers, Eric Wustrow:

Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers. 99-115
Economic and Usability Analysis
- Sadegh Farhang, Aron Laszka

, Jens Grossklags:
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. 119-137 - Aron Laszka

, Mingyi Zhao, Akash Malbari, Jens Grossklags:
The Rules of Engagement for Bug Bounty Programs. 138-159 - Sanchari Das, Andrew Dingman, L. Jean Camp:

Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. 160-179
Privacy and Data Processing
- Christina Boura, Ilaria Chillotti

, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric:
High-Precision Privacy-Preserving Real-Valued Function Evaluation. 183-202 - Amanda Cristina Davi Resende, Diego F. Aranha:

Faster Unbalanced Private Set Intersection. 203-221 - Vladimir Kolesnikov, Mike Rosulek, Ni Trieu:

SWiM: Secure Wildcard Pattern Matching from OT Extension. 222-240
Attacks
- Maxime Meyer, Elizabeth A. Quaglia

, Ben Smyth:
Attacks Against GSMA's M2M Remote Provisioning (Short Paper). 243-252 - Gildas Avoine, Loïc Ferreira:

Rescuing LoRaWAN 1.0. 253-271 - Jordan Holland, R. Joseph Connor, J. Parker Diamond, Jared M. Smith, Max Schuchard:

Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors. 272-287
Applied Cryptography
- Abdelrahaman Aly, Aysajan Abidin

, Svetla Nikova
:
Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition. 291-309 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:

A Fourier Analysis Based Attack Against Physically Unclonable Functions. 310-328 - Jeremiah Blocki

, Samson Zhou:
On the Computational Complexity of Minimal Cumulative Cost Graph Pebbling. 329-346
Anonymity in Distributed Systems
- Daniel G. Arce, Rainer Böhme:

Pricing Anonymity. 349-368 - Sepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti:

A New Look at the Refund Mechanism in the Bitcoin Payment Protocol. 369-387 - Ali El Kaafarani, Shuichi Katsumata, Ravital Solomon:

Anonymous Reputation Systems Achieving Full Dynamicity from Lattices. 388-406
Blockchain Measurements
- Danny Yuxing Huang, Kirill Levchenko, Alex C. Snoeren:

Estimating Profitability of Alternative Cryptocurrencies (Short Paper). 409-419 - Roman Matzutt

, Jens Hiller
, Martin Henze
, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle
:
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. 420-438 - Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer:

Decentralization in Bitcoin and Ethereum Networks. 439-457
Blockchain Protocols
- Huang Zhang

, Fangguo Zhang
, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. 461-479 - Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak:

SpaceMint: A Cryptocurrency Based on Proofs of Space. 480-499 - Bernardo David, Rafael Dowsley, Mario Larangeira:

Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. 500-519
Blockchain Modeling
- Anastasia Mavridou, Aron Laszka

:
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach. 523-540 - Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino

:
A Formal Model of Bitcoin Transactions. 541-560

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














