default search action
18th Financial Cryptography 2014: Christ Church, Barbados - Workshops
- Rainer Böhme, Michael Brenner, Tyler Moore, Matthew Smith:
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer 2014, ISBN 978-3-662-44773-4
Bitcoin Transactions, Policy and Legal Issues
- Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? 3-15 - Malte Möser, Rainer Böhme, Dominic Breuker:
Towards Risk Scoring of Bitcoin Transactions. 16-32 - David Vandervort:
Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System. 33-42 - Franziska Boehm, Paulina Pesch:
Bitcoin: A First Legal Analysis - With Reference to German and US-American Law. 43-54
Bitcoin Security
- Marie Vasek, Micah Thornton, Tyler Moore:
Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem. 57-71 - Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore:
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. 72-86 - Joan Antoni Donet Donet, Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
The Bitcoin P2P Network. 87-102
Improving Digital Currencies
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Fair Two-Party Computations via Bitcoin Deposits. 105-121 - Amitabh Saxena, Janardan Misra, Aritra Dhar:
Increasing Anonymity in Bitcoin. 122-139 - Christina Garman, Matthew Green, Ian Miers, Aviel D. Rubin:
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity. 140-155
Bitcoin Poster Abstracts
- Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, Moti Yung:
On Offline Payments with Bitcoin (Poster Abstract). 159-160 - Ethan Heilman:
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract). 161-162 - Garrick Hileman:
From Bitcoin to the Brixton Pound: History and Prospects for Alternative Currencies (Poster Abstract). 163-165
Applied Homomorphic Cryptography and Encrypted Computing
- Xiaolin Cao, Ciara Moore, Máire O'Neill, Neil Hanley, Elizabeth O'Sullivan:
High-Speed Fully Homomorphic Encryption Over the Integers. 169-180 - Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, Rebecca N. Wright:
Practical and Privacy-Preserving Policy Compliance for Outsourced Data. 181-194 - Yarkin Doröz, Berk Sunar, Ghaith Hammouri:
Bandwidth Efficient PIR from NTRU. 195-207 - Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar:
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince. 208-220 - Kurt Rohloff, David Bruce Cousins:
A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU. 221-234 - Seny Kamara:
Restructuring the NSA Metadata Program. 235-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.