Financial Cryptography Workshops最新文献

筛选
英文 中文
Marked Mix-Nets 标志着Mix-Nets
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_22
Olivier Pereira, R. Rivest
{"title":"Marked Mix-Nets","authors":"Olivier Pereira, R. Rivest","doi":"10.1007/978-3-319-70278-0_22","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_22","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"30 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Smart Contracts Make Bitcoin Mining Pools Vulnerable 智能合约使比特币矿池变得脆弱
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_19
Yaron Velner, Jason Teutsch, Loi Luu
{"title":"Smart Contracts Make Bitcoin Mining Pools Vulnerable","authors":"Yaron Velner, Jason Teutsch, Loi Luu","doi":"10.1007/978-3-319-70278-0_19","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_19","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124990191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper x平台网络钓鱼:滥用信任进行针对性攻击
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_37
Hossein Siadati, T. Nguyen, N. Memon
{"title":"X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper","authors":"Hossein Siadati, T. Nguyen, N. Memon","doi":"10.1007/978-3-319-70278-0_37","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_37","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Bitcoin Transactions with Covenants 通过契约加强比特币交易
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_12
Russell O'Connor, M. Piekarska
{"title":"Enhancing Bitcoin Transactions with Covenants","authors":"Russell O'Connor, M. Piekarska","doi":"10.1007/978-3-319-70278-0_12","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_12","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
What to Phish in a Subject? 在主题中如何钓鱼?
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_38
A. Ferreira, Rui Chilro
{"title":"What to Phish in a Subject?","authors":"A. Ferreira, Rui Chilro","doi":"10.1007/978-3-319-70278-0_38","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_38","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Private Outsourced Kriging Interpolation 私人外包克里格插值
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_5
James Alderman, Benjamin R. Curtis, O. Farràs, K. Martin, Jordi Ribes-González
{"title":"Private Outsourced Kriging Interpolation","authors":"James Alderman, Benjamin R. Curtis, O. Farràs, K. Martin, Jordi Ribes-González","doi":"10.1007/978-3-319-70278-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_5","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unpacking Spear Phishing Susceptibility 拆封鱼叉式网络钓鱼的易感性
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_39
Z. Benenson, Freya Gassmann, Robert Landwirth
{"title":"Unpacking Spear Phishing Susceptibility","authors":"Z. Benenson, Freya Gassmann, Robert Landwirth","doi":"10.1007/978-3-319-70278-0_39","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_39","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Mixing Coins of Different Quality: A Game-Theoretic Approach 混合不同质量的硬币:一种博弈论方法
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_18
S. Abramova, Pascal Schöttle, Rainer Böhme
{"title":"Mixing Coins of Different Quality: A Game-Theoretic Approach","authors":"S. Abramova, Pascal Schöttle, Rainer Böhme","doi":"10.1007/978-3-319-70278-0_18","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_18","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multi-level Access in Searchable Symmetric Encryption 可搜索对称加密中的多级访问
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_3
James Alderman, K. Martin, Sarah Louise Renwick
{"title":"Multi-level Access in Searchable Symmetric Encryption","authors":"James Alderman, K. Martin, Sarah Louise Renwick","doi":"10.1007/978-3-319-70278-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_3","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128558504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Enabling Vote Delegation for Boardroom Voting 授权授权董事会投票
Financial Cryptography Workshops Pub Date : 2017-04-03 DOI: 10.1007/978-3-319-70278-0_26
O. Kulyk, Stephan Neumann, Karola Marky, M. Volkamer
{"title":"Enabling Vote Delegation for Boardroom Voting","authors":"O. Kulyk, Stephan Neumann, Karola Marky, M. Volkamer","doi":"10.1007/978-3-319-70278-0_26","DOIUrl":"https://doi.org/10.1007/978-3-319-70278-0_26","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信