Kellie Ottoboni, Matthew Bernhard, J. A. Halderman, R. Rivest, P. Stark
{"title":"Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits","authors":"Kellie Ottoboni, Matthew Bernhard, J. A. Halderman, R. Rivest, P. Stark","doi":"10.1007/978-3-030-43725-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-43725-1_16","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126832282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits","authors":"Mayuri Sridhar, R. Rivest","doi":"10.1007/978-3-030-43725-1_17","DOIUrl":"https://doi.org/10.1007/978-3-030-43725-1_17","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, E. Weippl, W. Knottenbelt
{"title":"A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper)","authors":"Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, E. Weippl, W. Knottenbelt","doi":"10.1007/978-3-662-58820-8_3","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_3","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125937648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of the Legal Concept of Title Rights in Real Estate and the Technology of Tokens: How Can Titles Become Tokens?","authors":"O. Konashevych","doi":"10.1007/978-3-662-58820-8_23","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_23","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"37 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling a Bulletin Board Service Based on Broadcast Channels with Memory","authors":"Severin Hauser, R. Haenni","doi":"10.1007/978-3-662-58820-8_16","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_16","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voting Technologies, Recount Methods and Votes in Wisconsin and Michigan in 2016","authors":"W. Mebane, Matthew Bernhard","doi":"10.1007/978-3-662-58820-8_14","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_14","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Chen, Lei Xu, Zhimin Gao, Nolan Shah, T. Le, Yang Lu, W. Shi
{"title":"The Game Among Bribers in a Smart Contract System","authors":"Lin Chen, Lei Xu, Zhimin Gao, Nolan Shah, T. Le, Yang Lu, W. Shi","doi":"10.1007/978-3-662-58820-8_20","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_20","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ghazal: Toward Truly Authoritative Web Certificates Using Ethereum","authors":"Seyedehmahsa Moosavi, Jeremy Clark","doi":"10.1007/978-3-662-58820-8_24","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_24","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}