Financial Cryptography Workshops最新文献

筛选
英文 中文
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits 伯努利选票投票:风险限制审计的明显改进
Financial Cryptography Workshops Pub Date : 2018-12-15 DOI: 10.1007/978-3-030-43725-1_16
Kellie Ottoboni, Matthew Bernhard, J. A. Halderman, R. Rivest, P. Stark
{"title":"Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits","authors":"Kellie Ottoboni, Matthew Bernhard, J. A. Halderman, R. Rivest, P. Stark","doi":"10.1007/978-3-030-43725-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-43725-1_16","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126832282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits k-Cut:一种简单的近似统一的选后审计选票抽样方法
Financial Cryptography Workshops Pub Date : 2018-11-21 DOI: 10.1007/978-3-030-43725-1_17
Mayuri Sridhar, R. Rivest
{"title":"k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits","authors":"Mayuri Sridhar, R. Rivest","doi":"10.1007/978-3-030-43725-1_17","DOIUrl":"https://doi.org/10.1007/978-3-030-43725-1_17","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper) 一只野生丝绒叉子出现了!包容性区块链协议在实践中的变化-(短文)
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_3
Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, E. Weippl, W. Knottenbelt
{"title":"A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper)","authors":"Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, E. Weippl, W. Knottenbelt","doi":"10.1007/978-3-662-58820-8_3","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_3","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125937648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comparative Analysis of the Legal Concept of Title Rights in Real Estate and the Technology of Tokens: How Can Titles Become Tokens? 房地产产权法律概念与代币技术的比较分析:产权如何成为代币?
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_23
O. Konashevych
{"title":"Comparative Analysis of the Legal Concept of Title Rights in Real Estate and the Technology of Tokens: How Can Titles Become Tokens?","authors":"O. Konashevych","doi":"10.1007/978-3-662-58820-8_23","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_23","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"37 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Cryptocurrency Lending 走向加密货币借贷
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_25
Mildred Chidinma Okoye, Jeremy Clark
{"title":"Toward Cryptocurrency Lending","authors":"Mildred Chidinma Okoye, Jeremy Clark","doi":"10.1007/978-3-662-58820-8_25","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_25","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126248746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling a Bulletin Board Service Based on Broadcast Channels with Memory 基于广播信道和内存的电子公告板服务建模
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_16
Severin Hauser, R. Haenni
{"title":"Modeling a Bulletin Board Service Based on Broadcast Channels with Memory","authors":"Severin Hauser, R. Haenni","doi":"10.1007/978-3-662-58820-8_16","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_16","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hostile Blockchain Takeovers (Short Paper) 恶意区块链收购(短文)
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_7
Joseph Bonneau
{"title":"Hostile Blockchain Takeovers (Short Paper)","authors":"Joseph Bonneau","doi":"10.1007/978-3-662-58820-8_7","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_7","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Voting Technologies, Recount Methods and Votes in Wisconsin and Michigan in 2016 2016年威斯康星州和密歇根州的投票技术、重新计票方法和投票
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_14
W. Mebane, Matthew Bernhard
{"title":"Voting Technologies, Recount Methods and Votes in Wisconsin and Michigan in 2016","authors":"W. Mebane, Matthew Bernhard","doi":"10.1007/978-3-662-58820-8_14","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_14","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Game Among Bribers in a Smart Contract System 智能合约系统中行贿者的博弈
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_20
Lin Chen, Lei Xu, Zhimin Gao, Nolan Shah, T. Le, Yang Lu, W. Shi
{"title":"The Game Among Bribers in a Smart Contract System","authors":"Lin Chen, Lei Xu, Zhimin Gao, Nolan Shah, T. Le, Yang Lu, W. Shi","doi":"10.1007/978-3-662-58820-8_20","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_20","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ghazal: Toward Truly Authoritative Web Certificates Using Ethereum Ghazal:使用以太坊实现真正权威的Web证书
Financial Cryptography Workshops Pub Date : 2018-02-26 DOI: 10.1007/978-3-662-58820-8_24
Seyedehmahsa Moosavi, Jeremy Clark
{"title":"Ghazal: Toward Truly Authoritative Web Certificates Using Ethereum","authors":"Seyedehmahsa Moosavi, Jeremy Clark","doi":"10.1007/978-3-662-58820-8_24","DOIUrl":"https://doi.org/10.1007/978-3-662-58820-8_24","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信