Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers

Voorkant
Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, Kurt Rohloff
Springer, 30 aug. 2016 - 343 pagina's
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016.
 

Wat mensen zeggen - Een review schrijven

We hebben geen reviews gevonden op de gebruikelijke plaatsen.

Inhoudsopgave

Bitcoin Stress Testing
3
Why Buy When You Can Rent?
19
Automated Verification of Electrum Wallet
27
Anonymous OnBlockchain and OffBlockchain Bitcoin Transactions
43
Proofs of Proofs of Work with Sublinear Complexity
61
Lessons and Insights from a Cryptocurrency Lab
79
Using Ethereum to Audit a CONIKS Key Transparency Log
95
On Scaling Decentralized Blockchains
106
On the Possibility of Noninteractive EVoting in the PublicKey Setting
193
Efficiency Comparison of Various Approaches in EVoting Protocols
209
Remote Electronic Voting Can Be Efficient Verifiable and CoercionResistant
224
Universal CastasIntended Verifiability
233
4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography WAHC 2016
251
Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM
252
Optimizing MPC for Robust and Scalable Integer and FloatingPoint Arithmetic
271
Onthefly Homomorphic BatchingUnbatching
288

Bitcoin Covenants
126
Cryptocurrencies Without Proof of Work
142
First Workshop on Secure Voting Systems VOTING 2016
158
CoercionResistant Internet Voting with Everlasting Privacy
161
Voting with Transparent Verifiability and CoercionMitigation
176
Using Intel Software Guard Extensions for Efficient TwoParty Secure Function Evaluation
302
A MissionCritical CloudBased Application Built Using the Nomad Framework
319
Cryptographic Solutions for Genomic Privacy
328
Author Index
342
Copyright

Overige edities - Alles bekijken

Veelvoorkomende woorden en zinsdelen

Bibliografische gegevens