Privacy-Preserving Cross-Chain Atomic Swaps (Englisch)
- Neue Suche nach: Deshpande, Apoorvaa
- Neue Suche nach: Herlihy, Maurice
- Neue Suche nach: Deshpande, Apoorvaa
- Neue Suche nach: Herlihy, Maurice
In:
Financial cryptography and data security
; 540-549
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Privacy-Preserving Cross-Chain Atomic Swaps
-
Beteiligte:Deshpande, Apoorvaa ( Autor:in ) / Herlihy, Maurice ( Autor:in )
-
Kongress:AsiaUSEC ; 2020 ; Kota Kinabalu
-
Erschienen in:Financial cryptography and data security ; 540-549
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Tale of Two Browsers: Understanding Users’ Web Browser Choices in South KoreaWoo, Jihye / Choi, Ji Won / Jeon, Soyoon / Han, Joon Kuy / Kim, Hyoungshick / Woo, Simon S. et al. | 2020
- 18
-
User-Centered Risk Communication for Safer BrowsingDas, Sanchari / Abbott, Jacob / Gopavaram, Shakthidhar / Blythe, Jim / Camp, L. Jean et al. | 2020
- 36
-
Secure Email - A Usability StudyReuter, Adrian / Boudaoud, Karima / Winckler, Marco / Abdelmaksoud, Ahmed / Lemrazzeq, Wadie et al. | 2020
- 47
-
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing EmailsNasser, George / Morrison, Ben W. / Bayl-Smith, Piers / Taib, Ronnie / Gayed, Michael / Wiggins, Mark W. et al. | 2020
- 56
-
Cue Utilization, Phishing Feature and Phishing Email DetectionBayl-Smith, Piers / Sturman, Daniel / Wiggins, Mark et al. | 2020
- 71
-
Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method PreferencesCoopamootoo, Kovila P. L. et al. | 2020
- 84
-
Security and Privacy Awareness in Smart Environments — A Cross-Country InvestigationKulyk, Oksana / Reinheimer, Benjamin / Aldag, Lukas / Mayer, Peter / Gerber, Nina / Volkamer, Melanie et al. | 2020
- 102
-
Understanding Perceptions of Smart DevicesHadan, Hilda / Patil, Sameer et al. | 2020
- 122
-
In Our Employer We Trust: Mental Models of Office Workers’ Privacy PerceptionTolsdorf, Jan / Dehling, Florian et al. | 2020
- 137
-
Behaviour of Outsourced Employees as Sources of Information System Security ThreatsOyebisi, David / Njenga, Kennedy et al. | 2020
- 149
-
Exploring Effects of Auditory Stimuli on CAPTCHA PerformanceBerg, Bruce / Kaczmarek, Tyler / Kobsa, Alfred / Tsudik, Gene et al. | 2020
- 166
-
PassPage: Graphical Password Authentication Scheme Based on Web Browsing RecordsChu, Xian / Sun, Huiping / Chen, Zhong et al. | 2020
- 177
-
Empathy as a Response to Frustration in Password ChoiceCoopamootoo, Kovila P. L. et al. | 2020
- 192
-
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password StorageTupsamudre, Harshal / Sahu, Monika / Vidhani, Kumar / Lodha, Sachin et al. | 2020
- 207
-
Incorporating Psychology into Cyber Security Education: A Pedagogical ApproachTaylor-Jackson, Jacqui / McAlaney, John / Foster, Jeffrey L. / Bello, Abubakar / Maurushat, Alana / Dale, John et al. | 2020
- 221
-
Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020Matsuo, Shin'ichiro et al. | 2020
- 230
-
Multistakeholder Governance for the InternetSuzuki, Shigeya et al. | 2020
- 242
-
Future of Finance: From G20 to Practical Implementation Multi-stakeholder Governance on Blockchain Based FinanceTakanashi, Yuta et al. | 2020
- 254
-
Securing Cryptocurrency Exchange: Building up Standard from Huge FailuresSuga, Yuji / Shimaoka, Masaki / Sato, Masashi / Nakajima, Hirotaka et al. | 2020
- 273
-
Origami Voting: A Non-cryptographic Approach to Transparent Ballot VerificationBlanchard, Enka / Selker, Ted et al. | 2020
- 291
-
Towards Improving the Efficacy of Code-Based Verification in Internet VotingKulyk, Oksana / Volkamer, Melanie / Müller, Monika / Renaud, Karen et al. | 2020
- 310
-
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting SchemeZollinger, Marie-Laure / Rønne, Peter B. / Ryan, Peter Y. A. et al. | 2020
- 319
-
Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLAStark, Philip B. et al. | 2020
- 337
-
A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate ElectionsMorin, Sarah / McClearn, Grant / McBurnett, Neal / Vora, Poorvi L. / Zagórski, Filip et al. | 2020
- 345
-
Vote Selling Resistant VotingBoyd, Colin / Haines, Thomas / Rønne, Peter B. et al. | 2020
- 360
-
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ PossibilitiesHaines, Thomas / Pereira, Olivier / Rønne, Peter B. et al. | 2020
- 369
-
Performance of Shuffling: Taking It to the LimitsHaenni, Rolf / Locher, Philipp et al. | 2020
- 389
-
Characterizing Types of Smart Contracts in the Ethereum LandscapeAngelo, Monika di / Salzer, Gernot et al. | 2020
- 405
-
Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social MediaAyman, Afiya / Roy, Shanto / Alipour, Amin / Laszka, Aron et al. | 2020
- 423
-
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart ContractsChepurnoy, Alexander / Saxena, Amitabh et al. | 2020
- 436
-
Scalable Open-Vote Network on EthereumSeifelnasr, Mohamed / Galal, Hisham S. / Youssef, Amr M. et al. | 2020
- 451
-
How to Dynamically Incentivize Sufficient Level of IoT SecuritySu, Jianan / Bartholic, Michael / Stange, Andrew / Ushida, Ryosuke / Matsuo, Shin'ichiro et al. | 2020
- 466
-
Confidential and Auditable PaymentsMitani, Tatsuo / Otsuka, Akira et al. | 2020
- 481
-
MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel NetworkTripathy, Somanath / Mohanty, Susil Kumar et al. | 2020
- 496
-
Marlowe: Implementing and Analysing Financial Contracts on BlockchainSeijas, Pablo Lamela / Nemish, Alexander / Smith, David / Thompson, Simon et al. | 2020
- 512
-
Load Balancing for Sharded BlockchainsOkanami, Naoya / Nakamura, Ryuya / Nishide, Takashi et al. | 2020
- 525
-
The Extended UTXO ModelChakravarty, Manuel M. T. / Chapman, James / MacKenzie, Kenneth / Melkonian, Orestis / Jones, Michael Peyton / Wadler, Philip et al. | 2020
- 540
-
Privacy-Preserving Cross-Chain Atomic SwapsDeshpande, Apoorvaa / Herlihy, Maurice et al. | 2020
- 550
-
A Blockchain Based Approach to Resource Sharing for Compositional Contracts in Smart NeighbourhoodsVenkateswarlu, Kumaramangalam Muni / Avizheh, Sepideh / Safavi-Naini, Reihaneh et al. | 2020
- 568
-
Enforcing Determinism of Java Smart ContractsSpoto, Fausto et al. | 2020
- 584
-
Albert, An Intermediate Smart-Contract Language for the Tezos BlockchainBernardo, Bruno / Cauderlier, Raphaël / Pesin, Basile / Tesson, Julien et al. | 2020
- 599
-
A Formally Verified Static Analysis Framework for Compositional ContractsHenglein, Fritz / Larsen, Christian Kjær / Murawska, Agata et al. | 2020