Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
22
views
0
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,488
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Financial Cryptography and Data Security
other
Editor(s):
Michael Brenner
,
Kurt Rohloff
,
Joseph Bonneau
,
Andrew Miller
,
Peter Y.A. Ryan
,
Vanessa Teague
,
Andrea Bracciali
,
Massimiliano Sala
,
Federico Pintore
,
Markus Jakobsson
Publication date
(Print):
2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Author and book information
Book
ISBN (Print):
978-3-319-70277-3
ISBN (Electronic):
978-3-319-70278-0
Publication date (Print):
2017
DOI:
10.1007/978-3-319-70278-0
SO-VID:
1b314fc2-da0f-461a-a824-2cb35357b120
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Simple Encrypted Arithmetic Library - SEAL v2.1
pp. 19
Towards Privacy-Preserving Multi-party Bartering
pp. 35
Multi-level Access in Searchable Symmetric Encryption
pp. 53
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form
pp. 75
Private Outsourced Kriging Interpolation
pp. 91
An Analysis of FV Parameters Impact Towards Its Hardware Acceleration
pp. 107
Controlled Homomorphic Encryption: Definition and Construction
pp. 133
ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin
pp. 155
Could Network Information Facilitate Address Clustering in Bitcoin?
pp. 170
Switch Commitments: A Safety Switch for Confidential Transactions
pp. 182
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work
pp. 191
Enhancing Bitcoin Transactions with Covenants
pp. 199
Decentralized Prediction Market Without Arbiters
pp. 218
An Analysis of Bitcoin OP_RETURN Metadata
pp. 231
Constant-Deposit Multiparty Lotteries on Bitcoin
pp. 248
Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
pp. 264
Incentivizing Blockchain Forks via Whale Transactions
pp. 280
Mixing Coins of Different Quality: A Game-Theoretic Approach
pp. 298
Smart Contracts Make Bitcoin Mining Pools Vulnerable
pp. 317
BatchVote: Voting Rules Designed for Auditability
pp. 337
Existential Assertions for Voting Protocols
pp. 353
Marked Mix-Nets
pp. 370
Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets
pp. 385
Using Selene to Verify Your Vote in JCJ
pp. 404
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
pp. 419
Enabling Vote Delegation for Boardroom Voting
pp. 434
Practical Governmental Voting with Unconditional Integrity and Privacy
pp. 453
Findel: Secure Derivative Contracts for Ethereum
pp. 468
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications
pp. 478
A Concurrent Perspective on Smart Contracts
pp. 494
An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns
pp. 510
Trust in Smart Contracts is a Process, As Well
pp. 520
Defining the Ethereum Virtual Machine for Interactive Theorem Provers
pp. 536
SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts
pp. 553
On the Feasibility of Decentralized Derivatives Markets
pp. 568
A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains
pp. 587
X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper
pp. 597
What to Phish in a Subject?
pp. 610
Unpacking Spear Phishing Susceptibility
Similar content
4,488
DNA-based Cryptography
Authors:
Ashish Gehani
,
Thomas H. LaBean
,
John Reif
Holistic approach to quantum cryptography in cyber security
Authors:
G. SHARMA
S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study
Authors:
Mahnoor Naseer
,
Sundas Tariq
,
Naveed Riaz
…
See all similar
Cited by
5
Smart contracts on the blockchain – A bibliometric analysis and review
Authors:
Lennart Ante
Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance
Authors:
Moritz Platt
,
Peter McBurney
Developing secure Bitcoin contracts with BitML
Authors:
Nicola Atzei
,
Massimo Bartoletti
,
Stefano Lande
…
See all cited by