Financial cryptography and data security : FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers /: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. (2020)
- Record Type:
- Book
- Title:
- Financial cryptography and data security : FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers /: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. (2020)
- Main Title:
- Financial cryptography and data security : FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers
- Other Titles:
- VOTING 2019
WTSC 2019 - Further Information:
- Note: Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala (eds.).
- Other Names:
- Bracciali, Andrea
(Assistant professor), Clark, Jeremy
Pintore, Federico
Rønne, Peter B
Sala, Massimiliano, 1969-
VOTING (Workshop), 4th
WTSC (Workshop), 3rd
FC (Conference), 23rd - Contents:
- Two-Party State Channels with State Assertions.- Secure Offline Payments in Bitcoin.- Proof-of-Work Sidechains.- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies.- Game-theoretic Analysis of an Incentivized Verifiable Computation System.- Sluggish Mining: Profiting from the Verier's Dilemma.- Deploying PayWord on Ethereum.- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course.- Verification-Led Smart Contracts.- A Java Framework for Smart Contracts.- Is Solidity solid enough.- Building Executable Secure Design Models for Smart Contracts with Formal Methods.- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain.- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum.- Election Manipulation 100.- A Manifest Improvement for Risk-Limiting Audits.- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits.- How to Assess the Usability Metrics in E-Voting Schemes.- Improving the Performance of Cryptographic Voting Protocols (SoK).- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption.- Priv-Apollo - Secret Ballot E2E-V Internet Voting.- End-to-End Verifiable Quadratic Voting with Everlasting Privacy.- Lattice-Based Proof of a Shuffle.
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (356 pages)
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
User-centered system design -- Congresses
Computer security
Data encryption (Computer science)
User-centered system design
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030437251
3030437256 - Related ISBNs:
- 9783030437244
- Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.497060
- Ingest File:
- 03_064.xml