Items where Subject is "Main Topics > Security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 43.

Article

Abraham, Ittai and Malkhi, Dahlia and Nayak, Kartik and Ren, Ling and Spiegelman, Alexander (2016) Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. CoRR.

Bahga, Arshdeep and Madisetti, Vijay K. (2016) Blockchain Platform for Industrial Internet of Things. Journal of Software Engineering and Applications.

Ben-Sasson, Eli and Bentov, Iddo and Horesh, Yinon and Riabzev, Michael (2018) Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive.

Christidis, Konstantinos and Devetsikiotis, Michael Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 4. pp. 2292-2303.

Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed E. and Miller, Andrew and Shi, Elaine (2015) Step by Step Towards Creating a Safe Smart Contract: Lessons andInsights from a Cryptocurrency Lab. Cryptology ePrint Archive.

Fuchsbauer, Georg and Orrù, Michele and Seurin, Yannick (2018) Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble. Cryptology ePrint Archive.

Lin, Iuon-Chang and Liao, Tzu-Chun (2017) A Survey of Blockchain Security Issues and Challenges. International Journal of Network Security. pp. 653-659.

Pop, Claudia and Cioara, Tudor and Antal, Marcel and Anghel, Ionut and Bertoncini, Massimo (2018) Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids. Sensors, 18 (1).

Zyskind, Guy and Nathan, Oz and Pentland, Alex (2015) Enigma: Decentralized Computation Platform with Guaranteed Privacy. Computing Research Repository.

Monograph

Bünz, Benedikt and Bootle, Jonathan and Boneh, Dan and Poelstra, Andrew and Wuille, Pieter and Maxwell, Greg Bulletproofs: Short Proofs for Confidential Transactions and More. Technical Report. Blockstream.

Cachin, Christian Architecture of the Hyperledger Blockchain Fabric. Technical Report. IBM Research - Zurich.

Khalil, Rami and Gervais, Arthur and Felley, Guillaume NOCUST – A Securely Scalable Commit-Chain. Technical Report. Liquidity Network.

Conference or Workshop Item

Ahram, Tareq and Sargolzaei, Arman and Sargolzaei, Saman and Daniels, Jeff and Amaba, Ben (2017) Blockchain Technology Innovations. In: 2017 IEEE Technology & Engineering Management Conference.

Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana (2017) A survey of attacks on Ethereum smart contracts. In: International Conference on Principles of Security and Trust.

Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana (2017) A survey of attacks on Ethereum smart contracts. In: Principles of Security and Trust - 6th International Conference, Uppsala, Sweden.

Ben-Sasson, Eli and Chiesa, Alessandro and Tromer, Eran and Virza, Madars (2014) Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In: 23rd USENIX Security Symposium, San Diego, CA, USA.

Cap, Clemens. H and Leiding, Benjamin (2018) Ensuring Resource Trust and Integrity in Web Browsers Using Blockchain Technology. In: Advanced Information Systems Engineering Workshops - CAiSE 2018 International Workshops, Tallinn, Estonia.

Douceur, John R. (2002) The Sybil Attack. In: Peer-to-Peer Systems, First International Workshop, Cambridge, MA, USA.

Hanifatunnisa, Rifa and Rahardjo, Budi (2017) Blockchain Based E-Voting Recording System Design. In: 2017 11th International Conference on Telecommunication Systems Services and Applications.

Hildenbrandt, Everett and Saxena, Manasvi and Zhu, Xiaoran and Rodrigues, Nishant and Daian, Philip and Guth, Dwight and Grigore Rosu, Grigore (2017) KEVM: A Complete Semantics of the Ethereum Virtual Machine. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF).

Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah (2018) An Empirical Analysis of Anonymity in Zcash. In: USENIX Security Symposium 2018.

Kosba, Ahmed E. and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos (2016) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In: IEEE Symposium on Security and Privacy, San Jose, CA, USA.

Kosba, Ahmed E. and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos (2016) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In: 2016 IEEE Symposium on Security and Privacy (SP).

Leiding, Benjamin and Cap, Clemens H. and Mundt, Thomas and Rashidi, Samaneh (2016) AUTHCOIN: Validation and Authentication in Decentralized Networks. In: 10th Mediterranean Conference on Information Systems.

Luu, Loi and Duc-Hiep, Chu and Olickel, Hrishi and Saxena, Prateek and Hobor, Aquinas (2016) Making Smart Contracts Smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.

Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D. (2013) Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In: 2013 IEEE Symposium on Security and Privacy.

Sun, Shifeng and Au, Man Ho and Liu, Joseph K. and Yuen, Tsz Hon (2017) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. In: European Symposium on Research in Computer Security 2017.

Vujicic, Dejan and Ranđić, Siniša (2018) Blockchain technology, bitcoin, and Ethereum: A brief overview. In: 2018 17th International Symposium INFOTEH-JAHORINA.

Wöhrer, Maximilian and Zdun, Uwe (2018) Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering.

Xing, Qianqian and Wang, Baosheng and Wang, Xiaofeng (2017) POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA.

Zyskind, Guy and Nathan, Oz and Pentland, Alex (2015) Decentralizing Privacy: Using Blockchain to Protect Personal Data. In: 2015 IEEE Symposium on Security and Privacy Workshops.

Thesis

Baars, Djuri (2016) Towards Self-Sovereign Identity using Blockchain Technology. Other thesis, University of Twente.

Jamsrandorj, Uurtsaikh (2017) Decentralized Access Control using Blockchain. Masters thesis, University of Saskatchewan.

Teaching Resource

Leiding, Benjamin (2019) Digital Identities on the Blockchain - Day 1. [Teaching Resource]

Leiding, Benjamin (2019) Digital Identities on the Blockchain - Day 2. [Teaching Resource]

Yelisieiev, Yurii and Milishchuk, Roman (2019) The Most Secure Way to Store Your Crypto. [Teaching Resource] (Unpublished)

Other

Coleman, Jeff and Horne, Liam and Xuanji, Li (2018) Counterfactual: Generalized State Channels. unknown.

Lundkvist, Christian and Heck, Rouven and Torstensson, Joel and Mitton, Zac and Sena, Michael (2016) uPort: A Platform for self-sovereign Identity. uPort. (Unpublished)

Shah, Shrenik (2017) Use of blockchain as a software component to send messages anonymously for a data trading platform. Shrenik Sha.

Stagnaro, Chet White Paper: Innovative Blockchain Uses in Health Care. Freed Associates.

civic, civic (2017) CIVIC Whitepaper. CIVIC Technologies.

selfkey, selfkey (2017) SelfKey. The SelfKey Foundation.

sovrin, sovrin (2019) Sovrin™: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust. Sovrin Foundation.

This list was generated on Wed Nov 20 22:52:49 2024 CET.