暂无分享,去创建一个
Marcin Andrychowicz | Stefan Dziembowski | Daniel Malinowski | Lukasz Mazurek | Marcin Andrychowicz | Stefan Dziembowski | Daniel Malinowski | Lukasz Mazurek
[1] Kim G. Larsen,et al. A Tutorial on Uppaal , 2004, SFM.
[2] Wang Yi,et al. CCS + Time = An Interleaving Model for Real Time Systems , 1991, ICALP.
[3] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[4] Joseph Sifakis,et al. The Algebra of Timed Processes, ATP: Theory and Application , 1994, Inf. Comput..
[5] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[6] Giuseppe Ateniese,et al. Certified Bitcoins , 2014, ACNS.
[7] Thomas A. Henzinger,et al. A really temporal logic , 1994, JACM.
[8] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[9] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[10] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[11] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[12] Wang Yi,et al. TIMES - A Tool for Modelling and Implementation of Embedded Systems , 2002, TACAS.
[13] Sergio Yovine,et al. KRONOS: a verification tool for real-time systems , 1997, International Journal on Software Tools for Technology Transfer.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Marcin Andrychowicz,et al. How to deal with malleability of BitCoin transactions , 2013, ArXiv.
[16] A. W. Roscoe,et al. A Timed Model for Communicating Sequential Processes , 1986, Theor. Comput. Sci..
[17] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[18] M. Diaz,et al. Modeling and Verification of Time Dependent Systems Using Time Petri Nets , 1991, IEEE Trans. Software Eng..
[19] Wang Yi,et al. UPPAAL - a Tool Suite for Automatic Verification of Real-Time Systems , 1996, Hybrid Systems.
[20] Helmut Knebl,et al. Introduction to Cryptography: Principles and Applications (Information Security and Cryptography) , 2007 .
[21] Marcin Andrychowicz,et al. Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.