Non-monotonic Security Protocols and Failures in Financial Intermediation
暂无分享,去创建一个
[1] Daniel F. Spulber. Market Microstructure and Intermediation , 1996 .
[2] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[3] A. Park,et al. Do Retail Investors Suffer from High Frequency Traders? , 2013 .
[4] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .
[5] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[6] ProtocolsLi GongSRI InternationalComputer. Fail-Stop Protocols : An Approach to Designing Secure , 1994 .
[7] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[8] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[9] Julian Williams,et al. FuturesMEX: Secure, Distributed Futures Market Exchange , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[10] Julian Williams,et al. The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations , 2017, Security Protocols Workshop.
[11] Aggelos Kiayias,et al. An Efficient E2E Verifiable E-voting System without Setup Assumptions , 2017, IEEE Security & Privacy.
[12] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[13] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[14] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[15] David Wolinsky,et al. AnonRep: Towards Tracking-Resistant Anonymous Reputation , 2016, NSDI.
[16] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[17] Vinod Vaikuntanathan,et al. Improvements to Secure Computation with Penalties , 2016, CCS.
[18] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[19] Franklin Allen,et al. The Theory of Financial Intermediation , 1997 .
[20] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[21] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.