Town Crier: An Authenticated Data Feed for Smart Contracts
暂无分享,去创建一个
Fan Zhang | Elaine Shi | Ari Juels | Ethan Cecchetti | Kyle Croman | A. Juels | E. Shi | Ethan Cecchetti | Fan Zhang | Kyle Croman
[1] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[2] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[3] Ran Canetti,et al. Universal Composition with Joint State , 2003, CRYPTO.
[4] Ran Canetti,et al. Universally Composable Security with Global Setup , 2007, TCC.
[5] Jiangtao Li,et al. Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation , 2010, 2010 IEEE Second International Conference on Social Computing.
[6] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Juan del Cuvillo,et al. Using innovative instructions to create trustworthy software solutions , 2013, HASP '13.
[8] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[9] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[10] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[11] Xiaoyu Ruan,et al. Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine , 2014 .
[12] Christos Gkantsidis,et al. VC 3 : Trustworthy Data Analytics in the Cloud , 2014 .
[13] TLSnotary - a mechanism for independently audited https sessions , 2014 .
[14] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[15] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[16] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[17] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[18] Jeremy Clark,et al. On Bitcoin as a public randomness source , 2015, IACR Cryptol. ePrint Arch..
[19] Elaine Shi,et al. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts , 2016, CCS.
[20] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[21] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[22] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[23] Thomas Heinz Meitinger,et al. Smart Contracts , 2017, Informatik-Spektrum.