Design Choices for Central Bank Digital Currency: Policy and Technical Considerations
暂无分享,去创建一个
Fan Zhang | Sarah Meiklejohn | Ari Juels | Kari Kostiainen | Bryan Ford | James Grimmelmann | Ittay Eyal | Eswar S. Prasad | Andrew Miller | Giulia Fanti | Sarah Allen | Karl Wüst | Srđjan Čapkun | Ittay Eyal | A. Juels | Andrew K. Miller | S. Meiklejohn | Fan Zhang | K. Wüst | Srdjan Capkun | G. Fanti | Sarah Allen | B. Ford | James Grimmelmann | Kari Kostiainen | E. Prasad
[1] Silvio Gesell. The Natural Economic Order , 1934 .
[2] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[5] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[6] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[7] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[8] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[9] E. Hughes. A cypherpunk's manifesto , 1997 .
[10] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[11] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[12] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[13] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[14] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[15] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[16] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[17] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[18] Roberto Tamassia,et al. Authenticated Data Structures , 2003, ESA.
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Idit Keidar,et al. Byzantine disk paxos: optimal resilience with byzantine shared memory , 2004, PODC '04.
[21] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[22] Moti Yung,et al. Fourth-factor authentication: somebody you know , 2006, CCS '06.
[23] Jan Camenisch,et al. Balancing accountability and privacy using E-cash , 2006 .
[24] Leslie Lamport,et al. Fast Paxos , 2006, Distributed Computing.
[25] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[26] Super Crunchers: Why Thinking-by-Numbers Is the New Way to Be Smart , 2008, Journal of Advertising Research.
[27] Krishna P. Gummadi,et al. Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.
[28] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[29] Bruce A. Champ. Stamp Scrip: Money People Paid to Use , 2008 .
[30] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[31] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[32] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[33] Dan S. Wallach,et al. Efficient Data Structures For Tamper-Evident Logging , 2009, USENIX Security Symposium.
[34] Ji Xiang,et al. CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing , 2009, Inscrypt.
[35] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[36] Chi-Ho Chan,et al. An Evaluation of Video-to-Video Face Verification , 2010, IEEE Transactions on Information Forensics and Security.
[37] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[38] Jeffrey P. Dew,et al. The Association Between Consumer Debt and the Likelihood of Divorce , 2011 .
[39] M. Pshirkov,et al. Weak microlensing effect and stability of pulsar time scale , 2006, astro-ph/0610681.
[40] James A. Hendler,et al. Accountability and deterrence in online life , 2011, WebSci '11.
[41] Marios Savvides,et al. How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.
[42] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[43] Krishna P. Gummadi,et al. Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.
[44] Irina Sakharova. Payment card fraud: Challenges and solutions , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[45] Jörg Becker,et al. Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.
[46] Qijun Zhao,et al. Fingerprint image synthesis based on statistical feature models , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[47] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[48] Jacob Appelbaum,et al. Cypherpunks: Freedom and the Future of the Internet , 2012 .
[49] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[50] Adrienne Porter Felt,et al. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.
[51] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[52] Fabrício Benevenuto,et al. You followed my bot! Transforming robots into influential users in Twitter , 2013, First Monday.
[53] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[54] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[55] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[56] Joan Feigenbaum,et al. Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance , 2014, FOCI.
[57] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[58] Alysson Neves Bessani,et al. Analysis of operating system diversity for intrusion tolerance , 2014, Softw. Pract. Exp..
[59] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[60] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[61] David Berger,et al. Consumption Dynamics During Recessions , 2014 .
[62] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX Annual Technical Conference.
[63] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[64] Jae Kwon,et al. Tendermint : Consensus without Mining , 2014 .
[65] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[66] Joshua A. Kroll. Secure protocols for accountable warrant execution , 2014 .
[67] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[68] J. Schroeder. Bitcoin and the Uniform Commercial Code , 2015 .
[69] John W. Goodell,et al. Lending to women in microfinance: Role of social trust , 2015 .
[70] Michael J. Freedman,et al. CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.
[71] M. Demertzis,et al. Digital currencies , 2015, The Routledge Handbook of FinTech.
[72] Adrian Perrig,et al. Efficient gossip protocols for verifying the consistency of Certificate logs , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[73] Fabrício Benevenuto,et al. Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[74] Ashay Rane,et al. Raccoon: Closing Digital Side-Channels through Obfuscated Execution , 2015, USENIX Security Symposium.
[75] Hélène Rey. Dilemma Not Trilemma: The Global Financial Cycle and Monetary Policy Independence , 2015 .
[76] Karl Crary,et al. Peer-to-peer affine commitment using bitcoin , 2015, PLDI.
[77] Adi Shamir,et al. Physical key extraction attacks on PCs , 2016, Commun. ACM.
[78] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.
[79] B. Fung,et al. Central Bank Digital Currencies: A Framework for Assessing Why and How , 2016 .
[80] Elaine Shi,et al. FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..
[81] Emin Gün Sirer,et al. Bitcoin Covenants , 2016, Financial Cryptography Workshops.
[82] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[83] John Barrdear,et al. The Macroeconomics of Central Bank Issued Digital Currencies , 2016 .
[84] Emilio Ferrara,et al. Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.
[85] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[86] Elaine Shi,et al. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts , 2016, CCS.
[87] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[88] Songwu Lu,et al. New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks , 2016, CCS.
[89] Matthew Green,et al. Accountable Privacy for Decentralized Anonymous Payments , 2016, Financial Cryptography.
[90] Ari Juels,et al. Setting Standards for Altering and Undoing Smart Contracts , 2016, RuleML.
[91] David Wolinsky,et al. Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[92] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[93] Liuqing Yang,et al. Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond , 2016, IEEE/CAA Journal of Automatica Sinica.
[94] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[95] Felix Wu. No easy answers in the fight over iPhone decryption , 2016, Commun. ACM.
[96] Laurent Vanbever,et al. Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies , 2016, ArXiv.
[97] Emin Gün Sirer,et al. Service-Oriented Sharding with Aspen , 2016, ArXiv.
[98] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[99] D. Yermack,et al. Digital Currencies, Decentralized Ledgers, and the Future of Central Banking , 2016 .
[100] Jim Groom,et al. The Path to Self-Sovereign Identity , 2017 .
[101] Qian Yao,et al. A systematic framework to understand central bank digital currency , 2018, Science China Information Sciences.
[102] 徐忠,et al. A kind of safety method, system and the terminal of digital cash of the use based on block chain , 2017 .
[103] Kenneth S. Rogoff,et al. The Curse of Cash: How Large-Denomination Bills Aid Crime and Tax Evasion and Constrain Monetary Policy , 2017 .
[104] Prateek Saxena,et al. A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.
[105] Kevin Lee,et al. An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.
[106] Johannes Götzfried,et al. Cache Attacks on Intel SGX , 2017, EUROSEC.
[107] Fan Zhang,et al. Solidus: Confidential Distributed Ledger Transactions via PVORM , 2017, CCS.
[108] Joan Feigenbaum,et al. Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion) , 2017, Security Protocols Workshop.
[109] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[110] Giuseppe Ateniese,et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[111] Ole Bjerg. Designing New Money - The Policy Trilemma of Central Bank Digital Currency , 2017 .
[112] Elaine Shi,et al. Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..
[113] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[114] Pam Dixon. A Failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. , 2017, Health and technology.
[115] Morten L. Bech,et al. Central Bank Cryptocurrencies , 2017 .
[116] Srdjan Capkun,et al. Software Grand Exposure: SGX Cache Attacks Are Practical , 2017, WOOT.
[117] Andrew T. Levin,et al. Central Bank Digital Currency and the Future of Monetary Policy , 2017 .
[118] Walter Engert,et al. Central Bank Digital Currency: Motivations and Implications , 2017 .
[119] Aleksi Grym,et al. Central bank digital currency , 2020, The Economics of Cryptocurrencies.
[120] Ari Juels,et al. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts , 2018, IACR Cryptol. ePrint Arch..
[121] Amiya Bhatia,et al. India’s Aadhaar scheme and the promise of inclusive social protection , 2017 .
[122] Leonid Reyzin,et al. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies , 2017, Financial Cryptography.
[123] Hal Berghel,et al. Equifax and the Latest Round of Identity Theft Roulette , 2017, Computer.
[124] Justin Cappos,et al. CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds , 2017, USENIX Security Symposium.
[125] Bidisha Chaudhuri,et al. The Aadhaar scheme: a cornerstone of a new citizenship regime in India? , 2018 .
[126] A. Carstens. Money in the digital age: what role for central banks? , 2018 .
[127] Xuan-Thao N. Nguyen. Lessons From Case Study of Secured Transactions With Bitcoin , 2018 .
[128] Katrin Assenmacher,et al. Monetary Policy with Negative Interest Rates: Decoupling Cash from Electronic Money , 2018, SSRN Electronic Journal.
[129] Yi Zhang,et al. KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[130] Ronald J. Mann. Reliable Perfection of Security Interests in Crypto-Currency , 2018 .
[131] Rosario Gennaro,et al. Fast Multiparty Threshold ECDSA with Fast Trustless Setup , 2018, CCS.
[132] S. Ingves. Stefan Ingves: Do we need an e-krona? , 2018 .
[133] Somesh Jha,et al. Smart Contracts and Opportunities for Formal Methods , 2018, ISoLA.
[134] Michele Marchesi,et al. The ICO phenomenon and its relationships with ethereum smart contract environment , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).
[135] Julian Schütte,et al. reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[136] Tommaso Mancini Griffoli,et al. Casting Light on Central Bank Digital Currencies , 2018 .
[137] Michael Kumhof,et al. Central Bank Digital Currencies - Design Principles and Balance Sheet Implications , 2018 .
[138] Zheng Wang,et al. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach , 2018, CCS.
[139] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[140] Janaki Srinivasan,et al. Privacy at the Margins| The Poverty of Privacy: Understanding Privacy Trade-Offs From Identity Infrastructure Users in India , 2018 .
[141] David A. Broniatowski,et al. Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate , 2018, American journal of public health.
[142] Srdjan Capkun,et al. ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution , 2019, IACR Cryptol. ePrint Arch..
[143] Christoph Meinel,et al. A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..
[144] Johan A. Pouwelse,et al. Deployment of a Blockchain-Based Self-Sovereign Identity , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[145] Shafi Goldwasser,et al. Practical Accountability of Secret Processes , 2018, IACR Cryptol. ePrint Arch..
[146] Ross P. Buckley,et al. The ICO Gold Rush: It's a Scam, It's a Bubble, It's a Super Challenge for Regulators , 2018 .
[147] Sarah Meiklejohn,et al. An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.
[148] Mariana Raykova,et al. RapidChain: A Fast Blockchain Protocol via Full Sharding , 2018, IACR Cryptol. ePrint Arch..
[149] D. Andolfatto. Assessing the Impact of Central Bank Digital Currency on Private Banks , 2018 .
[150] Aleksandr Ometov,et al. Multi-Factor Authentication: A Survey , 2018, Cryptogr..
[151] Robert M. Chesney,et al. Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security , 2018 .
[152] Sarah Meiklejohn,et al. Contour: A Practical System for Binary Transparency , 2017, DPM/CBT@ESORICS.
[153] Michael Hamburg,et al. Meltdown: Reading Kernel Memory from User Space , 2018, USENIX Security Symposium.
[154] S. Matthew Weinberg,et al. Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.
[155] Joseph Bonneau,et al. Hostile Blockchain Takeovers (Short Paper) , 2018, Financial Cryptography Workshops.
[156] Ghassan O. Karame,et al. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution , 2018, IACR Cryptol. ePrint Arch..
[157] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[158] Shai Halevi,et al. Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).
[159] Edgar R. Weippl,et al. Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..
[160] Alain Brenzikofer. encointer - An Ecological, Egalitarian and Private Cryptocurrency and Self-Sovereign Identity System , 2019, ArXiv.
[161] Farinaz Koushanfar,et al. Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms , 2019, IACR Cryptol. ePrint Arch..
[162] Sreeram Kannan,et al. Prism: Deconstructing the Blockchain to Approach Physical Limits , 2019, CCS.
[163] Srdjan Capkun,et al. DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization , 2019, ACSAC.
[164] Ittai Abraham,et al. HotStuff: BFT Consensus with Linearity and Responsiveness , 2019, PODC.
[165] Roopa Vishwanathan,et al. SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers , 2019, CCS.
[166] Timothy A. K. Zakian,et al. The Libra Blockchain , 2019 .
[167] L. LoPucki,et al. Secured Transactions: A Systems Approach , 2019 .
[168] Alexander Spiegelman,et al. HEB: Hybrid Expenditure Blockchain. , 2019 .
[169] A. Sonnino,et al. State Machine Replication in the Libra Blockchain , 2019 .
[170] Majd Latah,et al. The Art of Social Bots: A Review and a Refined Taxonomy , 2019, ArXiv.
[171] Shiroq Al-Megren,et al. Usability and Security Analysis of the KeepKey Wallet , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[172] Kari Kostiainen,et al. PRCash: Fast, Private and Regulated Transactions for Digital Currencies , 2019, Financial Cryptography.
[173] Nicolas Gailly,et al. Verifiable Management of Private Data under Byzantine Failures , 2019 .
[174] Andrew T. Levin,et al. Digital Cash: Principles & Practical Steps , 2019 .
[175] Fan Zhang,et al. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[176] Ari Juels,et al. SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2019, Proceedings 2021 Network and Distributed System Security Symposium.
[177] David Mazières,et al. Fast and secure global payments with Stellar , 2019, SOSP.
[178] Peng Gao,et al. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains , 2019, CCS.
[179] Rainer Böhme,et al. Rationality is Self-Defeating in Permissionless Systems , 2019, ArXiv.
[180] michel. How Much of the Internet Is Fake ? Turns Out, a Lot of It, Actually. - e-traces , 2019 .
[181] Bryan Ford,et al. Rethinking General-Purpose Decentralized Computing , 2019, HotOS.
[182] Ian Miers,et al. Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More , 2019, AFT.
[183] Prateek Saxena,et al. OHIE: Blockchain Scaling Made Simple , 2018, 2020 IEEE Symposium on Security and Privacy (SP).
[184] Ari Juels,et al. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[185] Ari Juels,et al. BDoS: Blockchain Denial-of-Service , 2019, CCS.
[186] Y. Mersch. Yves Mersch: An ECB digital currency - a flight of fancy? , 2020 .
[187] Ittay Eyal,et al. Multi-Party Timed Commitments , 2020, ArXiv.
[188] Kenneth G. Paterson,et al. Remote Side-Channel Attacks on Anonymous Transactions , 2020, IACR Cryptol. ePrint Arch..
[189] U. Bindseil. Tiered CBDC and the Financial System , 2020, SSRN Electronic Journal.
[190] Mariarosaria Taddeo,et al. Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions , 2020, Sci. Eng. Ethics.
[191] Ittay Eyal,et al. Efficient MDP Analysis for Selfish-Mining in Blockchains , 2020, AFT.
[192] Dawn Song,et al. Keystone: an open framework for architecting trusted execution environments , 2020, EuroSys.
[193] Matthew Green,et al. ZEXE: Enabling Decentralized Private Computation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[194] Matthias P. Lutolf,et al. High-throughput automated organoid culture via stem-cell aggregation in microcavity arrays , 2020, Nature Biomedical Engineering.
[195] Ittay Eyal,et al. Ostraka: Secure Blockchain Scaling by Node Sharding , 2019, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[196] Bryan Ford. Democratic Value and Money for Decentralized Digital Society , 2020, ArXiv.
[197] Codruta Boar,et al. Impending Arrival – A Sequel to the Survey on Central Bank Digital Currency , 2020 .
[198] Marta Gomez-Barrero,et al. Reversing the irreversible: A survey on inverse biometrics , 2020, Comput. Secur..
[199] Yonatan Sompolinsky,et al. PHANTOM and GHOSTDAG A Scalable Generalization of Nakamoto Consensus February 2, 2020 , 2020 .
[200] Alexandra Giannopoulou,et al. Self-sovereign identity , 2021, Internet Policy Rev..
[201] Tao Zhang,et al. Blockchain and central bank digital currency , 2021, ICT Express.
[202] B. Livshits,et al. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit , 2020, Financial Cryptography.
[203] Aniket Kate,et al. Reparo: Publicly Verifiable Layer to Repair Blockchains , 2020, Financial Cryptography.
[204] Yiping Huang,et al. The genesis, design and implications of China’s central bank digital currency , 2021 .
[205] A. Howitt. Roadmap to a Government-Independent Basic Income (UBI) Digital Currency , .