Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Lisa Eckey"'
Publikováno v:
Communications of the ACM. 63:62-71
Software weaknesses in cryptocurrencies create unique challenges in responsible revelations.
Autor:
Marcel Kaiser, Lisa Eckey, Philipp Sandner, Sebastian Faust, Benjamin Schlosser, Hendrik Amler
Publikováno v:
BRAINS
The decentralized and trustless nature of cryptocurrencies and blockchain technology leads to a shift in the digital world. The possibility to execute small programs, called smart contracts, on cryptocurrencies like Ethereum opened doors to countless
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ddd3ad85220aac842cfaa2a208729b66
Publikováno v:
AsiaCCS
Selling digital commodities securely over the Internet is a challenging task when Seller and Buyer do not trust each other. With the advent of cryptocurrencies, one prominent solution for digital exchange is to rely on a smart contract as a trusted a
Publikováno v:
IEEE Symposium on Security and Privacy
Payment channels emerged recently as an efficient method for performing cheap micropayments in cryptocurrencies. In contrast to traditional on-chain transactions, payment channels have the advantage that they allow for nearly unlimited number of tran
Publikováno v:
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176525
EUROCRYPT (1)
EUROCRYPT (1)
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurrencies such as Ethereum, their further adoption is h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2775b070a05d3688c8ad224e988804ef
https://doi.org/10.1007/978-3-030-17653-2_21
https://doi.org/10.1007/978-3-030-17653-2_21
Publikováno v:
CCS
We introduce FairSwap -- an efficient protocol for fair exchange of digital goods using smart contracts. A fair exchange protocol allows a sender S to sell a digital commodity x for a fixed price p to a receiver R. The protocol is said to be secure i