Reinforcement-Mining: Protecting Reward in Selfish Mining

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ProvSec (16. : 2022 : Nanjing; Online) Provable and practical security
1. Verfasser: Wang, Zhaojie (VerfasserIn)
Weitere Verfasser: Susilo, Willy (VerfasserIn), Guo, Jianan (VerfasserIn), Wang, Yilei (VerfasserIn), Zhao, Minghao (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask 2022 Wang, Yuntao
Practical Federated Learning for Samples with Different IDs 2022 Lai, Yu Li. Junzuo
Cryptographic Role-Based Access Control, Reconsidered 2022 Liu, Bin
More Efficient Verifiable Functional Encryption 2022 Wang, Geng
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search 2022 Yang, Pan
Epoch Confidentiality in Updatable Encryption 2022 Knapp, Jodie
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices 2022 Zhang, Yanhua
Fast Out-of-Band Data Integrity Monitor to Mitigate Memory Corruption Attacks 2022 Huang, Jian
Construction of a New UAV Management System Based on UMIA Technology 2022 Zhang, Ge
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model 2022 Ghosal, Anit Kumar
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test 2022 Asano, Kyoichi
Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems 2022 Jiang, Yuting
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices 2022 Dutta, Priyanka
Reinforcement-Mining: Protecting Reward in Selfish Mining 2022 Wang, Zhaojie
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning 2022 Lu, Zhaobo
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks 2022 Chiu, Wei-Yang
Subverting Deniability 2022 Armour, Marcel
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge 2022 Baum, Carsten
Secure Collaboration Between Consortiums in Permissioned Blockchains 2022 Huang, Juzheng
Alle Artikel auflisten