


default search action
2nd AFT 2020: New York, NY, USA
- Sarah Meiklejohn, Abhi Shelat:

Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, AFT 2020, New York, NY, USA, October 21-23, 2020. ACM 2020, ISBN 978-1-4503-8139-0 - Benjamin Y. Chan

, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. 1-11 - Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:

Single Secret Leader Election. 12-24 - Klaus Kursawe:

Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains. 25-36 - Saar Tochner, Aviv Zohar:

How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction. 37-45 - Michael Neuder, Daniel J. Moroz, Rithvik Rao, David C. Parkes:

Defending Against Malicious Reorgs in Tezos Proof-of-Stake. 46-58 - Ariah Klages-Mundt, Dominik Harz, Lewis Gudgeon, Jun-You Liu, Andreea Minca

:
Stablecoins 2.0: Economic Foundations and Risk-based Models. 59-79 - Guillermo Angeris, Tarun Chitra:

Improved Price Oracles: Constant Function Market Makers. 80-91 - Lewis Gudgeon, Sam Werner, Daniel Perez, William J. Knottenbelt:

DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency. 92-112 - Roi Bar Zur, Ittay Eyal, Aviv Tamar:

Efficient MDP Analysis for Selfish-Mining in Blockchains. 113-131 - Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:

A Gas-Efficient Superlight Bitcoin Client in Solidity. 132-144 - Ivan Homoliak

, Dominik Breitenbacher, Ondrej Hujnak, Pieter H. Hartel, Alexander Binder
, Pawel Szalachowski:
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. 145-162 - Mathieu Baudet

, George Danezis, Alberto Sonnino:
FastPay: High-Performance Byzantine Fault Tolerant Settlement. 163-177 - Ye Wang, Roger Wattenhofer:

Asynchronous Byzantine Agreement in Incomplete Networks. 178-188 - Sarah Azouvi, George Danezis, Valeria Nikolaenko:

Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. 189-201 - Jona Harris, Aviv Zohar:

Flood & Loot: A Systemic Attack on The Lightning Network. 202-213 - Elias Rohrer, Florian Tschorsch:

Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks. 214-227 - Saar Tochner, Aviv Zohar, Stefan Schmid

:
Route Hijacking and DoS in Off-Chain Networks. 228-240 - Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:

Encrypted Blockchain Databases. 241-254 - Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:

Privacy-preserving auditable token payments in a permissioned blockchain system. 255-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














