Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
0
references
Top references
cited by
36
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,753
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography and Data Security
Defining the Ethereum Virtual Machine for Interactive Theorem Provers
other
Author(s):
Yoichi Hirai
Publication date
(Online):
November 19 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Online interactive cancer simulations and demos
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
November 19 2017
Pages
: 520-535
DOI:
10.1007/978-3-319-70278-0_33
SO-VID:
4b8f7580-1460-4240-a6f2-194330a7e558
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Simple Encrypted Arithmetic Library - SEAL v2.1
pp. 19
Towards Privacy-Preserving Multi-party Bartering
pp. 35
Multi-level Access in Searchable Symmetric Encryption
pp. 53
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form
pp. 75
Private Outsourced Kriging Interpolation
pp. 91
An Analysis of FV Parameters Impact Towards Its Hardware Acceleration
pp. 107
Controlled Homomorphic Encryption: Definition and Construction
pp. 133
ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin
pp. 155
Could Network Information Facilitate Address Clustering in Bitcoin?
pp. 170
Switch Commitments: A Safety Switch for Confidential Transactions
pp. 182
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work
pp. 191
Enhancing Bitcoin Transactions with Covenants
pp. 199
Decentralized Prediction Market Without Arbiters
pp. 218
An Analysis of Bitcoin OP_RETURN Metadata
pp. 231
Constant-Deposit Multiparty Lotteries on Bitcoin
pp. 248
Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
pp. 264
Incentivizing Blockchain Forks via Whale Transactions
pp. 280
Mixing Coins of Different Quality: A Game-Theoretic Approach
pp. 298
Smart Contracts Make Bitcoin Mining Pools Vulnerable
pp. 317
BatchVote: Voting Rules Designed for Auditability
pp. 337
Existential Assertions for Voting Protocols
pp. 353
Marked Mix-Nets
pp. 370
Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets
pp. 385
Using Selene to Verify Your Vote in JCJ
pp. 404
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
pp. 419
Enabling Vote Delegation for Boardroom Voting
pp. 434
Practical Governmental Voting with Unconditional Integrity and Privacy
pp. 453
Findel: Secure Derivative Contracts for Ethereum
pp. 468
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications
pp. 478
A Concurrent Perspective on Smart Contracts
pp. 494
An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns
pp. 510
Trust in Smart Contracts is a Process, As Well
pp. 520
Defining the Ethereum Virtual Machine for Interactive Theorem Provers
pp. 536
SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts
pp. 553
On the Feasibility of Decentralized Derivatives Markets
pp. 568
A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains
pp. 587
X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper
pp. 597
What to Phish in a Subject?
pp. 610
Unpacking Spear Phishing Susceptibility
Similar content
2,753
Dr Doodle A Diagrammatic Theorem Prover
Authors:
Daniel Winterstein
,
Alan Bundy
,
Corin Gurr
Verified heap theorem prover by paramodulation
Authors:
Gordon Stewart
,
Lennart Beringer
,
Andrew W. Appel
Detecting Ethereum Ponzi Schemes Based on Improved LightGBM Algorithm
Authors:
Yanmei Zhang
,
Wenqiang Yu
,
Ziyu Li
…
See all similar
Cited by
36
A Survey on Ethereum Systems Security : Vulnerabilities, Attacks, and Defenses
Authors:
Huashan Chen
,
Marcus Pendleton
,
Laurent Njilla
…
MadMax: surviving out-of-gas conditions in Ethereum smart contracts
Authors:
Neville Grech
,
Michael S. Kong
,
Anton Jurisevic
…
Smart contracts on the blockchain – A bibliometric analysis and review
Authors:
Lennart Ante
See all cited by