![Cryptocurrencies / Computing / Blockchains / Cryptography / Concurrent computing / Alternative currencies / Cross-platform software / Ethereum / Secure multi-party computation / Byzantine fault tolerance / Peer-to-peer / Smart contract Cryptocurrencies / Computing / Blockchains / Cryptography / Concurrent computing / Alternative currencies / Cross-platform software / Ethereum / Secure multi-party computation / Byzantine fault tolerance / Peer-to-peer / Smart contract](https://www.pdfsearch.io/img/c96371faef61309670e8ebc29ca97c63.jpg) Date: 2018-06-18 10:21:30Cryptocurrencies Computing Blockchains Cryptography Concurrent computing Alternative currencies Cross-platform software Ethereum Secure multi-party computation Byzantine fault tolerance Peer-to-peer Smart contract | | Incentives in Security Protocols Sarah Azouvi, Alexander Hicks, and Steven J. Murdoch University College London {sarah.azouvi.13,alexander.hicks,s.murdoch}@ucl.ac.uk Abstract. Real world protocols often involve human chAdd to Reading ListSource URL: alexanderlhicks.comDownload Document from Source Website File Size: 180,99 KBShare Document on Facebook
|