Back to Results
First PageMeta Content
Cryptocurrencies / Computing / Blockchains / Cryptography / Concurrent computing / Alternative currencies / Cross-platform software / Ethereum / Secure multi-party computation / Byzantine fault tolerance / Peer-to-peer / Smart contract


Incentives in Security Protocols Sarah Azouvi, Alexander Hicks, and Steven J. Murdoch University College London {sarah.azouvi.13,alexander.hicks,s.murdoch}@ucl.ac.uk Abstract. Real world protocols often involve human ch
Add to Reading List

Document Date: 2018-06-18 10:21:30


Open Document

File Size: 180,99 KB

Share Result on Facebook