-
1
-
-
84961334458
-
-
Secret-Key Challenge, February
-
RSA Secret-Key Challenge. http://en.wikipedia.org/wiki/RSA Secret-Key Challenge, February 2015.
-
(2015)
-
-
-
2
-
-
84961344752
-
-
February
-
Bugcrowd - Your Elastic Security Team. https://bugcrowd.com/, February 2015.
-
(2015)
-
-
-
3
-
-
84961360961
-
-
February
-
Crowdcurity. https://www.crowdcurity.com, February 2015.
-
(2015)
-
-
-
4
-
-
84961337026
-
-
February
-
The Heartbleed challenge. https://blog.cloudflare.com/theresults-of-the-cloudflare-challenge/, February 2015.
-
(2015)
-
-
-
7
-
-
55049105395
-
Pipelined algorithms to detect cheating in long-term grid computations
-
November
-
Michael T. Goodrich. Pipelined algorithms to detect cheating in long-term grid computations. Theor. Comput. Sci., 408(2-3):199-207, November 2008.
-
(2008)
Theor. Comput. Sci.
, vol.408
, Issue.2-3
, pp. 199-207
-
-
Goodrich, M.T.1
-
9
-
-
58049120018
-
Peerreview: Practical accountability for distributed systems
-
ACM
-
Andreas Haeberlen, Petr Kouznetsov, and Peter Druschel. Peerreview: Practical accountability for distributed systems. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07, pages 175-188. ACM, 2007.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP '07
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
10
-
-
84961365928
-
-
SETI@home project. http://setiathome.ssl.berkeley.edu/.
-
-
-
-
11
-
-
84961301966
-
-
Crypto-Currency Market Capitalizations. http://coinmarketcap.com/.
-
-
-
-
13
-
-
84961306089
-
-
ckolivas. A block-withholding miner. https://bitcointalk.org/index.php?topic=267181.msg2860365#msg2860365.
-
A Block-withholding Miner
-
-
-
19
-
-
84961383283
-
-
October
-
Bitcoin statistics. https://blockchain.info/stats, October 2014.
-
(2014)
-
-
-
21
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
in LNCS, Springer Berlin Heidelberg, January
-
Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Advances in Cryptology - CRYPTO' 92, number 740 in LNCS, pages 139-147. Springer Berlin Heidelberg, January 1993.
-
(1993)
Advances in Cryptology - CRYPTO' 92
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
23
-
-
84961345238
-
-
Bitcoin Foundation. Bitcoin difficulty. https://en.bitcoin.it/wiki/Difficulty.
-
Bitcoin Difficulty
-
-
-
24
-
-
84961377465
-
-
Bitcoind client. https://github.com/bitcoin/bitcoin.
-
-
-
-
25
-
-
84961358646
-
-
October
-
cpuminer mining software. https://github.com/pooler/cpuminer, October 2014.
-
(2014)
-
-
-
26
-
-
84961378910
-
-
October
-
Stratum poolserver in node.js. https://www.npmjs.org/package/stratum-pool, October 2014.
-
(2014)
-
-
-
27
-
-
84961330459
-
-
Jan.
-
Bitcoin hashrate distribution. https://blockchain.info/pools, Jan 2015.
-
(2015)
-
-
-
28
-
-
84945212802
-
-
Cryptology ePrint Archive
-
Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, and Aquinas Hobor. On power splitting games in distributed computation: The case of bitcoin pooled mining. Cryptology ePrint Archive, Report 2015/155, 2015. http://eprint.iacr.org/.
-
(2015)
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
-
-
Luu, L.1
Saha, R.2
Parameshwaran, I.3
Saxena, P.4
Hobor, A.5
-
30
-
-
0003448891
-
-
Deutsche Forschungs- und Versuchsanstalt für Luftund Raumfahrt Köln: Forschungsbericht. Wiss. Berichtswesen d. DFVLR
-
D. Kraft. A Software Package for Sequential Quadratic Programming. Deutsche Forschungs- und Versuchsanstalt für Luftund Raumfahrt Köln: Forschungsbericht. Wiss. Berichtswesen d. DFVLR, 1988.
-
(1988)
A Software Package for Sequential Quadratic Programming
-
-
Kraft, D.1
-
31
-
-
84961323456
-
-
Controlled supply in Bitcoin. https://en.bitcoin.it/wiki/Controlled supply.
-
-
-
-
32
-
-
84961352432
-
-
Luke-Jr. Defeating the block withholding attack. http://sourceforge.net/p/bitcoin/mailman/message/29361475/, 2012.
-
(2012)
-
-
-
34
-
-
84961303337
-
-
Canaan-Creative. Miner manager. https://github.com/Canaan-Creative/MM.
-
Miner Manager
-
-
-
35
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of np
-
January
-
Sanjeev Arora and Shmuel Safra. Probabilistic checking of proofs: A new characterization of np. J. ACM, 45(1):70-122, January 1998.
-
(1998)
J. ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
36
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
ACM
-
Shafi Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum. Delegating computation: Interactive proofs for muggles. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC '08, pages 113-122. ACM, 2008.
-
(2008)
Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC '08
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
37
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
ACM
-
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, and Avi Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC '88, pages 113-131. ACM, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC '88
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
38
-
-
84856468957
-
Practical verified computation with streaming interactive proofs
-
ACM
-
Graham Cormode, Michael Mitzenmacher, and Justin Thaler. Practical verified computation with streaming interactive proofs. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12, pages 90-112. ACM, 2012.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12
, pp. 90-112
-
-
Cormode, G.1
Mitzenmacher, M.2
Thaler, J.3
-
39
-
-
84884489949
-
Time-optimal interactive proofs for circuit evaluation
-
Springer Berlin Heidelberg
-
Justin Thaler. Time-optimal interactive proofs for circuit evaluation. In Advances in Cryptology-CRYPTO 2013, pages 71-89. Springer Berlin Heidelberg, 2013.
-
(2013)
Advances in Cryptology-CRYPTO 2013
, pp. 71-89
-
-
Thaler, J.1
-
40
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
IEEE Computer Society
-
Elaine Shi, Adrian Perrig, and Leendert Van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, SP '05, pages 154-168. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy, SP '05
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doorn, L.3
-
41
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
ACM
-
Jonathan M. McCune, Bryan J. Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. Flicker: An execution infrastructure for tcb minimization. In Proceedings of the 3rd ACM SIGOPS/Euro Sys European Conference on Computer Systems 2008, Eurosys '08, pages 315-328. ACM, 2008.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/Euro Sys European Conference on Computer Systems 2008, Eurosys '08
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
44
-
-
84910648996
-
Game-theoretic analysis of ddos attacks against bitcoin mining pools
-
LNCS, Springer Berlin Heidelberg
-
Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. Game-theoretic analysis of ddos attacks against bitcoin mining pools. In Financial Cryptography and Data Security, LNCS, pages 72-86. Springer Berlin Heidelberg, 2014.
-
(2014)
Financial Cryptography and Data Security
, pp. 72-86
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
Vasek, M.4
Moore, T.5
|