-
1
-
-
84995366799
-
-
http://coinmarketcap.com/currencies/ethereum.
-
-
-
-
2
-
-
84995433568
-
-
Augur. http://www.augur.net/.
-
-
-
Augur1
-
3
-
-
84995433571
-
-
Referenced Feb
-
PriceFeed smart contract. Referenced Feb. 2016 at http://feed.ether.camp/.
-
(2016)
-
-
PriceFeed smart contract1
-
10
-
-
84952038346
-
Shielding applications from an untrusted cloud with haven
-
A. Baumann, M. Peinado, and G. Hunt. Shielding Applications from an Untrusted Cloud with Haven. In OSDI, 2014.
-
(2014)
OSDI
-
-
Baumann, A.1
Peinado, M.2
Hunt, G.3
-
15
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, 2001.
-
(2001)
FOCS
-
-
Canetti, R.1
-
16
-
-
38049064364
-
Universally composable security with global setup
-
Springer
-
R. Canetti, Y. Dodis, R. Pass, and S. Walfish. Universally composable security with global setup. In Theory of Cryptography, pages 61-85. Springer, 2007.
-
(2007)
Theory of Cryptography
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
17
-
-
33244484796
-
Universal composition with joint state
-
R. Canetti and T. Rabin. Universal composition with joint state. In CRYPTO, 2003.
-
(2003)
CRYPTO
-
-
Canetti, R.1
Rabin, T.2
-
19
-
-
84978291536
-
On scaling decentralized blockchains (a position paper)
-
K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer. On scaling decentralized blockchains (a position paper). In Bitcoin Workshop, 2016.
-
(2016)
Bitcoin Workshop
-
-
Croman, K.1
Decker, C.2
Eyal, I.3
Gencer, A.E.4
Juels, A.5
Kosba, A.6
Miller, A.7
Saxena, P.8
Shi, E.9
Sirer, E.G.10
Song, D.11
Wattenhofer, R.12
-
22
-
-
84995368045
-
-
∗ OS. https://software.intel.com/sites/products/sgx-sdk-users-guide-windows, 2015.
-
(2015)
∗ OS
-
-
Intel Corporation1
-
26
-
-
84995374453
-
-
A. Kelkar, J. Bernard, S. Joshi, S. Premkumar, and E. G. Sirer. Virtual Notary. http://virtual-notary.org/, 2016.
-
(2016)
Virtual Notary
-
-
Kelkar, A.1
Bernard, J.2
Joshi, S.3
Premkumar, S.4
Sirer, E.G.5
-
27
-
-
84987677692
-
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
-
A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy, 2016.
-
(2016)
IEEE Symposium on Security and Privacy
-
-
Kosba, A.1
Miller, A.2
Shi, E.3
Wen, Z.4
Papamanthou, C.5
-
28
-
-
84977837849
-
Innovative instructions and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
30
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
New York, New York, USA, ACM Press
-
V. Phegade and J. Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, pages 1-1, New York, New York, USA, 2013. ACM Press.
-
(2013)
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
, pp. 1
-
-
Phegade, V.1
Del Cuvillo, J.2
-
32
-
-
84979710159
-
VC3: Trustworthy data analytics in the cloud
-
F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich. VC3: Trustworthy data analytics in the cloud. In IEEE S&P, 2015.
-
(2015)
IEEE S&P
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
33
-
-
84995498841
-
Trusted hardware: Life, the composable university, and everything
-
E. Shi. Trusted hardware: Life, the composable university, and everything. Talk at the DIMACS Workshop on Cryptography and Big Data, 2015.
-
(2015)
The DIMACS Workshop on Cryptography and Big Data
-
-
Shi, E.1
-
34
-
-
84995416785
-
-
Manuscript
-
E. Shi, F. Zhang, R. Pass, S. Devadas, D. Song, and C. Liu. Trusted hardware: Life, the composable universe, and everything. Manuscript, 2015.
-
(2015)
Trusted Hardware: Life, the Composable Universe, and Everything
-
-
Shi, E.1
Zhang, F.2
Pass, R.3
Devadas, S.4
Song, D.5
Liu, C.6
-
35
-
-
54249169284
-
-
N. Szabo. Smart contracts. http://szabo.best.vwh.net/smart.contracts.html, 1994.
-
(1994)
Smart Contracts
-
-
Szabo, N.1
-
36
-
-
84995425583
-
The conceptual godfather of augur thinks the project will fail
-
5 Aug
-
K. Torpey. The conceptual godfather of augur thinks the project will fail. CoinGecko, 5 Aug. 2015.
-
(2015)
CoinGecko
-
-
Torpey, K.1
-
37
-
-
84991668146
-
Ethereum: A secure decentralised generalised transaction ledger
-
G. Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014.
-
(2014)
Ethereum Project Yellow Paper
-
-
Wood, G.1
-
38
-
-
84945197313
-
Controlled-channel attacks: Deterministic side channels for untrusted operating systems
-
May
-
Y. Xu, W. Cui, and M. Peinado. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Security and Privacy (SP), 2015 IEEE Symposium on, pages 640-656, May 2015.
-
(2015)
Security and Privacy (SP), 2015 IEEE Symposium on
, pp. 640-656
-
-
Xu, Y.1
Cui, W.2
Peinado, M.3
-
39
-
-
84995426874
-
Town crier: An authenticated data feed for smart contracts
-
F. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi. Town crier: An authenticated data feed for smart contracts. Cryptology ePrint Archive, Report 2016/168, 2016. http://eprint.iacr.org/2016/168.
-
(2016)
Cryptology EPrint Archive, Report 2016/168
-
-
Zhang, F.1
Cecchetti, E.2
Croman, K.3
Juels, A.4
Shi, E.5
|