


default search action
2nd AFT 2020: New York, NY, USA
- AFT '20: 2nd ACM Conference on Advances in Financial Technologies, New York, NY, USA, October 21-23, 2020. ACM 2020, ISBN 978-1-4503-8139-0
- Benjamin Y. Chan
, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. 1-11 - Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. 12-24 - Klaus Kursawe:
Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains. 25-36 - Saar Tochner, Aviv Zohar:
How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction. 37-45 - Michael Neuder, Daniel J. Moroz, Rithvik Rao, David C. Parkes:
Defending Against Malicious Reorgs in Tezos Proof-of-Stake. 46-58 - Ariah Klages-Mundt, Dominik Harz, Lewis Gudgeon, Jun-You Liu, Andreea Minca
:
Stablecoins 2.0: Economic Foundations and Risk-based Models. 59-79 - Guillermo Angeris, Tarun Chitra:
Improved Price Oracles: Constant Function Market Makers. 80-91 - Lewis Gudgeon, Sam Werner, Daniel Perez, William J. Knottenbelt:
DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency. 92-112 - Roi Bar Zur, Ittay Eyal, Aviv Tamar:
Efficient MDP Analysis for Selfish-Mining in Blockchains. 113-131 - Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
A Gas-Efficient Superlight Bitcoin Client in Solidity. 132-144 - Ivan Homoliak, Dominik Breitenbacher, Ondrej Hujnak, Pieter H. Hartel, Alexander Binder
, Pawel Szalachowski:
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. 145-162 - Mathieu Baudet
, George Danezis, Alberto Sonnino:
FastPay: High-Performance Byzantine Fault Tolerant Settlement. 163-177 - Ye Wang, Roger Wattenhofer:
Asynchronous Byzantine Agreement in Incomplete Networks. 178-188 - Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. 189-201 - Jona Harris, Aviv Zohar:
Flood & Loot: A Systemic Attack on The Lightning Network. 202-213 - Elias Rohrer, Florian Tschorsch:
Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks. 214-227 - Saar Tochner, Aviv Zohar, Stefan Schmid
:
Route Hijacking and DoS in Off-Chain Networks. 228-240 - Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:
Encrypted Blockchain Databases. 241-254 - Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. 255-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.