ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
10
views
7
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,765
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
other
Author(s):
Elli Androulaki
,
Christian Cachin
,
Angelo De Caro
,
Eleftherios Kokoris-Kogias
Publication date
(Online):
August 08 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
7
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Hyperledger fabric
Elli Androulaki
,
Yacov Manevich
,
Srinivasan Muralidharan
…
(2018)
0
comments
Cited
182
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On Scaling Decentralized Blockchains
Kyle Croman
,
Christian Decker
,
Ittay Eyal
…
(2016)
0
comments
Cited
97
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
A. Rubin
,
M. Green
,
C. Garman
…
(2013)
0
comments
Cited
71
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
August 08 2018
Pages
: 111-131
DOI:
10.1007/978-3-319-99073-6_6
SO-VID:
03e88ab3-3c37-4468-b5b8-e7332981e8b5
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM
pp. 26
On Leveraging Coding Habits for Effective Binary Authorship Attribution
pp. 48
Synthesis of a Permissive Security Monitor
pp. 66
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries
pp. 87
Strain: A Secure Auction for Blockchains
pp. 111
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
pp. 132
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews
pp. 152
Efficient Proof Composition for Verifiable Computation
pp. 175
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
pp. 197
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
pp. 218
How Secure Is Green IT? The Case of Software-Based Energy Side Channels
pp. 243
Phishing Attacks Modifications and Evolutions
pp. 263
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
pp. 305
Beneath the Bonnet: A Breakdown of Diagnostic Security
pp. 325
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
pp. 346
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets
pp. 363
PwIN – Pwning Intel piN: Why DBI is Unsuitable for Security Applications
pp. 385
POR for Security Protocol Equivalences
pp. 406
Automated Identification of Desynchronisation Attacks on Shared Secrets
pp. 427
Stateful Protocol Composition
pp. 470
Anonymous Single-Sign-On for n Designated Services with Traceability
pp. 491
Efficiently Deciding Equivalence for Standard Primitives and Phases
pp. 512
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
pp. 533
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
pp. 555
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics
pp. 575
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
pp. 595
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
Similar content
3,765
Report of Committee II on Permissible Dose for Internal Radiation
Authors:
International Protection
Granting refugees permission to work in Malaysia
Authors:
P.N.A. Yasmin
,
T.B. Daniel
,
N. Fauzi
Germany: Confidential health data safely in your wallet
Authors:
KarlH. Kimbel
See all similar
Cited by
8
FastFabric: Scaling hyperledger fabric to 20 000 transactions per second
Authors:
Christian Gorenflo
,
Stephen Lee
,
Lukasz Golab
…
Barriers to blockchain-based decentralised energy trading: a systematic review
Authors:
Samuel Karumba
,
Subbu Sethuvenkatraman
,
Volkan Dedeoglu
…
HARB: A Hypergraph-Based Adaptive Consortium Blockchain for Decentralized Energy Trading
Authors:
Samuel Karumba
,
Salil S. Kanhere
,
Raja Jurdak
…
See all cited by