ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
30
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,882
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Financial Cryptography and Data Security
other
Editor(s):
Jeremy Clark
,
Sarah Meiklejohn
,
Peter Y.A. Ryan
,
Dan Wallach
,
Michael Brenner
,
Kurt Rohloff
Publication date
(Print):
2016
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Author and book information
Book
ISBN (Print):
978-3-662-53356-7
ISBN (Electronic):
978-3-662-53357-4
Publication date (Print):
2016
DOI:
10.1007/978-3-662-53357-4
SO-VID:
45c3a2de-7a1e-439e-8443-73f9fe74ac83
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 19
Why Buy When You Can Rent?
pp. 43
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
pp. 79
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
pp. 106
On Scaling Decentralized Blockchains
pp. 126
Bitcoin Covenants
pp. 142
Cryptocurrencies Without Proof of Work
pp. 302
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation
Similar content
2,882
Quantum cryptography in 5G networks: a comprehensive overview
Authors:
M. Mehic
,
L Michalek
,
E Dervisevic
…
Quantum cryptography without public announcement of bases
Authors:
Won Hwang
,
In Gyu Koh
,
Yeong Han
Research and performance analysis of domestic commercial cryptography algorithms
Authors:
L Yaojian
See all similar
Cited by
2
Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance
Authors:
Moritz Platt
,
Peter McBurney
SoK: Blockchain Technology and Its Potential Use Cases
Authors:
Scott Ruoti
,
Ben Kaiser
,
Arkady Yerukhimovich
…
See all cited by