Abstract is missing.
- Two-Party State Channels with AssertionsChris Buckland, Patrick McCorry. 3-11 [doi]
- Short Paper: Secure Offline Payments in BitcoinTaisei Takahashi, Akira Otsuka. 12-20 [doi]
- Proof-of-Work SidechainsAggelos Kiayias, Dionysis Zindros. 21-34 [doi]
- You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for CryptocurrenciesPatrick McCorry, Chris Buckland, Surya Bakshi, Karl Wüst, Andrew Miller 0001. 35-49 [doi]
- Game-Theoretic Analysis of an Incentivized Verifiable Computation SystemMahmudun Nabi, Sepideh Avizheh, Muni Venkateswarlu Kumaramangalam, Reihaneh Safavi-Naini. 50-66 [doi]
- Sluggish Mining: Profiting from the Verifier's DilemmaBeltran Borja Fiz Pontiveros, Christof Ferreira Torres, Radu State. 67-81 [doi]
- Short Paper: Deploying PayWord on EthereumMuhammad ElSheikh, Jeremy Clark, Amr M. Youssef. 82-90 [doi]
- SoK: Development of Secure Smart Contracts - Lessons from a Graduate CourseMonika Di Angelo, Christian Sack, Gernot Salzer. 91-105 [doi]
- Verification-Led Smart ContractsRichard Banach. 106-121 [doi]
- A Java Framework for Smart ContractsFausto Spoto. 122-137 [doi]
- Is Solidity Solid Enough?Silvia Crafa, Matteo Di Pirro, Elena Zucca. 138-153 [doi]
- Building Executable Secure Design Models for Smart Contracts with Formal MethodsWeifeng Xu, Glenn A. Fink. 154-169 [doi]
- SoK: Transparent Dishonesty: Front-Running Attacks on BlockchainShayan Eskandari, Seyedehmahsa Moosavi, Jeremy Clark. 170-189 [doi]
- Trustee: Full Privacy Preserving Vickrey Auction on Top of EthereumHisham S. Galal, Amr M. Youssef. 190-207 [doi]
- Election Manipulation 100Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague. 211-225 [doi]
- Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting AuditsKellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Philip B. Stark. 226-241 [doi]
- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election AuditsMayuri Sridhar, Ronald L. Rivest. 242-256 [doi]
- How to Assess the Usability Metrics of E-Voting SchemesKarola Marky, Marie-Laure Zollinger, Markus Funk, Peter Y. A. Ryan, Max Mühlhäuser. 257-271 [doi]
- Improving the Performance of Cryptographic Voting ProtocolsRolf Haenni, Philipp Locher, Nicolas Gailly. 272-288 [doi]
- PrivApollo - Secret Ballot E2E-V Internet VotingHua Wu, Poorvi L. Vora, Filip Zagórski. 299-313 [doi]
- End-to-End Verifiable Quadratic Voting with Everlasting PrivacyOlivier Pereira, Peter B. Rønne. 314-329 [doi]
- Lattice-Based Proof of a ShuffleNúria Costa, Ramiro Martínez, Paz Morillo. 330-346 [doi]