Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2024
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 2Article No.: 14, Pages 1–22https://doi.org/10.1145/3641546Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker’s computational power does not exceed 50% of the network power. In this article, we design a ...
- research-articleNovember 2011
Private and Continual Release of Statistics
ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 3Article No.: 26, Pages 1–24https://doi.org/10.1145/2043621.2043626We ask the question: how can Web sites and data aggregators continually release updated statistics, and meanwhile preserve each individual user’s privacy? Suppose we are given a stream of 0’s and 1’s. We propose a differentially private continual ...