A smart contract for boardroom voting with maximum voter privacy P McCorry, SF Shahandashti, F Hao Financial Cryptography and Data Security: 21st International Conference, FC …, 2017 | 659 | 2017 |
Sprites and state channels: Payment networks that go faster than lightning A Miller, I Bentov, S Bakshi, R Kumaresan, P McCorry International conference on financial cryptography and data security, 508-526, 2019 | 449 | 2019 |
SoK: Consensus in the age of blockchains S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ... Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 413 | 2019 |
Sok: Layer-two blockchain protocols L Gudgeon, P Moreno-Sanchez, S Roos, P McCorry, A Gervais Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 308 | 2020 |
Consensus in the age of blockchains S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ... arXiv preprint arXiv:1711.03936, 2017 | 285 | 2017 |
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing C Dong, Y Wang, A Aldweesh, P McCorry, A Van Moorsel Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 215 | 2017 |
SoK: Off the chain transactions. L Gudgeon, P Moreno-Sanchez, S Roos, P McCorry, A Gervais IACR Cryptol. ePrint Arch. 2019, 360, 2019 | 169 | 2019 |
Pisa: Arbitration outsourcing for state channels P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 146 | 2019 |
PosterVote: expanding the action repertoire for local political activism V Vlachokyriakos, R Comber, K Ladha, N Taylor, P Dunphy, P McCorry, ... Proceedings of the 2014 conference on Designing interactive systems, 795-804, 2014 | 143 | 2014 |
Smart contracts for bribing miners P McCorry, A Hicks, S Meiklejohn Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019 | 124 | 2019 |
Towards bitcoin payment networks P McCorry, M Möser, SF Shahandasti, F Hao Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 113 | 2016 |
Bitcoin: perils of an unregulated global P2P currency (Transcript of Discussion) ST Ali Cambridge international workshop on security protocols, 294-306, 2015 | 82 | 2015 |
ZombieCoin 2.0: managing next-generation botnets using Bitcoin ST Ali, P McCorry, PHJ Lee, F Hao International Journal of Information Security 17, 411-422, 2018 | 76 | 2018 |
Zombiecoin: Powering next-generation botnets with bitcoin ST Ali, P McCorry, PHJ Lee, F Hao Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 74 | 2015 |
Refund attacks on Bitcoin’s payment protocol P McCorry, SF Shahandashti, F Hao International Conference on Financial Cryptography and Data Security, 581-599, 2016 | 56 | 2016 |
Sok: Validating bridges as a scaling solution for blockchains P McCorry, C Buckland, B Yee, D Song Cryptology ePrint Archive, 2021 | 53 | 2021 |
Betting on blockchain consensus with fantomette S Azouvi, P McCorry, S Meiklejohn arXiv preprint arXiv:1805.06786, 2018 | 41 | 2018 |
You sank my battleship! a case study to evaluate state channels as a scaling solution for cryptocurrencies P McCorry, C Buckland, S Bakshi, K Wüst, A Miller Financial Cryptography and Data Security: FC 2019 International Workshops …, 2020 | 34 | 2020 |
Why preventing a cryptocurrency exchange heist isn’t good enough P McCorry, M Möser, ST Ali Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018 | 32 | 2018 |
Authenticated key exchange over bitcoin P McCorry, SF Shahandashti, D Clarke, F Hao Security Standardisation Research: Second International Conference, SSR 2015 …, 2015 | 32 | 2015 |