@misc{DTCC, title = "\emph{{Embracing Disruption}}", author = "{{The Depository Trust \& Clearing Corporation}}", howpublished = "{\url{http://www.dtcc.com/~/media/Files/PDFs/DTCC-Embracing-Disruption.pdf}}", year = 2016 } @misc{JVM, title = "\emph{{The Java Virtual Machine Specification Java SE 8 Edition}}", author = "{{Lindholm, Yellin, Bracha, \& Buckley}}", howpublished = "{\url{https://docs.oracle.com/javase/specs/jvms/se8/jvms8.pdf}}", year = 2015 } @misc{BOE, title = "\emph{{Money creation in the modern economy}}", author = "{{McLeay, Radia, \& Thomas}}", howpublished = "{\url{http://www.bankofengland.co.uk/publications/Documents/quarterlybulletin/2014/qb14q1prereleasemoneycreation.pdf}}", year = 2014 } @misc{CordaIntro, title = "\emph{{Corda: An Introduction}}", author = "{{Brown, Carlyle, Grigg, \& Hearn}}", howpublished = "{\url{https://docs.corda.net/_static/corda-introductory-whitepaper.pdf}}", year = 2016 } @misc{CordaTech, title = "\emph{{Corda: A Distributed Ledger}}", author = "{{Hearn}}", howpublished = "{\url{https://docs.corda.net/_static/corda-technical-whitepaper.pdf}}", year = 2016 } @misc{EUC, title = "\emph{{The European Commission's Settlement Finality Directive}}", author = "{{European Commission}}", howpublished = "{\url{http://ec.europa.eu/finance/financial-markets/settlement/index_en.htm}}", year = 1998 } @misc{Bitcoin, title = "\emph{{Bitcoin: A Peer-to-Peer Electronic Cash System}}", author = "{{Nakamoto}}", howpublished = "{\url{https://bitcoin.org/bitcoin.pdf}}", year = 2008 } @misc{Ethereum, title = "\emph{{A Next-Generation Smart Contract and Decentralized Application Platform}}", author = "{{Buterin et al.}}", howpublished = "{\url{https://github.com/ethereum/wiki/wiki/%5BEnglish%5D-White-Paper}}", year = 2014 } @misc{Triple, title = "\emph{{Triple Entry Accounting}}", author = "{{Grigg}}", howpublished = "{\url{http://iang.org/papers/triple_entry.html}}", year = 2005 } @misc{Ricardian, title = "\emph{{The Ricardian Contract}}", author = "{{Grigg}}", howpublished = "{\url{http://iang.org/papers/ricardian_contract.html}}", year = 2004 } @misc{SCT, title = "\emph{{Smart Contract Templates: foundations, design landscape and research directions}}", author = "{{Clack, Bakshi, Braine}}", howpublished = "{\url{http://arxiv.org/abs/1608.00771}}", year = 2016 } @misc{PaymentChannels, title = "Bitcoin micropayment channels", author = "{{Mike Hearn}}", howpublished = "{\url{https://bitcoinj.github.io/working-with-micropayments}}", year = 2014 } @misc{BIP70, title = "Bitcoin payment protocol", author = "{{Mike Hearn, Gavin Andresen}}", howpublished = "{\url{https://github.com/bitcoin/bips/blob/master/bip-0070.mediawiki}}", year = 2013 } @misc{BIP32, title = "Hierarchical deterministic wallets", author = "{{Pieter Wiulle}}", howpublished = "{\url{https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki}}", year = 2013 } @misc{HBBFT, author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song}, title = "{{The Honey Badger of BFT Protocols}}", howpublished = {Cryptology ePrint Archive, Report 2016/199}, year = 2016, note = {\url{http://eprint.iacr.org/2016/199}}, } @misc{ILPCC, author = {Stefan Thomas}, title = "Crypto-Conditions", howpublished = {\url{https://interledger.org/five-bells-condition/spec.html}}, year = 2016 } @misc{AMQP, added-at = {2013-01-14T13:56:18.000+0100}, author = {OASIS}, biburl = {http://www.bibsonomy.org/bibtex/2b0b0d48cc2254e62b9b15110aa84ea95/flrnb}, editor = {Godfrey, Robert and Ingham, David and Schloming, Rafael}, interhash = {abed552c6901a1a994e1e99f55e6a0f5}, intrahash = {b0b0d48cc2254e62b9b15110aa84ea95}, keywords = {amqp}, timestamp = {2013-01-14T13:56:18.000+0100}, title = {Advanced Message Queuing Protocol (AMQP) Version 1.0}, url = {http://docs.oasis-open.org/amqp/core/v1.0/amqp-core-complete-v1.0.pdf}, year = 2012 } @article{BigTable, author = {Chang, Fay and Dean, Jeffrey and Ghemawat, Sanjay and Hsieh, Wilson C. and Wallach, Deborah A. and Burrows, Mike and Chandra, Tushar and Fikes, Andrew and Gruber, Robert E.}, title = {Bigtable: A Distributed Storage System for Structured Data}, journal = {ACM Trans. Comput. Syst.}, issue_date = {June 2008}, volume = {26}, number = {2}, month = jun, year = {2008}, issn = {0734-2071}, pages = {4:1--4:26}, articleno = {4}, numpages = {26}, url = {http://doi.acm.org/10.1145/1365815.1365816}, doi = {10.1145/1365815.1365816}, acmid = {1365816}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {Large-Scale Distributed Storage}, } @misc{JavaTimeScale, title = "{{java.time.Instant documentation}}", howpublished = "{\url{https://docs.oracle.com/javase/8/docs/api/java/time/Instant.html}}", year = 2014 } @misc{ZipFormat, title = {Zip file format}, howpublished = {\url{https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT}}, year = 1989, author = {PKWARE} } @misc{TREZOR, title = "Bitcoin TREZOR device", howpublished = {\url{https://bitcointrezor.com/}}, year = 2016 } @misc{JPA, title = "JSR 338: Java Persistence API", howpublished = {\url{http://download.oracle.com/otn-pub/jcp/persistence-2_1-fr-eval-spec/JavaPersistence.pdf?AuthParam=1478095024_77b7362fd5bd185ebf8d2cd2a071a14d}}, year = 2013 } @misc{BeanValidation, title = "JSR 349: Bean validation constraints", howpublished = {\url{https://www.jcp.org/en/jsr/detail?id=349}}, year = 2013 } @inproceedings{Bessani:2014:SMR:2671853.2672428, author = {Bessani, Alysson and Sousa, Jo\~{a}o and Alchieri, Eduardo E. P.}, title = {State Machine Replication for the Masses with BFT-SMART}, booktitle = {Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, series = {DSN '14}, year = {2014}, isbn = {978-1-4799-2233-8}, pages = {355--362}, numpages = {8}, url = {http://dx.doi.org/10.1109/DSN.2014.43}, doi = {10.1109/DSN.2014.43}, acmid = {2672428}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, keywords = {state machine replication, byzantine fault tolerance}, } @misc{Rx, title = "ReactiveX", howpublished = {\url{https://www.reactivex.io}}, year = 2016 } @article{PeytonJones:2000:CCA:357766.351267, author = {Peyton Jones, Simon and Eber, Jean-Marc and Seward, Julian}, title = {Composing Contracts: An Adventure in Financial Engineering (Functional Pearl)}, journal = {SIGPLAN Not.}, issue_date = {Sept. 2000}, volume = {35}, number = {9}, month = sep, year = {2000}, issn = {0362-1340}, pages = {280--292}, numpages = {13}, url = {http://doi.acm.org/10.1145/357766.351267}, doi = {10.1145/357766.351267}, acmid = {351267}, publisher = {ACM}, address = {New York, NY, USA}, } @article{Pearce2015191, title = "Designing a verifying compiler: Lessons learned from developing Whiley ", journal = "Science of Computer Programming ", volume = "113, Part 2", number = "", pages = "191 - 220", year = "2015", note = "Formal Techniques for Safety-Critical Systems ", issn = "0167-6423", doi = "http://dx.doi.org/10.1016/j.scico.2015.09.006", url = "http://www.sciencedirect.com/science/article/pii/S016764231500266X", author = "David J. Pearce and Lindsay Groves", keywords = "Program verification", keywords = "Loop invariants", keywords = "Hoare logic", keywords = "Verification tools " } @book{mitchell2005trusted, title={Trusted Computing}, author={Mitchell, C. and Institution of Electrical Engineers}, isbn={9780863415258}, lccn={2006283945}, series={Computing and Networks Series}, url={https://books.google.ch/books?id=9iriBw2AuToC}, year={2005}, publisher={Institution of Engineering and Technology} } @inproceedings {184425, author = {Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza}, title = {Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture}, booktitle = {23rd USENIX Security Symposium (USENIX Security 14)}, year = {2014}, month = Aug, isbn = {978-1-931971-15-7}, address = {San Diego, CA}, pages = {781--796}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/ben-sasson}, publisher = {USENIX Association}, } @misc{Graal, title = {Graal research compiler}, howpublished = {\url{http://openjdk.java.net/projects/graal/}}, year = 2016 } @inproceedings{DBLP:conf/models/VoelterL14, author = {Markus Voelter and Sascha Lisson}, title = {Supporting Diverse Notations in MPS' Projectional Editor}, booktitle = {Proceedings of the 2nd International Workshop on The Globalization of Modeling Languages co-located with {ACM/IEEE} 17th International Conference on Model Driven Engineering Languages and Systems, GEMOC@Models 2014, Valencia, - Spain, September 28, 2014.}, pages = {7--16}, year = {2014}, url = {http://ceur-ws.org/Vol-1236/paper-03.pdf}, timestamp = {Mon, 30 May 2016 16:28:38 +0200}, biburl = {http://dblp2.uni-trier.de/rec/bib/conf/models/VoelterL14}, bibsource = {dblp computer science bibliography, http://dblp.org} } @misc{FinneyAttack, author = {Hal Finney}, title = {Best practice for fast transaction acceptance - how high is the risk?}, howpublished = {\url{https://bitcointalk.org/index.php?topic=3441.msg48384#msg48384}} } @article{Chaum:1981:UEM:358549.358563, author = {Chaum, David L.}, title = {Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms}, journal = {Commun. ACM}, issue_date = {Feb. 1981}, volume = {24}, number = {2}, month = feb, year = {1981}, issn = {0001-0782}, pages = {84--90}, numpages = {7}, url = {http://doi.acm.org/10.1145/358549.358563}, doi = {10.1145/358549.358563}, acmid = {358563}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {digital signatures, electronic mail, privacy, public key cryptosystems, security, traffic analysis}, } @misc{cryptoeprint:2016:646, author = {Eli Ben-Sasson and Iddo Ben-Tov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza}, title = {Computational integrity with a public random string from quasi-linear PCPs}, howpublished = {Cryptology ePrint Archive, Report 2016/646}, year = {2016}, note = {\url{http://eprint.iacr.org/2016/646}}, } @inproceedings{Dingledine:2004:TSO:1251375.1251396, author = {Dingledine, Roger and Mathewson, Nick and Syverson, Paul}, title = {Tor: The Second-generation Onion Router}, booktitle = {Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13}, series = {SSYM'04}, year = {2004}, location = {San Diego, CA}, pages = {21--21}, numpages = {1}, url = {http://dl.acm.org/citation.cfm?id=1251375.1251396}, acmid = {1251396}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @inproceedings{Ongaro:2014:SUC:2643634.2643666, author = {Ongaro, Diego and Ousterhout, John}, title = {In Search of an Understandable Consensus Algorithm}, booktitle = {Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference}, series = {USENIX ATC'14}, year = {2014}, isbn = {978-1-931971-10-2}, location = {Philadelphia, PA}, pages = {305--320}, numpages = {16}, url = {http://dl.acm.org/citation.cfm?id=2643634.2643666}, acmid = {2643666}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @misc{TheDAOHack, author = {David Siegel}, howpublished = {\url{http://www.coindesk.com/understanding-dao-hack-journalists/}}, year = {2016} } @misc{BitcoinEnergy, author = {Christopher Malmo}, howpublished = {\url{http://motherboard.vice.com/read/bitcoin-is-unsustainable}}, year = {2015} } @misc{Swanson, author = {Tim Swanson}, howpublished = {\url{http://tabbforum.com/opinions/settlement-risks-involving-public-blockchains}}, year = {2016} } @misc{DeserialisingPickles, author = {Lawrence and Frohoff}, howpublished = {\url{http://frohoff.github.io/appseccali-marshalling-pickles/}}, year = {2016} } @misc{MetaWidget, howpublished = {\url{http://www.metawidget.org/}}, year = {2018} } @misc{ReflectionUI, howpublished = {\url{http://javacollection.net/reflectionui/}}, year = {2018} } @misc{ERC20, author = {Fabian Vogelsteller, Vitalik Buterin}, howpublished = {\url{https://eips.ethereum.org/EIPS/eip-20}}, year = {2015} } @misc{ISDACDM, author = {ISDA}, howpublished = {\url{https://portal.cdm.rosetta-technology.io/}}, year = {2018} } @misc{SGX, author = {Ittai Anati and Shay Gueron and Simon P Johnson and Vincent R Scarlata}, title = {Innovative Technology for CPU Based Attestation and Sealing}, year = {2013} } @misc{PayPalTrafficVolume, author = {Craig Smith}, title = {100 Amazing PayPal Statistics and Facts (2019)}, year = {2019}, howpublished = {\url{https://expandedramblings.com/index.php/paypal-statistics/}} } @misc{DTCCStudy, author = {DTCC}, title = {Study on DLT scalability}, year = {2018}, howpublished = {\url{http://www.dtcc.com/news/2018/october/16/dtcc-unveils-groundbreaking-study-on-dlt}} } @misc{GoogleTime, author = {Google}, title = {Google Public NTP Leap Smear}, howpublished = {\url{https://developers.google.com/time/smear}} } @inproceedings{shoup2000practical, title={Practical threshold signatures}, author={Shoup, Victor}, booktitle={International Conference on the Theory and Applications of Cryptographic Techniques}, pages={207--220}, year={2000}, organization={Springer} } @article{Shamir:1979:SS:359168.359176, author = {Shamir, Adi}, title = {How to Share a Secret}, journal = {Commun. ACM}, issue_date = {Nov. 1979}, volume = {22}, number = {11}, month = nov, year = {1979}, issn = {0001-0782}, pages = {612--613}, numpages = {2}, url = {http://doi.acm.org/10.1145/359168.359176}, doi = {10.1145/359168.359176}, acmid = {359176}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {cryptography, interpolation, key management}, }