Real-world applications routinely make authorization decisions based on
...
The disastrous vulnerabilities in smart contracts sharply remind us of o...
In distributed systems, a group of learners achieve
consensus when, by o...
Pressed by the difficulty of writing asynchronous, event-driven code,
ma...
Virtual memory has been a standard hardware feature for more than three
...
We present Charlotte, a framework for composable, authenticated distribu...
Blockchains offer a useful abstraction: a trustworthy, decentralized log...
Noninterference is a popular semantic security condition because it offe...