-
Chapter and Conference Paper
Breaking Blockchain Rationality with Out-of-Band Collusion
Blockchain systems often rely on rationality assumptions for their security, expecting that nodes are motivated to maximize their profits. These systems thus design their protocols to incentivize nodes to exec...
-
Chapter
Secure Multi-Party Computation
Secure multi-party computation enables a group of parties to compute a function while jointly kee** their private inputs secret. The term “secure” indicates the latter property where the private inputs used ...
-
Chapter
Electronic Voting
Remote electronic voting, where eligible voters can cast votes from anywhere in the world on their device, promises to increase voter turnout, improve accessibility, and reduce costs. However, building a secur...
-
Article
Open AccessCorrection: Corrigendum: An interactive web-based application for Comprehensive Analysis of RNAi-screen Data
Nature Communications 7: Article number: 10578 (2016); Published 23 February 2016; Updated 21 March 2016 The original version of this article contained an error in the spelling of the author Eugen Buehler, whi...
-
Article
Open AccessAn interactive web-based application for Comprehensive Analysis of RNAi-screen Data
RNAi screens are widely used in functional genomics. Although the screen data can be susceptible to a number of experimental biases, many of these can be corrected by computational analysis. For this purpose, ...