Bitcoin a Distributed Shared Register, Stabilization, Safety, and Security of Distributed Systems -19th International Symposium, SSS 2017 Proceedings, pp.456-468, 2017. ,
DOI : 10.1007/978-3-319-56614-6_22
URL : https://hal.archives-ouvertes.fr/hal-01522360
Proof-carrying authentication, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.52-62, 1999. ,
DOI : 10.1145/319709.319718
URL : http://www.cs.princeton.edu/~appel/papers/says.ps
A Survey of Attacks on Ethereum Smart Contracts (SoK), Conference on Principles of Security and Trust, 2017. ,
DOI : 10.5210/fm.v2i9.548
First-order cyberlogic, 2005. ,
Formal Verification of Smart Contracts, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS'16, 2016. ,
DOI : 10.1145/2535838.2535889
URL : https://hal.archives-ouvertes.fr/hal-01400469
Keynote: Trust management for public-key infrastructures (position paper), Security Protocols, 6th International Workshop Proceedings, pp.59-63, 1998. ,
DOI : 10.1007/3-540-49135-x_9
URL : http://www1.cs.columbia.edu/~angelos/Papers/keynote-position.pdf
Compliance checking in the PolicyMaker trust management system, pp.254-274, 1998. ,
DOI : 10.1007/BFb0055488
URL : http://www.research.att.com/resources/trs/./TRs/98/98.3/98.3.2.body.ps
(leader/randomization/signature)-free byzantine consensus for consortium blockchains Analysis of the dao exploit, 2016. ,
Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, 2017. ,
DOI : 10.1007/978-1-4842-2535-6
CLAN: A Tool for Contract Analysis and Conflict Discovery, pp.90-96, 2009. ,
DOI : 10.1007/978-3-642-04761-9_8
URL : https://www.um.edu.mt/library/oar//bitstream/123456789/22738/1/CLAN_A_Tool_for_Contract_Analysis_and_Conflict_Dis.pdf
The Bitcoin Backbone Protocol: Analysis and Applications, pp.281-310, 2015. ,
DOI : 10.1007/978-3-662-46803-6_10
A self-amending crypto-ledger. tezos white paper, 2014. ,
A Practically Implementable and Tractable Delegation Logic, Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp.27-42, 2000. ,
DOI : 10.2139/ssrn.290100
Deontic logic, 2014. ,
DOI : 10.1016/S1874-5857(06)80029-4
PVS: A prototype verification system, Conference on Automated Deduction: Automated Deduction, pp.748-752, 1992. ,
DOI : 10.1007/3-540-55602-8_217
URL : http://www.csl.sri.com/papers/c/a/cade92-pvs/cade92-pvs.ps.gz
The Role of Logic in Computational Models of Legal Argument: A Critical Survey, pp.342-381, 2002. ,
DOI : 10.1007/3-540-45632-5_14
Introducing cyberlogic Making sense of blockchain smart contracts, HCSS'03?High Confidence Software and Systems Conference, 2003. ,
The blockchain revolution:how the technology behind bitcoin is changing Money,Business and the World Ethereum: A secure decentralised generalised transaction ledger, pp.72-2016 ,
Trust management for widely distributed systems, 2004. ,