-
1
-
-
84900833114
-
-
US Department of Justice, Manhattan U.S. attorney announces charges against Liberty Reserve, 2013(visited on 05/28/2013).
-
US Department of Justice, Manhattan U.S. attorney announces charges against Liberty Reserve, 2013. [Online]. Available http//www.justice.gov/usao/ nys/pressreleases/ May13/LibertyReservePR.php (visited on 05/28/2013).
-
-
-
-
3
-
-
84893082821
-
Traveling the silk road a measurement analysis of a large anonymous online marketplace
-
Rio de Janeiro
-
N. Christin, "Traveling the Silk Road A Measurement Analysis of a Large Anonymous Online Marketplace", in Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, 2013, pp. 213-224.
-
(2013)
Proceedings of the 22nd International World Wide Web Conference
, pp. 213-224
-
-
Christin, N.1
-
4
-
-
84900793167
-
-
visited on 07/12/2013)
-
M. Geuss, Bitcoinica users sue for USD 460k in lost Bitcoins, 2012. [Online]. Available http//arstechnica. com/ tech-policy/2012/08/ bitcoinica-users-sue-for-460k-in-lost-bitcoins/ (visited on 07/12/2013).
-
(2012)
Bitcoinica Users Sue for USD 460k in Lost Bitcoins
-
-
Geusss, M.1
-
7
-
-
84900836184
-
-
visited on 05/23/2013)
-
O. Solon, A simple guide to Bitcoin, 2013. [Online]. Available http//www.wired.co.uk/news/archive/2013-05/7/bitcoin-101 (visited on 05/23/2013).
-
(2013)
A Simple Guide to Bitcoin
-
-
Solon, O.1
-
8
-
-
84900811111
-
-
Donate to WikiLeaks(visited on 05/30/2013).
-
Donate to WikiLeaks. [Online]. Available http//shop. wikileaks.org/donate (visited on 05/30/2013).
-
-
-
-
9
-
-
84900814803
-
-
visited on 05/23/2013)
-
Bitcoin Wiki, Anonymity. [Online]. Available https//en. bitcoin.it/wiki/Anonymity (visited on 05/23/2013).
-
-
-
-
10
-
-
84900825305
-
-
Mt.Gox, Statement Regarding Account Verifications, 2013(visited on 05/31/2013).
-
Mt.Gox, Statement Regarding Account Verifications, 2013. [Online]. Available https//mtgox.com/press- release-20130530.html (visited on 05/31/2013).
-
-
-
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, vol. 24, no. 2, pp. 84-90, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
12
-
-
84948142629
-
An analysis of anonymity in the bitcoin system
-
Y. Altshuler, Y. Elovici, A. Cremers, N. Aharony, and A. Pentland, Eds., New York Springer
-
F. Reid and M. Harrigan, "An Analysis of Anonymity in the Bitcoin System", in Security and Privacy in Social Networks, Y. Altshuler, Y. Elovici, A. Cremers, N. Aharony, and A. Pentland, Eds., New York Springer, 2013, pp. 197-223.
-
(2013)
Security and Privacy in Social Networks
, pp. 197-223
-
-
Reid, F.1
Harrigan, M.2
-
13
-
-
84900815686
-
-
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage, "A Fistful of Bitcoins Characterizing Payments Among Men with No Names", 2013.
-
(2013)
A Fistful of Bitcoins Characterizing Payments among Men with No Names
-
-
Meiklejohn, S.1
Pomarole, M.2
Jordan, G.3
Levchenko, K.4
McCoy, D.5
Voelker, G.M.6
Savage, S.7
-
14
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-A proposal for terminology
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, H. Federrath, Ed.
-
A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudonymity-A proposal for terminology", in Designing privacy enhancing technologies, ser. Lecture Notes in Computer Science, H. Federrath, Ed., vol. 2009, Berlin Heidelberg Springer, 2001, pp. 1-9.
-
(2001)
Designing Privacy Enhancing Technologies
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
15
-
-
84937555407
-
Traffic analysis protocols, attacks, design issues, and open problems
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, H. Federrath, Ed.
-
J. Raymond, "Traffic analysis Protocols, attacks, design issues, and open problems", in Designing Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, H. Federrath, Ed., vol. 2009, Berlin Heidelberg Springer, 2001, pp. 10-29.
-
(2001)
Designing Privacy Enhancing Technologies
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
16
-
-
84947273682
-
The sybil attack
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, P. Druschel, F. Kaashoek, and A. Rowstron, Eds.
-
J. R. Douceur, "The Sybil Attack", in Peer-to-peer Systems, ser. Lecture Notes in Computer Science, P. Druschel, F. Kaashoek, and A. Rowstron, Eds., vol. 2429, Berlin Heidelberg Springer, 2002, pp. 251-260.
-
(2002)
Peer-to-peer Systems
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
17
-
-
84900823230
-
-
visited on 06/22/2013)
-
Bitcoin Fog. [Online]. Available http//bitcoinfog.com/ (visited on 06/22/2013).
-
-
-
-
18
-
-
84957800033
-
Towards measuring anonymity
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds.
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds., vol. 2482, Berlin Heidelberg Springer, 2003, pp. 54-68.
-
(2003)
Privacy Enhancing Technologies
, vol.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
19
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds.
-
A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds., vol. 2482, Berlin Heidelberg Springer, 2003, pp. 41-53.
-
(2003)
Privacy Enhancing Technologies
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
20
-
-
84900811614
-
-
Mt.Gox thinks it's the Fed. Freezes acc based on "tainted" coins. (unlocked now), 2012(visited on 07/12/2013).
-
Mt.Gox thinks it's the Fed. Freezes acc based on "tainted" coins. (unlocked now), 2012. [Online]. Available https//bitcointalk.org/index. php?topic=73385.0 (visited on 07/12/2013).
-
-
-
-
21
-
-
56349094785
-
Fast unfolding of communities in large networks
-
V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast Unfolding of Communities in Large Networks", Journal of Statistical Mechanics Theory and Experiment, vol. 2008, no. 10, P10008, 2008.
-
(2008)
Journal of Statistical Mechanics Theory and Experiment 2008
, Issue.10
-
-
Blondel, V.D.1
Guillaume, J.-L.2
Lambiotte, R.3
Lefebvre, E.4
-
22
-
-
84900811209
-
-
List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses(visited on 07/05/2013).
-
List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. [Online]. Available https//bitcointalk.org/index. php?topic=83794 (visited on 07/05/2013).
-
-
-
-
23
-
-
0022145479
-
Security without identification transaction systems to make big brother obsolete
-
D. Chaum, "Security Without Identification Transaction Systems To Make Big Brother Obsolete", Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
24
-
-
84900834326
-
Making currency inexpensive with iowe
-
San Jose,.
-
D. Levin, A. Schulman, K. LaCurts, N. Spring, and B. Bhattacharjee, "Making Currency Inexpensive with iOwe", in Proceedings of the Workshop on the Economics of Networks, Systems, and Computation (NetEcon), San Jose, 2011.
-
(2011)
Proceedings of the Workshop on the Economics of Networks, Systems, and Computation (NetEcon
-
-
Levin, D.1
Schulman, A.2
Lacurts, K.3
Spring, N.4
Bhattacharjee, B.5
-
25
-
-
84881236275
-
Zerocoin anonymous distributed e-cash from bitcoin
-
Berkeley
-
I. Miers, C. Garman, M. Green, and A. D. Rubin, "Zerocoin Anonymous Distributed E-Cash from Bitcoin", in Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, 2013, pp. 397-411.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy
, pp. 397-411
-
-
Miers, I.1
Garman, C.2
Green, M.3
Rubin, A.D.4
-
26
-
-
84883268487
-
Quantitative analysis of the full bitcoin transaction graph
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed.
-
D. Ron and A. Shamir, "Quantitative Analysis of the Full Bitcoin Transaction Graph", in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed., vol. 7859, Berlin Heidelberg Springer, 2013, pp. 6-24.
-
(2013)
Financial Cryptography and Data Security
, vol.7859
, pp. 6-24
-
-
Ron, D.1
Shamir, A.2
-
27
-
-
85016109785
-
Structure and anonymity of the bitcoin transaction graph
-
M. Ober, S. Katzenbeisser, and K. Hamacher, "Structure and Anonymity of the Bitcoin Transaction Graph", Future Internet, vol. 5, no. 2, pp. 237-250, 2013.
-
(2013)
Future Internet
, vol.5
, Issue.2
, pp. 237-250
-
-
Ober, M.1
Katzenbeisser, S.2
Hamacher, K.3
-
28
-
-
84883310811
-
Evaluating user privacy in bitcoin
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed.
-
E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, and S. Capkun, "Evaluating User Privacy in Bitcoin.", in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed., vol. 7859, Berlin Heidelberg Springer, 2013, pp. 34-51.
-
(2013)
Financial Cryptography and Data Security
, vol.7859
, pp. 34-51
-
-
Androulaki, E.1
Karame, G.O.2
Roeschlin, M.3
Scherer, T.4
Capkun, S.5
-
29
-
-
85084161366
-
Tor the second-generation onion router
-
San Diego,.
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor The second-generation onion router", in Proceedings of the 13th conference on USENIX Security Symposium, San Diego, 2004.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
30
-
-
84937578170
-
Web mixes a system for anonymous and unobservable internet access
-
Berlin Heidelberg Springer, H. Federrath, Ed., ser. Lecture Notes in Computer Science
-
O. Berthold, H. Federrath, and S. Köpsell, "Web MIXes a system for anonymous and unobservable Internet access", in Designing Privacy Enhancing Technologies, H. Federrath, Ed., ser. Lecture Notes in Computer Science, vol. 2009, Berlin Heidelberg Springer, 2000, pp. 115-129.
-
(2000)
Designing Privacy Enhancing Technologies
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
31
-
-
38149112556
-
Attacking unlinkability the importance of context
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds.
-
M. Franz, B. Meyer, and A. Pashalidis, "Attacking Unlinkability The Importance of Context", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds., vol. 4776, Berlin Heidelberg Springer, 2007, pp. 1-16.
-
(2007)
Privacy Enhancing Technologies
, vol.4776
, pp. 1-16
-
-
Franz, M.1
Meyer, B.2
Pashalidis, A.3
-
32
-
-
77955337124
-
Data retention and anonymity services
-
V. MatyáŜ, S. Fischer-Hübner, D. Cvr?cek, and P. Švenda, Eds., Brno, Czech Republic Springer
-
S. Berthold, R. Böhme, and S. Köpsell, "Data retention and anonymity services", in The Future of Identity in the Information Society, V. MatyáŜ, S. Fischer-Hübner, D. Cvr?cek, and P. Švenda, Eds., Brno, Czech Republic Springer, 2009, pp. 92-106.
-
(2009)
The Future of Identity in the Information Society
, pp. 92-106
-
-
Berthold, S.1
Böhme, R.2
Köpsell, S.3
-
33
-
-
69949190946
-
Using linkability information to attack mix-based anonymity services
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, I. Goldberg and M. J. Atallah, Eds.
-
S. Schiffner and S. Clauß, "Using linkability information to attack mix-based anonymity services", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, I. Goldberg and M. J. Atallah, Eds., vol. 5672, Berlin Heidelberg Springer, 2009, pp. 94-107.
-
(2009)
Privacy Enhancing Technologies
, vol.5672
, pp. 94-107
-
-
Schiffner, S.1
Clauß, S.2
-
34
-
-
80053003862
-
Anonymity attacks on mix systems a formal analysis
-
Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, T. Filler, T. Pevný, S. Craver, and A. Ker, Eds.
-
S. Zhioua, "Anonymity attacks on mix systems a formal analysis", in Information Hiding, ser. Lecture Notes in Computer Science, T. Filler, T. Pevný, S. Craver, and A. Ker, Eds., vol. 6958, Berlin Heidelberg Springer, 2011, pp. 133-147.
-
(2011)
Information Hiding
, vol.6958
, pp. 133-147
-
-
Zhioua, S.1
-
36
-
-
84900829116
-
-
Taint checker list, 2012
-
Taint checker list, 2012. [Online]. Available https// bitcointalk.org/index.php?topic=67383.0.
-
-
-
-
39
-
-
84929273746
-
Untraceable electronic cash
-
ser. Lecture Notes in Computer Science, S. Goldwasser, Ed.New York Springer-Verlag
-
D. Chaum, A. Fiat, and M. Naor, "Untraceable electronic cash", in Advances in Cryptology - CRYPTO' 88, ser. Lecture Notes in Computer Science, S. Goldwasser, Ed., vol. 403, New York Springer-Verlag, 1990, pp. 319-327.
-
(1990)
Advances in Cryptology - CRYPTO' 88
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
40
-
-
84900816175
-
-
visited on 07/12/2013)
-
Digicash.com. [Online]. Available http//digicash.com (visited on 07/12/2013).
-
-
-
-
41
-
-
84863532717
-
-
visited on 07/13/2012)
-
P. Krugman, Golden Cyberfetters, 2011. [Online]. Available http//krugman.blogs.nytimes.com/2011/09/07/ golden-cyberfetters/ (visited on 07/13/2012).
-
(2011)
Golden Cyberfetters
-
-
Krugman, P.1
|