메뉴 건너뛰기




Volumn 18, Issue 1, 2015, Pages 1-32

Misbehavior in Bitcoin: A study of double-spending and accountability

Author keywords

Bitcoin; Design; Distributed computing; Double spending; Economics; Experimentation; K.4.1 computers and society : public policy issues privacy; K.4.4 computers and society : electronic commerce payment schemes, security; Monetization; Privacy; Security

Indexed keywords

COSTS; DATA PRIVACY; DESIGN; DISTRIBUTED COMPUTER SYSTEMS; ECONOMICS; PUBLIC POLICY;

EID: 84930850900     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2732196     Document Type: Article
Times cited : (195)

References (55)
  • 5
    • 84865819620 scopus 로고    scopus 로고
    • Bitter to better - How to make Bitcoin a better currency
    • Financial Cryptography and Data Security. Springer
    • Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun. 2012. Bitter to better - how to make Bitcoin a better currency. In Financial Cryptography and Data Security. Lecture Notes in Computer Science, Vol. 7397. Springer, 399-414.
    • (2012) Lecture Notes in Computer Science , vol.7397 , pp. 399-414
    • Barber, S.1    Boyen, X.2    Shi, E.3    Uzun, E.4
  • 7
    • 6444237845 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • Bitcoin. 2013. Introduction. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Introduction.
    • (2013) Introduction
  • 8
    • 84930837124 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinCharts. 2013. Bitcoin Charts. Retrieved April 2, 2015, from http://bitcoincharts.com.
    • (2013) Bitcoin Charts
  • 9
    • 84930850929 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinDoS. 2013. Weaknesses. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Weaknesses.
    • (2013) Weaknesses
  • 10
    • 84930835784 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinExplorer. 2013. Bitcoin Block Explorer. Retrieved April 2, 2015, from http://blockexplorer.com.
    • (2013) Bitcoin Block Explorer
  • 11
    • 84930837821 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinFAQ. 2013. FAQ. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/FAQ.
    • (2013) FAQ
  • 12
    • 84930824816 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinMyths. 2013. Myths. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Myths#Point-of-sale-with-bitcoins-isn.27t-possible-because-of-the-10-minute-wait-for-confirmation.
    • (2013) Myths
  • 13
    • 84930837170 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinProtocol. 2013. Protocol Documentation. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Protocol-specification.
    • (2013) Protocol Documentation
  • 14
    • 84930858834 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinRules. 2012. Protocol Rules. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Protocol-rules.
    • (2012) Protocol Rules
  • 15
    • 84930861913 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinTrade. 2013. Trade. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Trade.
    • (2013) Trade
  • 16
    • 84930842351 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinWiki. 2014. Double-Spending. Retrieved April 2, 2015, from https://en.bitcoin.it/Double-spending.
    • (2014) Double-Spending
  • 17
    • 84930861367 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BitcoinXT. 2014. Bitcoin XT. Retrieved April 2, 2015, from https://github.com/bitcoinxt/bitcoinxt.
    • (2014) Bitcoin XT
  • 18
    • 84930849113 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • BlockChain. 2013. 200 Double Spends. Retrieved April 2, 2015, from https://blockchain.info/double-spends.
    • (2013) 200 Double Spends
  • 25
    • 84930840836 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • Connectivity. 2013. Satoshi Client Node Connectivity. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Satoshi-Client-Node-Connectivity.
    • (2013) Satoshi Client Node Connectivity
  • 27
    • 84930843675 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • Deepbit. 2011. Deepbit. Retrieved April 2, 2015, from https://deepbit.net.
    • (2011) Deepbit
  • 29
    • 84930831657 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • DoubleSpending. 2014. Observed Double-Spends. Retrieved April 2, 2015, from http://respends.thinlink.com.
    • (2014) Observed Double-Spends
    • DoubleSpending1
  • 31
    • 84930850929 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • Finney. 2013. Weaknesses. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Weaknesses#The-.22Finney.22-attack.
    • (2013) Weaknesses
  • 32
    • 38149112556 scopus 로고    scopus 로고
    • Attacking unlinkability: The importance of context
    • Privacy Enhancing Technologies. Springer
    • Matthias Franz, Bernd Meyer, and Andreas Pashalidis. 2007. Attacking unlinkability: The importance of context. In Privacy Enhancing Technologies. Lecture Notes in Computer Science, Vol. 4776. Springer, 1-16.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 1-16
    • Franz, M.1    Meyer, B.2    Pashalidis, A.3
  • 39
    • 36049037582 scopus 로고    scopus 로고
    • K-unlinkability: A privacy protection model for distributed data
    • Bradley Malin. 2008. K-unlinkability: A privacy protection model for distributed data. Data and Knowledge Engineering 64, 1, 294-311.
    • (2008) Data and Knowledge Engineering , vol.64 , Issue.1 , pp. 294-311
    • Malin, B.1
  • 42
    • 84930832988 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • Mining. 2013. Comparison of Mining Pools. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Comparison-of-mining-pools.
    • (2013) Comparison of Mining Pools
  • 43
    • 84930850856 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • MiningHardware. 2013. Mining Hardware Comparison. Retrieved April 2, 2015, from https://en.bitcoin.it/wiki/Mining-hardware-comparison.
    • (2013) Mining Hardware Comparison
  • 44
    • 84883281220 scopus 로고    scopus 로고
    • Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management: A consolidated proposal for terminology
    • Andreas Pfitzmann and Marit Hansen. 2008. Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management: A consolidated proposal for terminology. Fachterminologie Datenschutz und Datensicherheit 2008, 111-144. http://dud.inf.tu-dresden.de/literatur/Anon-Terminology-v0.18.pdf.
    • (2008) Fachterminologie Datenschutz und Datensicherheit , vol.2008 , pp. 111-144
    • Pfitzmann, A.1    Hansen, M.2
  • 45
    • 84930849357 scopus 로고    scopus 로고
    • Retrieved April 2, 2015, from
    • ProofWiki. 2013. Definition:Geometric Distribution/Shifted. Retrieved April 2, 2015, from https://proofwiki.org/wiki/Definition:Geometric-Distribution/Shifted.
    • (2013) Definition:Geometric Distribution/Shifted
  • 47
    • 84944040069 scopus 로고    scopus 로고
    • Peppercoin micropayments
    • Financial Cryptography. Springer
    • Ronald Rivest. 2004. Peppercoin micropayments. In Financial Cryptography. Lecture Notes in Computer Science, Vol. 3110. Springer, 2-8.
    • (2004) Lecture Notes in Computer Science , vol.3110 , pp. 2-8
    • Rivest, R.1
  • 48
  • 49
    • 84906500300 scopus 로고    scopus 로고
    • CoinShuffle: Practical decentralized coin mixing for Bitcoin
    • Computer Security - ESORICS 2014. Springer
    • Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In Computer Security - ESORICS 2014. Lecture Notes in Computer Science, Vol. 8713. Springer, 345-364.
    • (2014) Lecture Notes in Computer Science , vol.8713 , pp. 345-364
    • Ruffing, T.1    Moreno-Sanchez, P.2    Kate, A.3
  • 51
    • 35248849922 scopus 로고    scopus 로고
    • Modelling unlinkability
    • Privacy Enhancing Technologies. Springer
    • Sandra Steinbrecher and Stefan Koepsell. 2003. Modelling unlinkability. In Privacy Enhancing Technologies. Lecture Notes in Computer Science, Vol. 2760. Springer, 32-47.
    • (2003) Lecture Notes in Computer Science , vol.2760 , pp. 32-47
    • Steinbrecher, S.1    Koepsell, S.2
  • 54
    • 78649420560 scopus 로고    scopus 로고
    • Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance
    • Nguyen Xuan Vinh, Julien Epps, and James Bailey. 2010. Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance. Journal of Machine Learning Research 11, 2837-2854.
    • (2010) Journal of Machine Learning Research , vol.11 , pp. 2837-2854
    • Vinh, N.X.1    Epps, J.2    Bailey, J.3
  • 55
    • 84930838042 scopus 로고    scopus 로고
    • 2013 Retrieved April 2, 2015, from
    • Znort987. 2013. Znort987/Blockparser. (2013). Retrieved April 2, 2015, from https://github.com/znort987/blockparser.
    • (2013) Znort987/Blockparser


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.