-
2
-
-
84903472438
-
EMV: Why payment systems fail
-
June
-
Anderson, R. and Murdoch, S.J. EMV: Why payment systems fail. Comm. ACM, 57, 6 (June 2014), 24-28.
-
(2014)
Comm. ACM
, vol.57
, Issue.6
, pp. 24-28
-
-
Anderson, R.1
Murdoch, S.J.2
-
3
-
-
84883310811
-
Evaluating user privacy in Bitcoin
-
Springer
-
Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T. and Capkun, S. Evaluating user privacy in Bitcoin. Financial Cryptography and Data Security. Springer, 2013, 34-51.
-
(2013)
Financial Cryptography and Data Security
, pp. 34-51
-
-
Androulaki, E.1
Karame, G.O.2
Roeschlin, M.3
Scherer, T.4
Capkun, S.5
-
4
-
-
84863512336
-
On bitcoin and red balloons
-
ACM
-
Babaioff, M., Dobzinski, S., Oren, S. and Zohar, A. On bitcoin and red balloons. In Proceedings of the ACM Conf. on Electronic Commerce. ACM, 2012, 56-73.
-
(2012)
Proceedings of the ACM Conf. on Electronic Commerce
, pp. 56-73
-
-
Babaioff, M.1
Dobzinski, S.2
Oren, S.3
Zohar, A.4
-
10
-
-
85043011117
-
-
BitLicense; http://www.dfs.ny.gov/legal/regulations/adoptions/dfsp200t.pdf.
-
BitLicense
-
-
-
13
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Financial Cryptography and Data Security
-
Eyal, I. and Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Financial Cryptography and Data Security, LNCS (2014). 436-454.
-
(2014)
LNCS
, pp. 436-454
-
-
Eyal, I.1
Sirer, E.G.2
-
14
-
-
84984895148
-
Is Bitcoin a decentralized currency?
-
Gervais, A., Karame, G., Capkun, S. and Capkun, V. Is Bitcoin a decentralized currency? IACR Cryptology ePrint Archive 829 (2013).
-
(2013)
IACR Cryptology ePrint Archive
, vol.829
-
-
Gervais, A.1
Karame, G.2
Capkun, S.3
Capkun, V.4
-
16
-
-
84887938476
-
Two bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin
-
Karame, G., Androulaki, E. and Capkun, S. Two bitcoins at the price of one? Double-spending attacks on fast payments in Bitcoin. IACR Cryptology ePrint Archive 248 (2012).
-
(2012)
IACR Cryptology ePrint Archive
, vol.248
-
-
Karame, G.1
Androulaki, E.2
Capkun, S.3
-
17
-
-
84976699318
-
The byzantine generals problem
-
Lamport, L., Shostak, R. and Pease, M. The byzantine generals problem. ACM Trans. Programming Lang. Systems 4, 3 (1982), 382-401.
-
(1982)
ACM Trans. Programming Lang. Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
18
-
-
84940413380
-
Bitcoin mining pools: A cooperative game theoretic analysis
-
Lewenberg, Y. Bachrach, Y. Sompolinsky, A. Zohar, and Rosenschein, J.S. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. 2015, 919-927.
-
(2015)
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
, pp. 919-927
-
-
Lewenberg1
Bachrach, Y.2
Sompolinsky, Y.3
Zohar, A.4
Rosenschein, J.S.5
-
20
-
-
84890039053
-
A fistful of bitcoins: Characterizing payments among men with no names
-
ACM
-
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M. and Savage, S. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement. ACM, 127-140.
-
Proceedings of the 2013 Conference on Internet Measurement
, pp. 127-140
-
-
Meiklejohn, S.1
Pomarole, M.2
Jordan, G.3
Levchenko, K.4
McCoy, D.5
Voelker, G.M.6
Savage, S.7
-
21
-
-
84914130737
-
-
Miller, A., Juels, A., Shi, E., Parno, B. and Katz, J. Permacoin: Repurposing Bitcoin work for data preservation; http://cs.umd.edu/amiller/permacoin.pdf, 2014.
-
(2014)
Permacoin: Repurposing Bitcoin Work for Data Preservation
-
-
Miller, A.1
Juels, A.2
Shi, E.3
Parno, B.4
Katz, J.5
-
23
-
-
84883269768
-
Beware the middleman: Empirical analysis of Bitcoin-exchange risk
-
Springer
-
Moore, T. and Christin, N. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. Financial Cryptography. Springer, 2013, 25-33.
-
(2013)
Financial Cryptography
, pp. 25-33
-
-
Moore, T.1
Christin, N.2
-
24
-
-
84910621125
-
Towards risk scoring of Bitcoin transactions
-
Financial Cryptography and Data Security Springer
-
Möser, M., Böhme, R. and Breuker, D. Towards risk scoring of Bitcoin transactions. Financial Cryptography and Data Security, Lecture Notes in Computer Science. Springer, 2014, 16-32.
-
(2014)
Lecture Notes in Computer Science
, pp. 16-32
-
-
Möser, M.1
Böhme, R.2
Breuker, D.3
-
26
-
-
84940413383
-
-
Ripple; https://ripple.com/.
-
-
-
-
27
-
-
84883268487
-
Quantitative analysis of the full Bitcoin transaction graph
-
Springer
-
Ron, D. and Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. Financial Cryptography and Data Security. Springer, 2013, 6-24.
-
(2013)
Financial Cryptography and Data Security
, pp. 6-24
-
-
Ron, D.1
Shamir, A.2
-
31
-
-
0001998264
-
Conjugate coding
-
Wiesner, S. Conjugate coding. ACM SIGACT News 15, 1 (1983) 78-88.
-
(1983)
ACM SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
|