-
1
-
-
84918512157
-
-
Bitcoin Wiki, Available from https://en.bitcoin.it/wiki/.
-
Bitcoin Wiki
-
-
-
5
-
-
84970880836
-
-
Bitcoin market cap, 2015. Available from: https://blockchain.info/charts/market-cap.
-
(2015)
Bitcoin Market Cap
-
-
-
6
-
-
84970877559
-
-
Bitcoin Relay Network, 2015. Available from: http://bitcoinrelaynetwork.org/.
-
(2015)
Bitcoin Relay Network
-
-
-
7
-
-
84970901798
-
-
Bitcoin XT, 2015. Available from: https://github.com/bitcoinxt/bitcoinxt.
-
(2015)
-
-
Bitcoin, X.T.1
-
8
-
-
84970915045
-
-
Double spending in Bitcoin, 2015. Available from: https://medium.com/@octskyward/doublespending-in-bitcoin-be0f1d1e8008.
-
(2015)
Double Spending in Bitcoin
-
-
-
11
-
-
84945176880
-
Research perspectives and challenges for bitcoin and cryptocurrencies
-
May
-
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy, May 2015.
-
(2015)
2015 IEEE Symposium on Security and Privacy
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.A.5
Felten, E.W.6
-
14
-
-
84970893533
-
-
Bitcoin exchanges, 2013. Available from: https://en.bitcoin.it/wiki/Exchanges.
-
(2013)
Bitcoin Exchanges
-
-
-
15
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Springer
-
Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436-454. Springer, 2014.
-
(2014)
Financial Cryptography and Data Security
, pp. 436-454
-
-
Eyal, I.1
Gün Sirer, E.2
-
16
-
-
84970905345
-
-
The Finney Attack, 2013. Available from: https://en.bitcoin.it/wiki/Weaknesses#The-22Finney.22-attack.
-
(2013)
The Finney Attack
-
-
-
18
-
-
84954509280
-
On the privacy provisions of bloom filters in lightweight bitcoin clients
-
New Orleans, LA, USA, December 8-12, 2014
-
Arthur Gervais, Ghassan O. Karame, Damian Gruber, and Srdjan Capkun. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, 2014.
-
(2014)
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014
-
-
Gervais, A.1
Karame, G.O.2
Gruber, D.3
Capkun, S.4
-
20
-
-
84869455769
-
Double-spending fast payments in bitcoin
-
New York, NY, USA,. ACM
-
Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS'12, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12
-
-
Karame, G.O.1
Androulaki, E.2
Capkun, S.3
-
21
-
-
84930850900
-
Misbehavior in bitcoin: A study of double-spending and accountability
-
May
-
Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and Srdjan Čapkun. Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur., 18(1):2:1-2:32, May 2015.
-
(2015)
ACM Trans. Inf. Syst. Secur.
, vol.18
, Issue.1
, pp. 21-232
-
-
Karame, G.O.1
Androulaki, E.2
Roeschlin, M.3
Gervais, A.4
Čapkun, S.5
-
22
-
-
84954128379
-
-
Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. Discovering bitcoin's public topology and influential nodes, 2015.
-
(2015)
Discovering Bitcoin's Public Topology and Influential Nodes
-
-
Miller, A.1
Litton, J.2
Pachulski, A.3
Gupta, N.4
Levin, D.5
Spring, N.6
Bhattacharjee, B.7
|