-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms, " Commun. ACM, vol. 24, no. 2, pp. 211-219, Feb. 1981.
-
(1981)
Commun ACM
, vol.24
, Issue.2
, pp. 211-219
-
-
Chaum, D.1
-
3
-
-
14844310899
-
Hashcash-A denial of service counter-measure
-
Aug [Online]. Available
-
A. Back,"Hashcash-A denial of service counter-measure," Tech. Rep., Aug. 2002 [Online]. Available: http://www.hashcash.org/papers/hashcash.pdf
-
(2002)
Tech. Rep
-
-
Back, A.1
-
5
-
-
0001604533
-
Blind signatures for untraceable payments
-
Aug
-
D. Chaum,"Blind signatures for untraceable payments," in Proc. 2nd Conf. Adv. Cryptol., Aug. 1982, pp. 199-203.
-
(1982)
Proc. 2nd Conf. Adv. Cryptol
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
84953635899
-
How to make a mint: The cryptography of anonymous electronic cash
-
L. Law, S. Sabett, and J. Solinas,"How to make a mint: The cryptography of anonymous electronic cash," Amer. Univ. Law Rev., vol. 46, no. 4, 1996.
-
(1996)
Amer. Univ. Law Rev
, vol.46
, Issue.4
-
-
Law, L.1
Sabett, S.2
Solinas, J.3
-
7
-
-
84914130734
-
-
[Online]. Available
-
W. Dai. (1998). B-Money [Online]. Available: http://www.weidai.com/bmoney.txt
-
(1998)
B-Money
-
-
Dai, W.1
-
9
-
-
84985960902
-
-
[Online]. Available
-
H. Finney. (2004). Rpow [Online]. Available: http://cryptome.org/rpow.htm
-
(2004)
Rpow
-
-
Finney, H.1
-
10
-
-
84985954629
-
-
[Online]. Available
-
N. Szabo. (2005). Bit Gold [Online]. Available: http://unenumerated. blogspot.de/2005/12/bit-gold.html
-
(2005)
Bit Gold
-
-
Szabo, N.1
-
11
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease,"The Byzantine generals problem," ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382-401, 1982.
-
(1982)
ACM Trans. Program. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
14
-
-
0032306029
-
Byzantine quorum systems
-
D. Malkhi and M. Reiter,"Byzantine quorum systems," Distrib. Comput., vol. 11, no. 4, pp. 203-213, 1998.
-
(1998)
Distrib. Comput
, vol.11
, Issue.4
, pp. 203-213
-
-
Malkhi, D.1
Reiter, M.2
-
16
-
-
79251545889
-
Bitcoin: A peer-to-peer electronic cash system
-
[Online]. Available
-
S. Nakamoto,"Bitcoin: A peer-to-peer electronic cash system," Tech. Rep., 2008 [Online]. Available: https://bitcoin.org/bitcoin.pdf.
-
(2008)
Tech. Rep
-
-
Nakamoto, S.1
-
17
-
-
84985974686
-
-
Nov [Online]. Available
-
S. Nakamoto. (2008, Nov.). Bitcoin P2P e-Cash Paper [Online]. Available: https://www.mail-archive.com/cryptography@metzdowd. com/msg09959.html
-
(2008)
Bitcoin P2P E-Cash Paper
-
-
Nakamoto, S.1
-
18
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Aug
-
R. C. Merkle,"A digital signature based on a conventional encryption function," in Proc. 7th Conf. Adv. Cryptol. (CRYPTO-87), Aug. 1987, pp. 369-378.
-
(1987)
Proc. 7th Conf. Adv. Cryptol. (CRYPTO-87)
, pp. 369-378
-
-
Merkle, R.C.1
-
19
-
-
0025849585
-
How to time-stamp a digital document
-
S. Haber and W. S. Stornetta,"How to time-stamp a digital document," J. Cryptol., vol. 3, pp. 99-111, 1991.
-
(1991)
J. Cryptol
, vol.3
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
21
-
-
84865819620
-
Bitter to better-How to make bitcoin a better currency
-
Mar
-
S. Barber, X. Boyen, E. Shi, and E. Uzun,"Bitter to better-How to make bitcoin a better currency," in Proc. 16th Int. Conf. Financial Cryptogr. Data Secur. (FC-12), Mar. 2012, pp. 399-414.
-
(2012)
Proc. 16th Int. Conf. Financial Cryptogr. Data Secur. (FC-1)
, pp. 399-414
-
-
Barber, S.1
Boyen, X.2
Shi, E.3
Uzun, E.4
-
22
-
-
84902360320
-
-
Univ. Waterloo, Waterloo, ON, Canada, Canada, Tech. Rep Dec
-
D. Drainville,"An analysis of the bitcoin electronic cash system," Univ. Waterloo, Waterloo, ON, Canada, Canada, Tech. Rep., Dec. 2012.
-
(2012)
An Analysis of the Bitcoin Electronic Cash System
-
-
Drainville, D.1
-
23
-
-
84945176880
-
SoK: Research perspectives and challenges for bitcoin and cryptocurrencies
-
May
-
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten,"SoK: Research perspectives and challenges for bitcoin and cryptocurrencies," in Proc. 36th IEEE Symp. Secur. Privacy (SP-15), May 2015, pp. 104-121.
-
(2015)
Proc. 36th IEEE Symp. Secur. Privacy (SP-15)
, pp. 104-121
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.A.5
Felten, E.W.6
-
24
-
-
84970942836
-
Bitcoin and beyond: A technical survey on decentralized digital currencies
-
2015 Tech. Rep
-
F. Tschorsch and B. Scheuermann,"Bitcoin and beyond: A technical survey on decentralized digital currencies," IACR Cryptology ePrint Archive, Tech. Rep. 2015/464, 2015.
-
(2015)
IACR Cryptology EPrint Archive
, vol.464
-
-
Tschorsch, F.1
Scheuermann, B.2
-
25
-
-
84985974814
-
-
[Online]. Available
-
(2014). Bitcoin Developer Documentation [Online]. Available: https://bitcoin.org/en/developer-documentation
-
(2014)
Bitcoin Developer Documentation
-
-
-
26
-
-
84918512157
-
-
[Online]. Available
-
(2014). The Bitcoin Wiki [Online]. Available: https://en.bitcoin.it/wiki
-
(2014)
The Bitcoin Wiki
-
-
-
27
-
-
84930803969
-
-
Dec [Online]. Available
-
M. Nielsen. (2013, Dec.). How the Bitcoin Protocol Actually Works [Online]. Available: http://www.michaelnielsen.org/ddi/how-thebitcoin-protocol-actually-works/
-
(2013)
How the Bitcoin Protocol Actually Works
-
-
Nielsen, M.1
-
29
-
-
0031238209
-
The state of the art in electronic payment systems
-
Sep
-
N. Asokan, P. A. Janson, M. Steiner, and M. Waidner,"The state of the art in electronic payment systems," IEEE Comput., vol. 30, no. 9, pp. 28-35, Sep. 1997.
-
(1997)
IEEE Comput
, vol.30
, Issue.9
, pp. 28-35
-
-
Asokan, N.1
Janson, P.A.2
Steiner, M.3
Waidner, M.4
-
31
-
-
84986004889
-
Difficulty control for blockchain-based consensus systems
-
D. Kraft,"Difficulty control for blockchain-based consensus systems," Peer Peer Netw. Appl., 2015.
-
(2015)
Peer Peer Netw. Appl
-
-
Kraft, D.1
-
32
-
-
84950294514
-
Near zero bitcoin transaction fees cannot last forever
-
Jun
-
K. Kaskaloglu,"Near zero bitcoin transaction fees cannot last forever," in Proc. Int. Conf. Digit. Secur. Forensics, Jun. 2014, pp. 91-99.
-
(2014)
Proc. Int. Conf. Digit. Secur. Forensics
, pp. 91-99
-
-
Kaskaloglu, K.1
-
33
-
-
84916608100
-
Elliptic curve cryptography in practice
-
Mar
-
J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, and E. Wustrow,"Elliptic curve cryptography in practice," in Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14), Mar. 2014, pp. 157-175.
-
(2014)
Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14)
, pp. 157-175
-
-
Bos, J.W.1
Halderman, J.A.2
Heninger, N.3
Moore, J.4
Naehrig, M.5
Wustrow, E.6
-
35
-
-
84992352519
-
Bitcoin transaction graph analysis
-
M. Fleder, M. Kester, and S. Pillai,"Bitcoin transaction graph analysis," Massachusetts Institute of Technology (MIT), Computer Systems Security, Tech. Rep. 6.858, 2013.
-
(2013)
Massachusetts Institute of Technology (MIT), Computer Systems Security, Tech. Rep
, vol.6858
-
-
Fleder, M.1
Kester, M.2
Pillai, S.3
-
36
-
-
84996485080
-
-
Jan [Online] Available
-
G. Andresen,"BIP 16: Pay to script hash," Jan. 2012 [Online]. Available: https://github.com/bitcoin/bips/blob/master/bip-0016.mediawiki
-
(2012)
BIP 16: Pay to Script Hash
-
-
Andresen, G.1
-
38
-
-
84985960891
-
Homomorphic payment addresses and the pay-to-contract protocol
-
abs/1212.3257
-
I. Gerhardt and T. Hanke,"Homomorphic payment addresses and the pay-to-contract protocol," Computing Research Repository, Tech. Rep. abs/1212.3257, 2012.
-
(2012)
Computing Research Repository, Tech. Rep
-
-
Gerhardt, I.1
Hanke, T.2
-
43
-
-
84986006256
-
The second bitcoin
-
Tech. Rep [Online]. Available
-
J. R. Willett,"The second bitcoin," White Paper, Tech. Rep., 2013 [Online]. Available: https://sites.google.com/site/2ndbtcwpaper/2ndBitcoinWhitepaper.pdf
-
(2013)
White Paper
-
-
Willett, J.R.1
-
44
-
-
84945225986
-
ETHEREUM: A secure decentralised generalised transaction ledger
-
[Online]. Available
-
G. Wood,"ETHEREUM: A secure decentralised generalised transaction ledger," Tech. Rep., 2014 [Online]. Available: http://gavwood.com/Paper.pdf
-
(2014)
Tech. Rep
-
-
Wood, G.1
-
47
-
-
84929076348
-
Overview of colored coins
-
[Online]. Available
-
M. Rosenfeld,"Overview of colored coins," Tech. Rep., 2012 [Online]. Available: https://bitcoil.co.il/BitcoinX.pdf
-
(2012)
Tech. Rep
-
-
Rosenfeld, M.1
-
48
-
-
84930760495
-
Characteristics of bitcoin users: An analysis of Google search data
-
A. Yelowitz and M. Wilson,"Characteristics of bitcoin users: An analysis of Google search data," Appl. Econ. Lett., vol. 22, no. 13, 2015.
-
(2015)
Appl. Econ. Lett
, vol.22
, Issue.13
-
-
Yelowitz, A.1
Wilson, M.2
-
49
-
-
84910053952
-
Who uses bitcoin? An exploration of the bitcoin community
-
Jul
-
J. Bohr andM. Bashir,"Who uses bitcoin? An exploration of the bitcoin community," in Proc. 12th IEEE Conf. Privacy Secur. Trust (PST-14), Jul. 2014, pp. 94-101.
-
(2014)
Proc. 12th IEEE Conf. Privacy Secur. Trust (PST-14)
, pp. 94-101
-
-
-
51
-
-
84928818221
-
What are the main drivers of the bitcoin price? Evidence from wavelet coherence analysis
-
Apr
-
L. Kristoufek,"What are the main drivers of the bitcoin price? Evidence from wavelet coherence analysis," PLoS ONE, vol. 10, no. 4, Apr. 2015.
-
(2015)
PLoS ONE
, vol.10
, Issue.4
-
-
Kristoufek, L.1
-
52
-
-
84985897499
-
The digital traces of bubbles: Feedback cycles between socio-economic signals in the bitcoin economy
-
Tech. Rep. abs/1408.1494
-
D. Garcia, C. J. Tessone, P. Mavrodiev, and N. Perony,"The digital traces of bubbles: Feedback cycles between socio-economic signals in the bitcoin economy," Computing Research Repository, Tech. Rep. abs/1408.1494, 2014.
-
(2014)
Computing Research Repository
-
-
Garcia, D.1
Tessone, C.J.2
Mavrodiev, P.3
Perony, N.4
-
53
-
-
84986006263
-
Bayesian regression and bitcoin
-
Tech. Rep. abs/1410.1231
-
D. Shah and K. Zhang,"Bayesian regression and bitcoin," Computing Research Repository, Tech. Rep. abs/1410.1231, 2014.
-
(2014)
Computing Research Repository
-
-
Shah, D.1
Zhang, K.2
-
54
-
-
84951870915
-
Securing bitcoin wallets via threshold signatures
-
[Online]. Available
-
S. Goldfeder, J. Bonneau, E. W. Felten, J. A. Kroll, and A. Narayanan,"Securing bitcoin wallets via threshold signatures," Tech. Rep., 2014 [Online]. Available: http://www.cs.princeton.edu/stevenag/bitcoin- threshold-signatures.pdf.
-
(2014)
Tech. Rep
-
-
Goldfeder, S.1
Bonneau, J.2
Felten, E.W.3
Kroll, J.A.4
Narayanan, A.5
-
55
-
-
84921357331
-
Bluewallet: The secure bitcoin wallet
-
Sep
-
T. Bamert, C. Decker, R. Wattenhofer, and S. Welten,"Bluewallet: The secure bitcoin wallet," in Proc. 10th Int.Workshop Secur. TrustManage., Sep. 2014, pp. 65-80.
-
(2014)
Proc. 10th Int.Workshop Secur. TrustManage
, pp. 65-80
-
-
Bamert, T.1
Decker, C.2
Wattenhofer, R.3
Welten, S.4
-
56
-
-
0035427012
-
Lattice attacks on digital signature schemes
-
N. Howgrave-Graham and N. P. Smart,"Lattice attacks on digital signature schemes," Des. Codes Cryptogr., vol. 23, no. 3, pp. 283-290, 2001.
-
(2001)
Des. Codes Cryptogr
, vol.23
, Issue.3
, pp. 283-290
-
-
Howgrave-Graham, N.1
Smart, N.P.2
-
57
-
-
84942644621
-
Anonymous Byzantine consensus from moderately-hard puzzles: A model for bitcoin
-
Univ. Florida, Gainesville, FL, USA, Tech. Rep Apr [Online]. Available
-
A. Miller and J. J. LaViola, Jr.,"Anonymous Byzantine consensus from moderately-hard puzzles: A model for bitcoin," Computer Science, Univ. Florida, Gainesville, FL, USA, Tech. Rep., Apr. 2014 [Online]. Available: http://tr.eecs.ucf.edu/id/eprint/78
-
(2014)
Computer Science
-
-
Miller, A.1
LaViola, J.J.2
-
58
-
-
84945176251
-
Analysis of hashrate-based double spending
-
[Online]. Available
-
M. Rosenfeld,"Analysis of hashrate-based double spending," Tech. Rep., 2012 [Online]. Available: https://bitcoil.co.il/Doublespend.pdf
-
(2012)
Tech. Rep
-
-
Rosenfeld, M.1
-
59
-
-
84985937786
-
Vector67
-
[Online]. Available
-
Vector67. (2011). Fake Bitcoins? [Online]. Available: https://bitcointalk. org/index.php?topic=36788.msg463391\#msg463391
-
(2011)
Fake Bitcoins?
-
-
-
62
-
-
84906488671
-
-
Mar [Online] Available
-
P. Wuille,"BIP 62: Dealing with malleability," Mar. 2014 [Online]. Available: https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki
-
(2014)
BIP 62: Dealing with Malleability
-
-
Wuille, P.1
-
64
-
-
84985968420
-
Corbixgwelt
-
, May [Online]. Available
-
corbixgwelt. (2011, May). Timejacking & Bitcoin [Online]. Available: http://culubas.blogspot.de/2011/05/timejacking-bitcoin-802.html.
-
(2011)
Timejacking & Bitcoin
-
-
-
66
-
-
85070733097
-
Eclipse attacks on bitcoin's peer-to-peer network
-
Aug
-
E. Heilman, A. Kendler, A. Zohar, and S. Goldberg,"Eclipse attacks on bitcoin's peer-to-peer network," in Proc. 24th USENIX Secur. Symp. (USENIX Secur.-15), Aug. 2015, pp. 129-144.
-
(2015)
Proc. 24th USENIX Secur. Symp. (USENIX Secur.-15)
, pp. 129-144
-
-
Heilman, E.1
Kendler, A.2
Zohar, A.3
Goldberg, S.4
-
69
-
-
84940409394
-
The economics of bitcoin mining, or bitcoin in the presence of adversaries
-
Jun
-
J. A. Kroll, I. C. Davey, and E. W. Felten,"The economics of bitcoin mining, or bitcoin in the presence of adversaries," in Proc. 12th Workshop Econ. Inf. Secur., Jun. 2013.
-
(2013)
Proc. 12th Workshop Econ. Inf. Secur
-
-
Kroll, J.A.1
Davey, I.C.2
Felten, E.W.3
-
70
-
-
84903160799
-
Is bitcoin a decentralized currency?
-
May
-
A. Gervais, G. Karame, S. Capkun, and V. Capkun,"Is bitcoin a decentralized currency? in Proc. 35th IEEE Symp. Secur. Privacy (SP-14), May 2014, pp. 54-60.
-
(2014)
Proc. 35th IEEE Symp. Secur. Privacy (SP-14)
, pp. 54-60
-
-
Gervais, A.1
Karame, G.2
Capkun, S.3
Capkun, V.4
-
71
-
-
84954139059
-
Tampering with the delivery of blocks and transactions in bitcoin
-
Oct
-
A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun,"Tampering with the delivery of blocks and transactions in bitcoin," in Proc. 22nd ACM Conf. Comput. Commun. Secur. (CCS-15), Oct. 2015, pp. 692-705.
-
(2015)
Proc. 22nd ACM Conf. Comput. Commun. Secur. (CCS-15)
, pp. 692-705
-
-
Gervais, A.1
Ritzdorf, H.2
Karame, G.O.3
Capkun, S.4
-
72
-
-
84910678324
-
Deanonymisation of clients in bitcoin p2p network
-
Nov
-
A. Biryukov, D. Khovratovich, and I. Pustogarov,"Deanonymisation of clients in bitcoin p2p network," in Proc. 21st ACM Conf. Comput. Commun. Secur., Nov. 2014, pp. 15-29.
-
(2014)
Proc. 21st ACM Conf. Comput. Commun. Secur
, pp. 15-29
-
-
Biryukov, A.1
Khovratovich, D.2
Pustogarov, I.3
-
73
-
-
84948142629
-
An analysis of anonymity in the bitcoin system
-
New York, NY, USA Springer
-
F. Reid and M. Harrigan,"An analysis of anonymity in the bitcoin system," in Security and Privacy in Social Networks. New York, NY, USA: Springer, 2013, pp. 197-223.
-
(2013)
Security and Privacy in Social Networks
, pp. 197-223
-
-
Reid, F.1
Harrigan, M.2
-
74
-
-
84890039053
-
A fistful of bitcoins: Characterizing payments among men with no names
-
Oct
-
S. Meiklejohn et al.,"A fistful of bitcoins: Characterizing payments among men with no names," in Proc. 13th ACM SIGCOMM Conf. Internet Meas. (IMC-13), Oct. 2013, pp. 127-140.
-
(2013)
Proc. 13th ACM SIGCOMM Conf. Internet Meas. (IMC-13)
, pp. 127-140
-
-
Meiklejohn, S.1
-
75
-
-
84883310811
-
Evaluating user privacy in bitcoin
-
Apr
-
E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, and S. Capkun,"Evaluating user privacy in bitcoin," in Proc. 17th Int. Conf. Financ. Cryptogr. Data Secur., Apr. 2013, pp. 34-51.
-
(2013)
Proc. 17th Int. Conf. Financ. Cryptogr. Data Secur
, pp. 34-51
-
-
Androulaki, E.1
Karame, G.2
Roeschlin, M.3
Scherer, T.4
Capkun, S.5
-
76
-
-
84943160306
-
Securing bitcoin wallets via a new DSA/ECDSA threshold signature scheme
-
[Online]. Available
-
S. Goldfeder et al.,"Securing bitcoin wallets via a new DSA/ECDSA threshold signature scheme," Tech. Rep., 2015 [Online]. Available: http://www.cs.princeton.edu/stevenag/threshold- sigs.pdf.
-
(2015)
Tech. Rep
-
-
Goldfeder, S.1
-
77
-
-
0018545449
-
How to share a secret
-
A. Shamir,"How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
78
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Aug
-
V. S. Miller,"Use of elliptic curves in cryptography," in Proc. 5th Conf. Adv. Cryptol., Aug. 1985, pp. 417-426.
-
(1985)
Proc. 5th Conf. Adv. Cryptol
, pp. 417-426
-
-
Miller, V.S.1
-
79
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz,"Elliptic curve cryptosystems," Math. Comput., vol. 48, no. 177, pp. 203-209, 1987.
-
(1987)
Math. Comput
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
82
-
-
84910674292
-
On offline payments with bitcoin (poster abstract)
-
Mar
-
A. Dmitrienko, D. Noack, A. Sadeghi, and M. Yung,"On offline payments with bitcoin (poster abstract)," in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 159-160.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 159-160
-
-
Dmitrienko, A.1
Noack, D.2
Sadeghi, A.3
Yung, M.4
-
83
-
-
84954192248
-
Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins
-
Oct
-
T. Ruffing, A. Kate, and D. Schröder,"Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins," in Proc. 22nd ACM Conf. Comput. Commun. Secur., Oct. 2015, pp. 219-230.
-
(2015)
Proc. 22nd ACM Conf. Comput. Commun. Secur
, pp. 219-230
-
-
Ruffing, T.1
Kate, A.2
Schröder, D.3
-
84
-
-
34848855786
-
Combating double-spending using cooperative P2P systems
-
Jun
-
I. Osipkov, E. Y. Vasserman, N. Hopper, and Y. Kim,"Combating double-spending using cooperative P2P systems," in Proc. 27th Int. Conf. Distrib. Comput. Syst. (ICDCS-07), Jun. 2007, p. 41.
-
(2007)
Proc. 27th Int. Conf. Distrib. Comput. Syst. (ICDCS-07)
, pp. 41
-
-
Osipkov, I.1
Vasserman, E.Y.2
Hopper, N.3
Kim, Y.4
-
86
-
-
84908882970
-
On the longest chain rule and programmed selfdestruction of crypto currencies
-
Tech. Rep. abs/1405.0534
-
N. T. Courtois,"On the longest chain rule and programmed selfdestruction of crypto currencies," Computing Research Repository, Tech. Rep. abs/1405.0534, 2014.
-
(2014)
Computing Research Repository
-
-
Courtois, N.T.1
-
88
-
-
84869455769
-
Double-spending fast payments in bitcoin
-
Oct
-
G. O. Karame, E. Androulaki, and S. Capkun,"Double-spending fast payments in bitcoin," in Proc. 19th ACM Conf. Comput. Commun. Secur. (CCS-12), Oct. 2012, pp. 906-917.
-
(2012)
Proc. 19th ACM Conf. Comput. Commun. Secur. (CCS-12)
, pp. 906-917
-
-
Karame, G.O.1
Androulaki, E.2
Capkun, S.3
-
89
-
-
84930850900
-
Misbehavior in bitcoin: A study of double-spending and accountability
-
G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, and S. Capkun,"Misbehavior in bitcoin: A study of double-spending and accountability," ACM Trans. Inf. Syst. Secur., vol. 18, no. 1, pp. 2:1-2:32, 2015.
-
(2015)
ACM Trans. Inf. Syst. Secur
, vol.18
, Issue.1
, pp. 21-232
-
-
Karame, G.O.1
Androulaki, E.2
Roeschlin, M.3
Gervais, A.4
Capkun, S.5
-
90
-
-
84916592965
-
Analysis of bitcoin pooled mining reward systems
-
Tech. Rep. abs/1112.4980
-
M. Rosenfeld,"Analysis of bitcoin pooled mining reward systems," Computing Research Repository, Tech. Rep. abs/1112.4980, 2011.
-
(2011)
Computing Research Repository
-
-
Rosenfeld, M.1
-
91
-
-
84906885606
-
On subversive miner strategies and block withholding attack in bitcoin digital currency
-
Tech. Rep. abs/1402.1718
-
N. T. Courtois and L. Bahack,"On subversive miner strategies and block withholding attack in bitcoin digital currency," Computing Research Repository, Tech. Rep. abs/1402.1718, 2014.
-
(2014)
Computing Research Repository
-
-
Courtois, N.T.1
Bahack, L.2
-
93
-
-
84950236811
-
On the malleability of bitcoin transactions
-
Jan
-
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek,"On the malleability of bitcoin transactions," in Proc. 2nd Workshop Bitcoin Res., Jan. 2015, pp. 1-18.
-
(2015)
Proc. 2nd Workshop Bitcoin Res
, pp. 1-18
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek, L.4
-
94
-
-
84910624054
-
Empirical analysis of denial-ofservice attacks in the bitcoin ecosystem
-
Mar
-
M. Vasek, M. Thornton, and T. Moore,"Empirical analysis of denial-ofservice attacks in the bitcoin ecosystem," in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 57-71.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 57-71
-
-
Vasek, M.1
Thornton, M.2
Moore, T.3
-
95
-
-
84954136934
-
Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges
-
Oct
-
G. G. Dagher, B. Bünz, J. Bonneau, J. Clark, and D. Boneh,"Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges," in Proc. 22nd ACM Conf. Comput. Commun. Secur. (CCS-15), Oct. 2015, pp. 720-731.
-
(2015)
Proc. 22nd ACM Conf. Comput. Commun. Secur. (CCS-15)
, pp. 720-731
-
-
Dagher, G.G.1
Bnz, B.2
Bonneau, J.3
Clark, J.4
Boneh, D.5
-
99
-
-
84954113196
-
Nonoutsourceable scratchoff puzzles to discourage bitcoin mining coalitions
-
Oct
-
A. Miller, A. E. Kosba, J. Katz, and E. Shi,"Nonoutsourceable scratchoff puzzles to discourage bitcoin mining coalitions," in Proc. 22nd ACM Conf. Comput. Commun. Secur. (CCS-15), Oct. 2015, pp. 680-691.
-
(2015)
Proc. 22nd ACM Conf. Comput. Commun. Secur. (CCS-15)
, pp. 680-691
-
-
Miller, A.1
Kosba, A.E.2
Katz, J.3
Shi, E.4
-
100
-
-
84914117917
-
Permacoin: Repurposing bitcoin work for data preservation
-
May
-
A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz,"Permacoin: Repurposing bitcoin work for data preservation," in Proc. IEEE 35th Symp. Secur. Privacy (SP-14), May 2014, pp. 475-490.
-
(2014)
Proc IEEE 35th Symp. Secur. Privacy (SP-14)
, pp. 475-490
-
-
Miller, A.1
Juels, A.2
Shi, E.3
Parno, B.4
Katz, J.5
-
101
-
-
84910648996
-
Game-theoretic analysis of DDoS attacks against bitcoin mining pools
-
Mar
-
B. Johnson, A. Laszka, J. Grossklags, M. Vasek, and T. Moore,"Game-theoretic analysis of DDoS attacks against bitcoin mining pools," in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 72-86.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 72-86
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
Vasek, M.4
Moore, T.5
-
102
-
-
84950249506
-
When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools
-
Jan
-
A. Laszka, B. Johnson, and J. Grossklags,"When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools," in Proc. 2nd Workshop Bitcoin Res. (BITCOIN-15), Jan. 2015, pp. 63-77.
-
(2015)
Proc. 2nd Workshop Bitcoin Res. (BITCOIN-15)
, pp. 63-77
-
-
Laszka, A.1
Johnson, B.2
Grossklags, J.3
-
103
-
-
84945225920
-
Theoretical bitcoin attacks with less than half of the computational power (draft)
-
Tech. Rep 2013
-
L. Bahack,"Theoretical bitcoin attacks with less than half of the computational power (draft)," IACR Cryptology ePrint Archive, Tech. Rep. 2013/868, 2013.
-
(2013)
IACR Cryptology EPrint Archive
, vol.868
-
-
Bahack, L.1
-
105
-
-
85014595662
-
Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay
-
Tech. Rep. abs/1505.05343
-
J. Göbel, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor,"Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay," Computing Research Repository, Tech. Rep. abs/1505.05343, 2015.
-
(2015)
Computing Research Repository
-
-
Göbel, J.1
Keeler, H.P.2
Krzesinski, A.E.3
Taylor, P.G.4
-
107
-
-
84985952288
-
-
, May [Online]. Available
-
S. D. Lerner. (2014, May). Decor+ [Online]. Available: https://bitslog.wordpress.com/2014/05/07/decor-2/
-
(2014)
Decor+
-
-
Lerner, S.D.1
-
108
-
-
0003871309
-
-
Jun [Online]. Available
-
D. Mills, J. Martin, J. Burbank, and W. Kasch. (2010, Jun.). Network Time Protocol Version 4: Protocol and Algorithms Specification, RFC 5905 (Proposed Standard), Internet Engineering Task Force [Online]. Available: http://www.ietf.org/rfc/rfc5905.txt
-
(2010)
Network Time Protocol Version 4: Protocol and Algorithms Specification, RFC 5905 (Proposed Standard), Internet Engineering Task Force
-
-
Mills, D.1
Martin, J.2
Burbank, J.3
Kasch, W.4
-
110
-
-
84947237529
-
Can heterogeneity make Gnutella scalable?
-
Mar
-
Q. Lv, S. Ratnasamy, and S. Shenker,"Can heterogeneity make Gnutella scalable?," in Proc. 1st Int. Workshop Peer Peer Syst. (IPTPS-02), Mar. 2002, pp. 94-103.
-
(2002)
Proc. 1st Int. Workshop Peer Peer Syst. (IPTPS-02)
, pp. 94-103
-
-
Lv, Q.1
Ratnasamy, S.2
Shenker, S.3
-
111
-
-
1242332540
-
Making Gnutella-like P2P systems scalable
-
Aug
-
Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker,"Making Gnutella-like P2P systems scalable," in Proc. Conf. Appl. Technol. Archit. Protocols Comput. Commun. (SIGCOMM03), Aug. 2003, pp. 407-418.
-
(2003)
Proc. Conf. Appl. Technol. Archit. Protocols Comput. Commun. (SIGCOMM-03)
, pp. 407-418
-
-
Chawathe, Y.1
Ratnasamy, S.2
Breslau, L.3
Lanham, N.4
Shenker, S.5
-
112
-
-
84985944878
-
EB3full
-
, May [Online]. Available
-
EB3full. (2014, May). simbit-P2P Network Simulator [Online]. Available: https://bitcointalk.org/index.php?topic=603171.0
-
(2014)
Simbit-P2P Network Simulator
-
-
-
113
-
-
85084162397
-
Shadow-bitcoin: Scalable simulation via direct execution of multi-threaded applications
-
Aug
-
A. Miller and R. Jansen,"Shadow-bitcoin: Scalable simulation via direct execution of multi-threaded applications," in Proc. 8th Workshop Cyber Secur. Exp. Test, Aug. 2015.
-
(2015)
Proc. 8th Workshop Cyber Secur. Exp. Test
-
-
Miller, A.1
Jansen, R.2
-
114
-
-
84942683561
-
A simulation model for analysis of attacks on the bitcoin peer-to-peer network
-
May
-
T. Neudecker, P. Andelfinger, and H. Hartenstein,"A simulation model for analysis of attacks on the bitcoin peer-to-peer network," in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM-15), May 2015, pp. 1327-1332.
-
(2015)
Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM-15)
, pp. 1327-1332
-
-
Neudecker, T.1
Andelfinger, P.2
Hartenstein, H.3
-
115
-
-
84910610330
-
The bitcoin P2P network
-
Mar
-
J. A. D. Donet, C. Pérez-Sola, and J. Herrera-Joancomarti,"The bitcoin P2P network," in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 87-102.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 87-102
-
-
Donet, J.A.D.1
Pérez-Sola, C.2
Herrera-Joancomarti, J.3
-
116
-
-
84902673916
-
Analyzing the deployment of bitcoin's P2P network under an AS-level perspective
-
June
-
S. Feld, M. Schönfeld, and M. Werner,"Analyzing the deployment of bitcoin's P2P network under an AS-level perspective," in Proc. 5th Int. Conf. Ambient Syst. Netw. Technol. (ANT-14), June 2014, pp. 1121-1126.
-
(2014)
Proc. 5th Int. Conf. Ambient Syst. Netw. Technol. (ANT-14)
, pp. 1121-1126
-
-
Feld, S.1
Schönfeld, M.2
Werner, M.3
-
117
-
-
84954128379
-
Discovering bitcoin's public topology and influential nodes
-
May [Online]. Available
-
A. Miller et al.,"Discovering bitcoin's public topology and influential nodes," Tech. Rep., May 2015 [Online]. Available: https://cs.umd.edu/projects/coinscope/coinscope.pdf
-
(2015)
Tech. Rep
-
-
Miller, A.1
-
119
-
-
84893229508
-
Have a snack, pay with bitcoins
-
Sep
-
T. Bamert, C. Decker, L. Elsen, R. Wattenhofer, and S. Welten,"Have a snack, pay with bitcoins," in Proc. 13th IEEE Int. Conf. Peer Peer Comput. (P2P-13), Sep. 2013, pp. 1-5.
-
(2013)
Proc. 13th IeEE Int. Conf. Peer Peer Comput. (P2P-13)
, pp. 1-5
-
-
Bamert, T.1
Decker, C.2
Elsen, L.3
Wattenhofer, R.4
Welten, S.5
-
120
-
-
84942589265
-
The bitcoin backbone protocol: Analysis and applications
-
Apr
-
J. A. Garay, A. Kiayias, and N. Leonardos,"The bitcoin backbone protocol: Analysis and applications," in Proc. 34th Int. Conf. Theory Appl. Cryptogr. Techn. (EUROCRYPT-15), Apr. 2015, pp. 281-310.
-
(2015)
Proc. 34th Int. Conf. Theory Appl. Cryptogr. Techn. (EUROCRYPT-15)
, pp. 281-310
-
-
Garay, J.A.1
Kiayias, A.2
Leonardos, N.3
-
121
-
-
84948138195
-
-
Aug Black Hat USA [Online]. Available
-
D. Kaminsky (2011, Aug.). Black OPS of TCP/IP, Black Hat USA, 2011 [Online]. Available: http://dankaminsky.com/2011/08/05/bo2k11/
-
(2011)
Black OPS of TCP/IP
-
-
Kaminsky, D.1
-
122
-
-
84985942872
-
-
Jun [Online]. Available
-
T. Klingberg and R. Manfredi. (2002, Jun.). Gnutella 0.6 [Online]. Available: http://rfc-gnutella.sourceforge.net/src/rfc-0/-6-draft.html
-
(2002)
Gnutella 0
, vol.6
-
-
Klingberg, T.1
Manfredi, R.2
-
123
-
-
84940409391
-
Bitcoin cooperative proof-of-stake
-
Tech. Rep. abs/1405.5741
-
S. L. Reed,"Bitcoin cooperative proof-of-stake," Computing Research Repository, Tech. Rep. abs/1405.5741, 2014.
-
(2014)
Computing Research Repository
-
-
Reed, S.L.1
-
124
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom,"Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
127
-
-
84940418546
-
The mini-blockchain scheme
-
Jul [Online]. Available Rev
-
J. Bruce,"The mini-blockchain scheme," Tech. Rep., Jul. 2014, Rev. 2 [Online]. Available: http://cryptonite.info/files/mbc-scheme-rev2.pdf
-
(2014)
Tech. Rep
, vol.2
-
-
Bruce, J.1
-
128
-
-
84908883865
-
Could bitcoin transactions be 100x faster?
-
Aug
-
N. T. Courtois, P. Emirdag, and D. A. Nagy,"Could bitcoin transactions be 100x faster?," in Proc. 11th Int. Conf. Secur. Cryptogr. (SECRYPT-14), Aug. 2014, pp. 426-431.
-
(2014)
Proc. 11th Int. Conf. Secur. Cryptogr. (SECRYPT-14)
, pp. 426-431
-
-
Courtois, N.T.1
Emirdag, P.2
Nagy, D.A.3
-
129
-
-
84985952268
-
Decentralised currencies are probably impossible but let's at least make them efficient
-
[Online]. Available
-
B. Laurie,"Decentralised currencies are probably impossible but let's at least make them efficient," Tech. Rep., 2011 [Online]. Available: http://www.links.org/files/decentralised-currencies.pdf
-
(2011)
Tech. Rep
-
-
Laurie, B.1
-
130
-
-
85084161366
-
Tor: The secondgeneration onion router
-
Aug
-
R. Dingledine, N. Mathewson, and P. Syverson,"Tor: The secondgeneration onion router," in Proc. 13th USENIX Secur. Symp. (USENIX Security-04), Aug. 2004, pp. 303-320.
-
(2004)
Proc. 13th USENIX Secur. Symp. (USENIX Security04)
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
131
-
-
84955557456
-
Hiding routing information
-
May
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson,"Hiding routing information," in Proc. 1st Int. Workshop Inf. Hiding (IHW-01), May 1996, pp. 137-150.
-
(1996)
Proc. 1st Int. Workshop Inf. Hiding (IHW-01)
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
133
-
-
84985952266
-
Bitcoin development mailing lists
-
[Online]. Available
-
Bitcoin Development Mailing Lists. (2014). Outbound Connections Rotation [Online]. Available: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2014-August/006502.html
-
(2014)
Outbound Connections Rotation
-
-
-
134
-
-
33750277833
-
Locating hidden servers
-
May
-
L."verlier and P. Syverson,"Locating hidden servers," in Proc. 27th IEEE Symp. Secur. Privacy (SP-06), May 2006, pp. 100-114.
-
(2006)
Proc. 27th IeEE Symp. Secur. Privacy (SP-06)
, pp. 100-114
-
-
-
135
-
-
84869175529
-
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
-
Oct
-
T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg,"Changing of the guards: A framework for understanding and improving entry guard selection in Tor," in Proc. ACM Workshop Privacy Electron. Soc. (WPES-12), Oct. 2012, pp. 43-54.
-
(2012)
Proc. ACM Workshop Privacy Electron. Soc. (WPES-12)
, pp. 43-54
-
-
Elahi, T.1
Bauer, K.2
AlSabah, M.3
Dingledine, R.4
Goldberg, I.5
-
136
-
-
84941579649
-
One fast guard for life (or 9 months)
-
Jul
-
R. Dingledine, N. Hopper, G. Kadianakis, and N. Mathewson,"One fast guard for life (or 9 months)," in Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs-14), Jul. 2014.
-
(2014)
Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs-14)
-
-
Dingledine, R.1
Hopper, N.2
Kadianakis, G.3
Mathewson, N.4
-
137
-
-
84950253378
-
Zombiecoin: Powering next-generation botnets with bitcoin
-
Jan
-
S. T. Ali, P. McCorry, P. H.-J. Lee, and F. Hao,"Zombiecoin: Powering next-generation botnets with bitcoin," in Proc. 2nd Workshop Bitcoin Res. (BITCOIN-15), Jan. 2015, pp. 34-48.
-
(2015)
Proc. 2nd Workshop Bitcoin Res. (BITCOIN-15)
, pp. 34-48
-
-
Ali, S.T.1
McCorry, P.2
Lee, P.H.-J.3
Hao, F.4
-
145
-
-
84906894803
-
Bitmessage: A peer-to-peer message authentication and delivery system
-
Nov [Online]. Available
-
J. Warren,"Bitmessage: A peer-to-peer message authentication and delivery system," Tech. Rep., Nov. 2012 [Online]. Available: https://bitmessage.org/bitmessage.pdf
-
(2012)
Tech. Rep
-
-
Warren, J.1
-
148
-
-
84985948694
-
Kiba
-
Dec [Online]. Available
-
Kiba. (2010, Dec.). BitDNS Bounty (3500 BTC) [Online]. Available: https://bitcointalk.org/index.php?topic=2072.0
-
(2010)
BitDNS Bounty (3500 BTC)
-
-
-
149
-
-
84881439098
-
Bitcoin: Censorship-resistant currency and domain system for the people
-
Jul Rotterdam, The Netherlands, Tech. Rep
-
D. Barok,"Bitcoin: Censorship-resistant currency and domain system for the people," Networked Media, Piet Zwar Institute, Rotterdam, The Netherlands, Tech. Rep., Jul. 2011.
-
(2011)
Networked Media, Piet Zwar Institute
-
-
Barok, D.1
-
150
-
-
84985910395
-
CertCoin: A namecoin based decentralized authentication system
-
Cambridge, MA, USA, Tech. Rep., 6.857 Class Project May
-
C. Fromknecht, D. Velicanu, and S. Yakoubov,"CertCoin: A namecoin based decentralized authentication system," Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep., 6.857 Class Project, May 2014.
-
(2014)
Massachusetts Inst. Technol
-
-
Fromknecht, C.1
Velicanu, D.2
Yakoubov, S.3
-
152
-
-
35348848696
-
Wherefore art thou R3579X?: Anonymized social networks, hidden patterns, and structural steganography
-
Apr
-
L. Backstrom, C. Dwork, and J. Kleinberg,"Wherefore art thou R3579X?: Anonymized social networks, hidden patterns, and structural steganography," in Proc. 16th Int. World Wide Web Conf. ( WWW-07), Apr. 2007, pp. 181-190.
-
(2007)
Proc. 16th Int. World Wide Web Conf. ( WWW-07)
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
154
-
-
85016109785
-
Structure and anonymity of the bitcoin transaction graph
-
M. Ober, S. Katzenbeisser, and K. Hamacher,"Structure and anonymity of the bitcoin transaction graph," Future Internet, vol. 5, no. 2, pp. 237-250, 2013.
-
(2013)
Future Internet
, vol.5
, Issue.2
, pp. 237-250
-
-
Ober, M.1
Katzenbeisser, S.2
Hamacher, K.3
-
155
-
-
84902384491
-
Exploring the bitcoin network
-
Apr
-
A. Baumann, B. Fabian, and M. Lischke,"Exploring the bitcoin network," in Proc. 10th Int. Conf. Web Inf. Syst. Technol. (WebDB-04), Apr. 2014, pp. 369-374.
-
(2014)
Proc. 10th Int. Conf. Web Inf. Syst. Technol. (WebDB-04)
, pp. 369-374
-
-
Baumann, A.1
Fabian, B.2
Lischke, M.3
-
156
-
-
84910673553
-
How did dread pirate roberts acquire and protect his bitcoin wealth?
-
Mar
-
D. Ron and A. Shamir,"How did dread pirate roberts acquire and protect his bitcoin wealth? in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 3-15.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 3-15
-
-
Ron, D.1
Shamir, A.2
-
157
-
-
84949988990
-
There's no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams
-
Jan
-
M. Vasek and T. Moore,"There's no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams," in Proc. 19th Int. Conf. Financial Cryptogr. Data Secur. (FC-15), Jan. 2015, pp. 44-61.
-
(2015)
Proc. 19th Int. Conf. Financial Cryptogr. Data Secur. (FC-15)
, pp. 44-61
-
-
Vasek, M.1
Moore, T.2
-
158
-
-
84985963710
-
Marker addresses: Adding identification information to bitcoin transactions to leverage existing trust relationships
-
Sep
-
J. Vornberger,"Marker addresses: Adding identification information to bitcoin transactions to leverage existing trust relationships," in Proc. 42nd GI Jahrestagung (INFORMATIK-12), Sep. 2012, pp. 28-38.
-
(2012)
Proc. 42nd GI Jahrestagung (INFORMATIK-12)
, pp. 28-38
-
-
Vornberger, J.1
-
159
-
-
84910643373
-
Challenges and opportunities associated with a bitcoinbased transaction rating system
-
Mar
-
D. Vandervort,"Challenges and opportunities associated with a bitcoinbased transaction rating system," in Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14), Mar. 2014, pp. 33-42.
-
(2014)
Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14)
, pp. 33-42
-
-
Vandervort, D.1
-
161
-
-
84916608776
-
Bitiodine: Extracting intelligence from the bitcoin network
-
Mar
-
M. Spagnuolo, F. Maggi, and S. Zanero,"Bitiodine: Extracting intelligence from the bitcoin network," in Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14), Mar. 2014, pp. 457-468.
-
(2014)
Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14)
, pp. 457-468
-
-
Spagnuolo, M.1
Maggi, F.2
Zanero, S.3
-
162
-
-
84973318190
-
The pagerank citation ranking: Bringing order to the web
-
Nov
-
L. Page, S. Brin, R. Motwani, and T. Winograd,"The pagerank citation ranking: Bringing order to the web," Stanford InfoLab, Tech. Rep. 1999-66, Nov. 1999.
-
(1999)
Stanford InfoLab, Tech. Rep
, pp. 1999-2066
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
163
-
-
84985911404
-
A preliminary field guide for bitcoin transaction patterns
-
D. Ferrin,"A preliminary field guide for bitcoin transaction patterns," in Proc. Texas Bitcoin Conf., 2015.
-
(2015)
Proc. Texas Bitcoin Conf
-
-
Ferrin, D.1
-
167
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N.Mathewson,"Mixminion: Design of a type III anonymous remailer protocol," in Proc. 24th IEEE Symp. Secur. Privacy (SP-03), May 2003, pp. 2-15.
-
(2003)
Proc. 24th IeEE Symp. Secur. Privacy (SP-03)
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
168
-
-
49049097183
-
Mixmaster protocol-Version 2
-
Jul
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman,"Mixmaster Protocol-Version 2," IETF Internet Draft, Jul. 2003.
-
(2003)
IeTF Internet Draft
-
-
Möller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
169
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
Oct
-
A. Serjantov, R. Dingledine, and P. Syverson,"From a trickle to a flood: Active attacks on several mix types," in Proc. 5th Int. Workshop Inf. Hiding (IHW-02), Oct. 2002, pp. 36-52.
-
(2002)
Proc. 5th Int. Workshop Inf. Hiding (IHW-02)
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
171
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Jul
-
J.-F. Raymond,"Traffic analysis: Protocols, attacks, design issues, and open problems," in Proc. Int. Workshop Des. Privacy Enhancing Technol. Des. Issues Anonymity Unobservability (PET-00), Jul. 2000, pp. 10-29.
-
(2000)
Proc. Int. Workshop Des. Privacy Enhancing Technol. Des. Issues Anonymity Unobservability (PET-00)
, pp. 10-29
-
-
Raymond, J.-F.1
-
172
-
-
84937565289
-
Towards an analysis of onion routing security
-
Jul
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr,"Towards an analysis of onion routing security," in Proc. Int. Workshop Des. Privacy Enhancing Technol. Des. Issues Anonymity Unobservability (PET-00), Jul. 2000, pp. 96-114.
-
(2000)
Proc. Int. Workshop Des. Privacy Enhancing Technol. Des. Issues Anonymity Unobservability (PET-00)
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
173
-
-
84889028646
-
Users get routed: Traffic correlation on Tor by realistic adversaries
-
Oct
-
A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson,"Users get routed: Traffic correlation on Tor by realistic adversaries," in Proc. 20th ACM Conf. Comput. Commun. Secur. (CCS-13), Oct. 2013, pp. 337-348.
-
(2013)
Proc. 20th ACM Conf. Comput. Commun. Secur. (CCS-13)
, pp. 337-348
-
-
Johnson, A.1
Wacek, C.2
Jansen, R.3
Sherr, M.4
Syverson, P.5
-
174
-
-
84916638798
-
Mixcoin: Anonymity for bitcoin with accountable mixes
-
Mar
-
J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll, and E.W. Felten,"Mixcoin: Anonymity for bitcoin with accountable mixes," in Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14), Mar. 2014, pp. 486-504.
-
(2014)
Proc. 18th Int. Conf. Financial Cryptogr. Data Secur. (FC-14)
, pp. 486-504
-
-
Bonneau, J.1
Narayanan, A.2
Miller, A.3
Clark, J.4
Kroll, J.A.5
Felten, E.W.6
-
176
-
-
84985956551
-
-
[Online]. Available
-
K. Atlas. (2014). Coinjoin Sudoku [Online]. Available: http://www. coinjoinsudoku.com
-
(2014)
Coinjoin Sudoku
-
-
Atlas, K.1
-
177
-
-
84985977027
-
Michael-S (bitcointalk.org)
-
May [Online]. Available
-
Michael-S (bitcointalk.org). (2014, May). Why Coinjoin, as Used in Darkcoin, Does not Bring Full Anonymity [Online]. Available: http://www.scribd.com/doc/227369807/Bitcoin-Coinjoin-Not-Anonymousv01
-
(2014)
Why Coinjoin, As Used in Darkcoin, Does Not Bring Full Anonymity
-
-
-
179
-
-
84985993844
-
Blind signatures for bitcoin transaction anonymity
-
[Online]. Available
-
W. Ladd,"Blind signatures for bitcoin transaction anonymity," Tech. Rep., 2013 [Online]. Available: http://wbl.github.io/bitcoinanon.pdf
-
(2013)
Tech. Rep
-
-
Ladd, W.1
-
180
-
-
84906500300
-
Coinshuffle: Practical decentralized coin mixing for bitcoin
-
Sep
-
T. Ruffing, P. Moreno-Sanchez, and A. Kate,"Coinshuffle: Practical decentralized coin mixing for bitcoin," in Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs-14), Sep. 2014, pp. 345-364.
-
(2014)
Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs-14)
, pp. 345-364
-
-
Ruffing, T.1
Moreno-Sanchez, P.2
Kate, A.3
-
181
-
-
84910627417
-
INcreasing anonymity in bitcoin
-
Mar
-
A. Saxena, J. Misra, and A. Dhar,"Increasing anonymity in bitcoin," in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 122-139.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 122-139
-
-
Saxena, A.1
Misra, J.2
Dhar, A.3
-
182
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
May
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham,"Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. 22nd Int. Conf. Theory Appl. Cryptogr. Techn. (EUROCRYPT-03), May 2003, pp. 416-432.
-
(2003)
Proc. 22nd Int. Conf. Theory Appl. Cryptogr. Techn. (EUROCRYPT-03)
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
183
-
-
84910677988
-
Fair two-party computations via bitcoin deposits
-
Mar
-
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek,"Fair two-party computations via bitcoin deposits," in Proc. 1st Workshop Bitcoin Res. (BITCOIN-14), Mar. 2014, pp. 105-121.
-
(2014)
Proc. 1st Workshop Bitcoin Res. (BITCOIN-14)
, pp. 105-121
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek, L.4
-
185
-
-
84910618609
-
Sybilresistant mixing for bitcoin
-
Nov
-
G. D. Bissias, A. P. Ozisik, B. N. Levine, and M. Liberatore,"Sybilresistant mixing for bitcoin," in Proc. 13th ACM Workshop Privacy Electron. Soc. (WPES-14), Nov. 2014, pp. 149-158.
-
(2014)
Proc. 13th ACM Workshop Privacy Electron. Soc. (WPES-14)
, pp. 149-158
-
-
Bissias, G.D.1
Ozisik, A.P.2
Levine, B.N.3
Liberatore, M.4
-
186
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
May
-
M. Blum, P. Feldman, and S. Micali,"Non-interactive zero-knowledge and its applications," in Proc. 20th Annu. ACM Symp. Theory Comput. (STOC-88), May 1988, pp. 103-112.
-
(1988)
Proc. 20th Annu ACM Symp. Theory Comput. (STOC-88)
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
187
-
-
84881236275
-
Zerocoin: Anonymous distributed e-cash from bitcoin
-
May
-
I. Miers, C. Garman, M. Green, and A. D. Rubin,"Zerocoin: Anonymous distributed e-cash from bitcoin," in Proc. 34th IEEE Symp. Secur. Privacy (SP-13), May 2013, pp. 397-411.
-
(2013)
Proc. 34th IeEE Symp. Secur. Privacy (SP-13)
, pp. 397-411
-
-
Miers, I.1
Garman, C.2
Green, M.3
Rubin, A.D.4
-
189
-
-
84910677439
-
Zerocash: Decentralized anonymous payments from bitcoin
-
May
-
E. Ben-Sasson et al.,"Zerocash: Decentralized anonymous payments from bitcoin," in Proc. 35th IEEE Symp. Secur. Privacy (SP-14), May 2014, pp. 459-474.
-
(2014)
Proc. 35th IeEE Symp. Secur. Privacy (SP-14)
, pp. 459-474
-
-
Ben-Sasson, E.1
-
190
-
-
84940418555
-
Cryptonote v2.0
-
Oct [Online]. Available
-
N. van Saberhagen,"Cryptonote v2.0," Tech. Rep., Oct. 2013 [Online]. Available: https://cryptonote.org/whitepaper.pdf
-
(2013)
Tech. Rep
-
-
Van Saberhagen, N.1
-
191
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. E. Hellman,"New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IeEE Trans. Inf. Theory
, vol.T-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
192
-
-
84946833891
-
How to leak a secret
-
Dec
-
R. L. Rivest, A. Shamir, and Y. Tauman,"How to leak a secret," in Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Secur. (ASIACRYPT-01), Dec. 2001, pp. 552-565.
-
(2001)
Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Secur. (ASIACRYPT-01)
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
194
-
-
0022045868
-
IMpossibility of distributed consensus with one faulty process
-
Fischer, N. A. Lynch, and M. S. Paterson
-
M. J. Fischer, N. A. Lynch, and M. S. Paterson,"Impossibility of distributed consensus with one faulty process," J. ACM, vol. 32, no. 2, pp. 374-382, 1985.
-
(1985)
J. Acm
, vol.32
, Issue.2
, pp. 374-382
-
-
-
195
-
-
0023168356
-
On the minimal synchronism needed for distributed consensus
-
D. Dolev, C. Dwork, and L. Stockmeyer,"On the minimal synchronism needed for distributed consensus," J. ACM, vol. 34, no. 1, pp. 77-97, 1987.
-
(1987)
J acm
, vol.34
, Issue.1
, pp. 77-97
-
-
Dolev, D.1
Dwork, C.2
Stockmeyer, L.3
-
197
-
-
0026880817
-
The many faces of consensus in distributed systems
-
Jun
-
J. Turek and D. Shasha,"The many faces of consensus in distributed systems," IEEE Comput., vol. 25, no. 6, pp. 8-17, Jun. 1992.
-
(1992)
IeEE Comput
, vol.25
, Issue.6
, pp. 8-17
-
-
Turek, J.1
Shasha, D.2
-
198
-
-
0141610192
-
Randomized protocols for asynchronous consensus
-
J. Aspnes,"Randomized protocols for asynchronous consensus," Distrib. Comput., vol. 16, nos. 2-3, pp. 165-175, 2003.
-
(2003)
Distrib. Comput
, vol.16
, Issue.2-3
, pp. 165-175
-
-
Aspnes, J.1
-
199
-
-
33746062866
-
Stabilizing consensus in mobile networks
-
Jun
-
D. Angluin, M. J. Fischer, and H. Jiang,"Stabilizing consensus in mobile networks," in Proc. 2nd Int. IEEE Conf. Distrib. Comput. Sensor Syst. (DCOSS-06), Jun. 2006, pp. 37-50.
-
(2006)
Proc. 2nd Int IeEE Conf. Distrib. Comput. Sensor Syst. (DCOSS-06)
, pp. 37-50
-
-
Angluin, D.1
Fischer, M.J.2
Jiang, H.3
-
200
-
-
84945190736
-
The ripple protocol consensus algorithm
-
[Online]. Available
-
D. Schwartz, N. Youngs, and A. Britto,"The ripple protocol consensus algorithm," Tech. Rep., 2014 [Online]. Available: https://ripple.com/files/ripple-consensus-whitepaper.pdf
-
(2014)
Tech. Rep
-
-
Schwartz, D.1
Youngs, N.2
Britto, A.3
-
201
-
-
77951108983
-
Stumbling over consensus research: Misunderstandings and issues
-
New York, NY, USA Springer
-
M. K. Aguilera,"Stumbling over consensus research: Misunderstandings and issues," in Replication. New York, NY, USA: Springer, 2010, pp. 59-72.
-
(2010)
Replication
, pp. 59-72
-
-
Aguilera, M.K.1
-
203
-
-
77956586366
-
Exposing computationally-challenged Byzantine impostors
-
Jul Yale Univ., Tech. Rep. YALEU/DCS/TR-1332
-
J. Aspnes, C. Jackson, and A. Krishnamurthy,"Exposing computationally-challenged Byzantine impostors," Dept. Comput. Sci., Yale Univ., Tech. Rep. YALEU/DCS/TR-1332, Jul. 2005.
-
(2005)
Dept. Comput. Sci
-
-
Aspnes, J.1
Jackson, C.2
Krishnamurthy, A.3
-
204
-
-
84985974686
-
-
Nov [Online]. Available
-
S. Nakamoto. (2008, Nov.). Re: Bitcoin P2P e-Cash Paper [Online]. Available: https://www.mail-archive.com/cryptography@metzdowd. com/msg09997.html
-
(2008)
Re: Bitcoin P2P E-Cash Paper
-
-
Nakamoto, S.1
-
206
-
-
48349138632
-
Cost-efficient SHA hardware accelerators
-
Aug
-
R. Chaves, G. Kuzmanov, L. Sousa, and S. Vassiliadis,"Cost-efficient SHA hardware accelerators," IEEE Trans. Very Large Scale Integr. Syst., vol. 16, no. 8, pp. 999-1008, Aug. 2008.
-
(2008)
IeEE Trans. Very Large Scale Integr. Syst
, vol.16
, Issue.8
, pp. 999-1008
-
-
Chaves, R.1
Kuzmanov, G.2
Sousa, L.3
Vassiliadis, S.4
-
209
-
-
84906885614
-
The unreasonable fundamental incertitudes behind bitcoin mining
-
Tech. Rep. abs/1310.7935
-
N. T. Courtois, M. Grajek, and R. Naik,"The unreasonable fundamental incertitudes behind bitcoin mining," Computing Research Repository, Tech. Rep. abs/1310.7935, 2013.
-
(2013)
Computing Research Repository
-
-
Courtois, N.T.1
Grajek, M.2
Naik, R.3
-
210
-
-
84906875214
-
Optimizing SHA256 in bitcoin mining
-
Sep
-
N. T. Courtois, M. Grajek, and R. Naik,"Optimizing SHA256 in bitcoin mining," in Proc. 3rd Int. Conf. Cryptogr. Secur. Syst. (CSS06), Sep. 2014, pp. 131-144.
-
(2014)
Proc. 3rd Int. Conf. Cryptogr. Secur. Syst. (CSS-06)
, pp. 131-144
-
-
Courtois, N.T.1
Grajek, M.2
Naik, R.3
-
211
-
-
85052697432
-
Do the rich get richer? An empirical analysis of the bitcoin transaction network
-
Tech. Rep. abs/1308.3892
-
D. Kondor, M. Pósfai, I. Csabai, and G. Vattay,"Do the rich get richer? An empirical analysis of the bitcoin transaction network," Computing Research Repository, Tech. Rep. abs/1308.3892, 2013.
-
(2013)
Computing Research Repository
-
-
Kondor, D.1
Pósfai, M.2
Csabai, I.3
Vattay, G.4
-
212
-
-
35248835679
-
On memory-bound functions for fighting spam
-
Aug
-
C. Dwork, A. Goldberg, and M. Naor,"On memory-bound functions for fighting spam," in Proc. 23rd Annu. Int. Cryptol. Conf. (CRYPTO03), Aug. 2003, pp. 426-444.
-
(2003)
Proc. 23rd Annu. Int. Cryptol. Conf. (CRYPTO03)
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
213
-
-
21644461880
-
Moderately hard, memory-bound functions
-
May
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber,"Moderately hard, memory-bound functions," TOIT ACM Trans. Internet Technol., vol. 5, no. 2, pp. 299-327, May 2005.
-
(2005)
TOIT ACM Trans. Internet Technol
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
214
-
-
84868349605
-
Stronger key derivation via sequential memoryhard functions
-
May
-
C. Percival,"Stronger key derivation via sequential memoryhard functions," in Proc. Tech. BSD Conf. (BSDCan09), May 2009.
-
(2009)
Proc. Tech. BSD Conf. (BSDCan09)
-
-
Percival, C.1
-
216
-
-
84985979886
-
-
[Online]. Available
-
B. D. M. Lists. (2014). ASIC-Proof Mining [Online]. Available: http://sourceforge.net/p/bitcoin/mailman/bitcoin-development/thread/53B714A8.1080603@codehalo.com/
-
(2014)
ASIC-Proof Mining
-
-
Lists, B.D.M.1
-
217
-
-
84985943136
-
Nooshare: A decentralized ledger of shared computational resources
-
Apr [Online]. Available
-
A. Coventry,"Nooshare: A decentralized ledger of shared computational resources," Tech. Rep., Apr. 2012 [Online]. Available: http://web. mit.edu/alex-c/www/nooshare.pdf
-
(2012)
Tech. Rep
-
-
Coventry, A.1
-
218
-
-
84910652115
-
Primecoin: Cryptocurrency with prime number proof-ofwork
-
[Online]. Available
-
S. King,"Primecoin: Cryptocurrency with prime number proof-ofwork," Tech. Rep., 2013 [Online]. Available: http://primecoin.io/bin/primecoin-paper.pdf
-
(2013)
Tech. Rep
-
-
King, S.1
-
220
-
-
84985975010
-
MAVEPAY, a new lightweight payment scheme for peer to peer currency networks
-
Apr [Online]. Available
-
S. D. Lerner,"MAVEPAY, a new lightweight payment scheme for peer to peer currency networks," Tech. Rep., Apr. 2012 [Online]. Available: https://bitslog.files.wordpress.com/2012/04/mavepay1.pdf
-
(2012)
Tech. Rep
-
-
Lerner, S.D.1
-
222
-
-
84985897264
-
MAVE, new lightweight digital signature protocols for massive verifications
-
Apr [Online]. Available
-
S. D. Lerner,"MAVE, new lightweight digital signature protocols for massive verifications," Tech. Rep., Apr. 2012 [Online]. Available: https://bitslog.files.wordpress.com/2012/04/mave1.pdf
-
(2012)
Tech. Rep
-
-
Lerner, S.D.1
-
223
-
-
0001989185
-
A new family of authentication protocols
-
R. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas, and R. Needham,"A new family of authentication protocols," ACM Oper. Syst. Rev., vol. 32, no. 4, pp. 9-20, 1998.
-
(1998)
ACM Oper. Syst. Rev
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
224
-
-
84929111122
-
The bitcoin mining game
-
Mar Univ. Lyon, Tech. Rep. halshs-00958224
-
N. Houy,"The bitcoin mining game," GATE, Univ. Lyon, Tech. Rep. halshs-00958224, Mar. 2014.
-
(2014)
Gate
-
-
Houy, N.1
-
225
-
-
0014413249
-
The tragedy of the commons
-
G. Hardin,"The tragedy of the commons," Science, vol. 162, no. 3859, pp. 1243-1248, 1968.
-
(1968)
Science
, vol.162
, Issue.3859
, pp. 1243-1248
-
-
Hardin, G.1
-
226
-
-
84963573044
-
Proof of activity: Extending bitcoin's proof of work via proof of stake
-
Jun
-
I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld,"Proof of activity: Extending bitcoin's proof of work via proof of stake," in Proc. 9th Workshop Econ. Netw. Syst. Comput. (NetEcon14), Jun. 2014, pp. 34-37.
-
(2014)
Proc. 9th Workshop Econ. Netw. Syst. Comput. (NetEcon14)
, pp. 34-37
-
-
Bentov, I.1
Lee, C.2
Mizrahi, A.3
Rosenfeld, M.4
-
227
-
-
84914130733
-
Ppcoin: Peer-to-peer crypto-currency with proof-of-stake
-
Aug [Online]. Available
-
S. King and S. Nadal,"Ppcoin: peer-to-peer crypto-currency with proof-of-stake," Tech. Rep., Aug. 2012 [Online]. Available: http://peercoin.net/assets/paper/peercoin-paper.pdf
-
(2012)
Tech. Rep
-
-
King, S.1
Nadal, S.2
-
229
-
-
84902684730
-
IT will cost you nothing to"kill" a proof-of-stake cryptocurrency
-
N. Houy,"It will cost you nothing to"kill" a proof-of-stake cryptocurrency," Econ. Bull., vol. 34, no. 2, pp. 1038-1044, 2014.
-
(2014)
Econ. Bull
, vol.34
, Issue.2
, pp. 1038-1044
-
-
Houy, N.1
-
230
-
-
84966495976
-
Transactions as proof-of-stake
-
Nov
-
D. Larimer,"Transactions as proof-of-stake," Tech. Rep., Nov. 2013.
-
(2013)
Tech. Rep
-
-
Larimer, D.1
-
231
-
-
84985920279
-
-
bitshares [Online]. Available
-
D. Larimer. (2014). Delegated Proof-of-Stake (DPOS), bitshares [Online]. Available: https://bitshares.org/technology/delegated-proofof-stake-consensus/
-
(2014)
Delegated Proof-of-Stake (DPOS)
-
-
Larimer, D.1
-
232
-
-
84863512336
-
On bitcoin and red balloons
-
Jun
-
M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar,"On bitcoin and red balloons," in Proc. 13th ACM Conf. Electron. Commerce (EC13), Jun. 2012, pp. 56-73.
-
(2012)
Proc. 13th ACM Conf. Electron. Commerce (EC13)
, pp. 56-73
-
-
Babaioff, M.1
Dobzinski, S.2
Oren, S.3
Zohar, A.4
-
233
-
-
79960339420
-
Time critical social mobilization: The DARPA network challenge winning strategy
-
Tech. Rep. abs/1008.3172
-
G. Pickard et al.,"Time critical social mobilization: The DARPA network challenge winning strategy," Computing Research Repository, Tech. Rep. abs/1008.3172, 2010.
-
(2010)
Computing Research Repository
-
-
Pickard, G.1
-
234
-
-
84940418554
-
Proof of stake velocity: Building the social currency of the digital age
-
Apr [Online]. Available
-
L. Ren,"Proof of stake velocity: Building the social currency of the digital age," Tech. Rep., Apr. 2014 [Online]. Available: http://www.reddcoin.com/papers/PoSV.pdf
-
(2014)
Tech. Rep
-
-
Ren, L.1
-
235
-
-
84918531199
-
Towards a more democratic mining in bitcoins
-
Dec
-
G. Paul, P. Sarkar, and S. Mukherjee,"Towards a more democratic mining in bitcoins," in Proc. 10th Int. Conf. Inf. Syst. Secur. (ICISS14), Dec. 2014, pp. 185-203.
-
(2014)
Proc. 10th Int. Conf. Inf. Syst. Secur. (ICISS14)
, pp. 185-203
-
-
Paul, G.1
Sarkar, P.2
Mukherjee, S.3
-
236
-
-
77953310746
-
Reciprocity and barter in peer-to-peer systems
-
Mar
-
D. S. Menasché, L. Massoulié, and D. F. Towsley,"Reciprocity and barter in peer-to-peer systems," in Proc. 29th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM10), Mar. 2010, pp. 1505-1513.
-
(2010)
Proc. 29th Annu. Joint Conf IeEE Comput. Commun. Soc. (INFOCOM10)
, pp. 1505-1513
-
-
Menasché, D.S.1
Massoulié, L.2
Towsley, D.F.3
-
237
-
-
80054108796
-
Bilateral and multilateral exchanges for peer-assisted content distribution
-
Oct
-
C. Aperjis, R. Johari, and M. J. Freedman,"Bilateral and multilateral exchanges for peer-assisted content distribution," IEEE/ACMTrans. Netw., vol. 19, no. 5, pp. 1290-1303, Oct. 2011.
-
(2011)
IeEE/ACMTrans. Netw
, vol.19
, Issue.5
, pp. 1290-1303
-
-
Aperjis, C.1
Johari, R.2
Freedman, M.J.3
-
238
-
-
84905384294
-
Note on fair coin toss via bitcoin
-
Tech. Rep. abs/1402.3698
-
A. Back and I. Bentov,"Note on fair coin toss via bitcoin," Computing Research Repository, Tech. Rep. abs/1402.3698, 2014.
-
(2014)
Computing Research Repository
-
-
Back, A.1
Bentov, I.2
-
239
-
-
84910660043
-
Secure multiparty computations on bitcoin
-
May
-
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek,"Secure multiparty computations on bitcoin," in Proc. IEEE 35th Symp. Secur. Privacy (SP14), May 2014, pp. 443-458.
-
(2014)
Proc IeEE 35th Symp. Secur. Privacy (SP14)
, pp. 443-458
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek, L.4
-
240
-
-
84954158495
-
How to use bitcoin to play decentralized poker
-
Oct
-
R. Kumaresan, T. Moran, and I. Bentov,"How to use bitcoin to play decentralized poker," in Proc. ACM 22nd Conf. Comput. Commun. Secur. (CCS15:), Oct. 2015, pp. 195-206.
-
(2015)
Proc ACM 22nd Conf. Comput. Commun. Secur. (CCS15:)
, pp. 195-206
-
-
Kumaresan, R.1
Moran, T.2
Bentov, I.3
-
242
-
-
84943593919
-
Enabling blockchain innovations with pegged sidechains
-
Oct [Online]. Available
-
A. Back et al. (2014, Oct.)."Enabling blockchain innovations with pegged sidechains," Tech. Rep.[Online]. Available: http://www.blockstream.com/sidechains.pdf
-
(2014)
Tech. Rep
-
-
Back, A.1
-
243
-
-
84949958058
-
A torpath to torcoin: Proof-of-bandwidth altcoins for compensating relays
-
Jul
-
M. Ghosh, M. Richardson, B. Ford, and R. Jansen,"A torpath to torcoin: Proof-of-bandwidth altcoins for compensating relays," in Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs14), Jul. 2014.
-
(2014)
Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs14)
-
-
Ghosh, M.1
Richardson, M.2
Ford, B.3
Jansen, R.4
-
244
-
-
84989303874
-
From onions to shallots: Rewarding tor relays with tears
-
Jul
-
R. Jansen, A. Miller, P. Syverson, and B. Ford,"From onions to shallots: Rewarding tor relays with tears," in Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs14), Jul. 2014.
-
(2014)
Proc. 7th Workshop Hot Topics Privacy Enhancing Technol. (HotPETs14)
-
-
Jansen, R.1
Miller, A.2
Syverson, P.3
Ford, B.4
|