-
4
-
-
84881223453
-
Bitcoin: A peer-to-peer electronic cash system
-
Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Consulted. 2008;1(2012):28.
-
(2008)
Consulted
, vol.1
, Issue.2012
, pp. 28
-
-
Nakamoto, S.1
-
5
-
-
84895544988
-
Do the rich get richer? An empirical analysis of the Bitcoin transaction network
-
24505257
-
Kondor D, Posfai M, Csabai I, Vattay G. Do the rich get richer? An empirical analysis of the Bitcoin transaction network. PloS one. 2014;9(2):e86197. doi: 10.1371/journal.pone.0086197 PMID: 24505257
-
(2014)
PloS One
, vol.9
, Issue.2
, pp. e86197
-
-
Kondor, D.1
Posfai, M.2
Csabai, I.3
Vattay, G.4
-
6
-
-
84926638993
-
Research and challenges on bitcoin anonymity
-
Garcia-Alfaro J, Herrera-Joancomart J, Lupu E, Posegga J, Aldini A, Martinelli F, et al., editors, Springer International Publishing
-
Herrera-Joancomart J. Research and Challenges on Bitcoin Anonymity. In: Garcia-Alfaro J, Herrera-Joancomart J, Lupu E, Posegga J, Aldini A, Martinelli F, et al., editors. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. vol. 8872 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 3-16. Available from: http://dx.doi.org/10.1007/978-3-319-17016-9-1.
-
(2015)
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Vol. 8872 of Lecture Notes in Computer Science
, pp. 3-16
-
-
Herrera-Joancomart, J.1
-
7
-
-
85067587353
-
-
Accessed: 24/3/2016
-
Bitcoincharts; 2016. Accessed: 24/3/2016. https://bitcoincharts.com.
-
(2016)
-
-
Bitcoincharts1
-
8
-
-
12344277323
-
-
John Wiley & Sons, Inc.
-
Housley R. In: Public Key Infrastructure (PKI). John Wiley & Sons, Inc.; 2004. Available from: http://dx.doi.org/10.1002/047148296X.tie149.
-
(2004)
Public Key Infrastructure (PKI)
-
-
Housley, R.1
-
9
-
-
85067587471
-
-
Accessed: 24/3/2016
-
Double-spending; 2016. Accessed: 24/3/2016. https://en. bitcoin. it/wiki/Double-spending.
-
(2016)
-
-
Double-Spending1
-
10
-
-
85067587856
-
-
Accessed: 24/3/2016
-
Bitcoinwiki; 2015. Accessed: 24/3/2016. https://en. bitcoin. it.
-
(2015)
-
-
Bitcoinwiki1
-
12
-
-
85067587395
-
-
Accessed: 24/3/2016
-
Proof-of-Stake; 2016. Accessed: 24/3/2016. https://en. bitcoin. it/wiki/Proof of Stake.
-
(2016)
-
-
Proof-of-Stake1
-
13
-
-
85088075417
-
Systematic mapping studies in software engineering
-
Swinton, UK, UK: British Computer Society
-
Petersen K, Feldt R, Mujtaba S, Mattsson M. Systematic Mapping Studies in Software Engineering. In: Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering. EASE'08. Swinton, UK, UK: British Computer Society; 2008. p. 68-77. Available from: http://dl.acm.org/citation. cfm?id=2227115.2227123.
-
(2008)
Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering. EASE'08
, pp. 68-77
-
-
Petersen, K.1
Feldt, R.2
Mujtaba, S.3
Mattsson, M.4
-
14
-
-
44649189162
-
Empirical studies of agile software development: A systematic review
-
Dybå T, Dingsøyr T. Empirical studies of agile software development: A systematic review. Information and Software Technology. 2008;50(910):833-859. http://dx.doi.org/10.1016/j.infsof.2008.01.006.
-
(2008)
Information and Software Technology
, vol.50
, Issue.910
, pp. 833-859
-
-
Dybå, T.1
Dingsøyr, T.2
-
16
-
-
84918531199
-
Towards a more democratic mining in bitcoins
-
Prakash A, Shyamasundar R, editors, Springer International Publishing
-
Paul G, Sarkar P, Mukherjee S. Towards a More Democratic Mining in Bitcoins. In: Prakash A, Shyamasundar R, editors. Information Systems Security. vol. 8880 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 185-203. Available from: http://dx.doi.org/10.1007/978-3-319-13841-1 11.
-
(2014)
Information Systems Security. Vol. 8880 of Lecture Notes in Computer Science
, pp. 185-203
-
-
Paul, G.1
Sarkar, P.2
Mukherjee, S.3
-
17
-
-
84951869859
-
Two-factor authentication for the bitcoin protocol
-
Foresti S, editor, Springer International Publishing
-
Mann C, Loebenberger D. Two-Factor Authentication for the Bitcoin Protocol. In: Foresti S, editor. Security and Trust Management. vol. 9331 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 155-171. Available from: http://dx.doi.org/10.1007/978-3-319-24858-5-10.
-
(2015)
Security and Trust Management. Vol. 9331 of Lecture Notes in Computer Science
, pp. 155-171
-
-
Mann, C.1
Loebenberger, D.2
-
18
-
-
84921357331
-
BlueWallet: The secure bitcoin wallet
-
Mauw S, Jensen C, editors, Springer International Publishing; 2014
-
Bamert T, Decker C, Wattenhofer R, Welten S. BlueWallet: The Secure Bitcoin Wallet. In: Mauw S, Jensen C, editors. Security and Trust Management. vol. 8743 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 65-80. Available from: http://dx.doi.org/10.1007/978-3-319-11851-2 5.
-
Security and Trust Management. Vol. 8743 of Lecture Notes in Computer Science
, pp. 65-80
-
-
Bamert, T.1
Decker, C.2
Wattenhofer, R.3
Welten, S.4
-
19
-
-
84903641613
-
Certified bitcoins
-
Boureanu I, Owesarski P, Vaudenay S, editors, Springer International Publishing
-
Ateniese G, Faonio A, Magri B, de Medeiros B. Certified Bitcoins. In: Boureanu I, Owesarski P, Vaudenay S, editors. Applied Cryptography and Network Security. vol. 8479 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 80-96. Available from: http://dx.doi.org/10.1007/978-3-319-07536-5-6.
-
(2014)
Applied Cryptography and Network Security. Vol. 8479 of Lecture Notes in Computer Science
, pp. 80-96
-
-
Ateniese, G.1
Faonio, A.2
Magri, B.3
De Medeiros, B.4
-
20
-
-
84947081178
-
Trend of centralization in Bitcoin's distributed network
-
Beikverdi A, Song J. Trend of centralization in Bitcoin's distributed network. In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International Conference on; 2015. p. 1-6.
-
(2015)
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International Conference on
, pp. 1-6
-
-
Beikverdi, A.1
Song, J.2
-
21
-
-
84924408978
-
Exploring miner evolution in bitcoin network
-
Mirkovic J, Liu Y, editors, Springer International Publishing
-
Wang L, Liu Y. Exploring Miner Evolution in Bitcoin Network. In: Mirkovic J, Liu Y, editors. Passive and Active Measurement. vol. 8995 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 290-302. Available from: http://dx.doi.org/10.1007/978-3-319-15509-8-22.
-
(2015)
Passive and Active Measurement. Vol. 8995 of Lecture Notes in Computer Science
, pp. 290-302
-
-
Wang, L.1
Liu, Y.2
-
23
-
-
84916608776
-
BitIodine: Extracting intelligence from the bitcoin network
-
Christin N, Safavi-Naini R, editors, Springer Berlin Heidelberg
-
Spagnuolo M, Maggi F, Zanero S. BitIodine: Extracting Intelligence from the Bitcoin Network. In: Christin N, Safavi-Naini R, editors. Financial Cryptography and Data Security. vol. 8437 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 457-468. Available from: http://dx.doi.org/10.1007/978-3-662-45472-5 29.
-
(2014)
Financial Cryptography and Data Security. Vol. 8437 of Lecture Notes in Computer Science
, pp. 457-468
-
-
Spagnuolo, M.1
Maggi, F.2
Zanero, S.3
-
24
-
-
84950268080
-
Blindcoin: Blinded, accountable mixes for bitcoin
-
Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
-
Valenta L, Rowan B. Blindcoin: Blinded, Accountable Mixes for Bitcoin. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 112-126. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9-9.
-
(2015)
Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science
, pp. 112-126
-
-
Valenta, L.1
Rowan, B.2
-
25
-
-
84910643373
-
Challenges and opportunities associated with a bitcoin-based transaction rating system
-
Bhme R, Brenner M, Moore T, Smith M, editors, Springer Berlin Heidelberg
-
Vandervort D. Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System. In: Bhme R, Brenner M, Moore T, Smith M, editors. Financial Cryptography and Data Security. vol. 8438 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 33-42. Available from: http://dx.doi.org/10.1007/978-3-662-44774-1-3.
-
(2014)
Financial Cryptography and Data Security. Vol. 8438 of Lecture Notes in Computer Science
, pp. 33-42
-
-
Vandervort, D.1
-
26
-
-
84916608100
-
Elliptic curve cryptography in practice
-
Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
-
Bos JW, Halderman JA, Heninger N, Moore J, Naehrig M, Wustrow E. Elliptic Curve Cryptography in Practice. In: Financial Cryptography and Data Security-18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers; 2014. p. 157-175. Available from: http://dx.doi.org/10.1007/978-3-662-45472-5 11.
-
(2014)
Financial Cryptography and Data Security-18th International Conference, FC 2014
, pp. 157-175
-
-
Bos, J.W.1
Halderman, J.A.2
Heninger, N.3
Moore, J.4
Naehrig, M.5
Wustrow, E.6
-
27
-
-
84910624054
-
Empirical analysis of denial-of-service attacks in the bitcoin ecosystem
-
Bhme R, Brenner M, Moore T, Smith M, editors
-
Vasek M, Thornton M, Moore T. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem. In: Bhme R, Brenner M, Moore T, Smith M, editors. Financial Cryptography and Data Security. vol. 8438 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 57-71. Available from: http://dx.doi.org/10.1007/978-3-662-44774-1-5.
-
(2014)
Financial Cryptography and Data Security. Vol. 8438 of Lecture Notes in Computer Science. Springer Berlin Heidelberg
, pp. 57-71
-
-
Vasek, M.1
Thornton, M.2
Moore, T.3
-
28
-
-
84910627417
-
Increasing anonymity in bitcoin
-
Bhme R, Brenner M, Moore T, Smith M, editors, Springer Berlin Heidelberg
-
Saxena A, Misra J, Dhar A. Increasing Anonymity in Bitcoin. In: Bhme R, Brenner M, Moore T, Smith M, editors. Financial Cryptography and Data Security. vol. 8438 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 122-139. Available from: http://dx.doi.org/10.1007/978-3-662-44774-1 9.
-
(2014)
Financial Cryptography and Data Security. Vol. 8438 of Lecture Notes in Computer Science
, pp. 122-139
-
-
Saxena, A.1
Misra, J.2
Dhar, A.3
-
29
-
-
84950235652
-
Issues in designing a bitcoin-like community currency
-
Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
-
Vandervort D, Gaucas D, Jacques R. Issues in Designing a Bitcoin-like Community Currency. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 78-91. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9 6.
-
(2015)
Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science
, pp. 78-91
-
-
Vandervort, D.1
Gaucas, D.2
Jacques, R.3
-
30
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Christin N, Safavi-Naini R, editors, Springer Berlin Heidelberg
-
Eyal I, Sirer E. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In: Christin N, Safavi-Naini R, editors. Financial Cryptography and Data Security. vol. 8437 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 436-454. Available from: http://dx.doi.org/10.1007/978-3-662-45472-5-28.
-
(2014)
Financial Cryptography and Data Security. Vol. 8437 of Lecture Notes in Computer Science
, pp. 436-454
-
-
Eyal, I.1
Sirer, E.2
-
31
-
-
84950236811
-
On the malleability of bitcoin transactions
-
Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
-
Andrychowicz M, Dziembowski S, Malinowski D, Mazurek. On the Malleability of Bitcoin Transactions. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 1-18. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9 1.
-
(2015)
Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science
, pp. 1-18
-
-
Andrychowicz, M.1
Dziembowski, S.2
Malinowski, D.3
Mazurek4
-
32
-
-
84950265272
-
Privacy-enhancing overlays in bitcoin
-
Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
-
Meiklejohn S, Orlandi C. Privacy-Enhancing Overlays in Bitcoin. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 127-141. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9-10.
-
(2015)
Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science
, pp. 127-141
-
-
Meiklejohn, S.1
Orlandi, C.2
-
33
-
-
84949988990
-
Theres no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams
-
Bhme R, Okamoto T, editors, Springer Berlin Heidelberg
-
Vasek M, Moore T. Theres No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In: Bhme R, Okamoto T, editors. Financial Cryptography and Data Security. vol. 8975 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 44-61. Available from: http://dx.doi.org/10.1007/978-3-662-47854-7 4.
-
(2015)
Financial Cryptography and Data Security. Vol. 8975 of Lecture Notes in Computer Science
, pp. 44-61
-
-
Vasek, M.1
Moore, T.2
-
34
-
-
84950253378
-
ZombieCoin: Powering next-generation botnets with bitcoin
-
Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
-
Ali S, McCorry P, Lee PJ, Hao F. ZombieCoin: Powering Next-Generation Botnets with Bitcoin. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 34-48. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9-3.
-
(2015)
Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science
, pp. 34-48
-
-
Ali, S.1
McCorry, P.2
Lee, P.J.3
Hao, F.4
-
35
-
-
84916608777
-
An analysis of anonymity in bitcoin using P2P network traffic
-
Christin N, Safavi-Naini R, editors, Springer Berlin Heidelberg
-
Koshy P, Koshy D, McDaniel P. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In: Christin N, Safavi-Naini R, editors. Financial Cryptography and Data Security. vol. 8437 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 469-485. Available from: http://dx. doi.org/10.1007/978-3-662-45472-5-30.
-
(2014)
Financial Cryptography and Data Security. Vol. 8437 of Lecture Notes in Computer Science
, pp. 469-485
-
-
Koshy, P.1
Koshy, D.2
McDaniel, P.3
-
36
-
-
84906519189
-
Bitcoin transaction malleability and MtGox
-
Kutyowski M, Vaidya J, editors, Springer International Publishing
-
Decker C, Wattenhofer R. Bitcoin Transaction Malleability and MtGox. In: Kutyowski M, Vaidya J, editors. Computer Security-ESORICS 2014. vol. 8713 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 313-326. Available from: http://dx.doi.org/10.1007/978-3-319-11212-1 18.
-
(2014)
Computer Security-ESORICS 2014. Vol. 8713 of Lecture Notes in Computer Science
, pp. 313-326
-
-
Decker, C.1
Wattenhofer, R.2
-
37
-
-
84906500300
-
CoinShuffle: Practical decentralized coin mixing for bitcoin
-
Kutyowski M, Vaidya J, editors, Springer International Publishing
-
Ruffing T, Moreno-Sanchez P, Kate A. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. In: Kutyowski M, Vaidya J, editors. Computer Security-ESORICS 2014. vol. 8713 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 345-364. Available from: http://dx.doi.org/10.1007/978-3-319-11212-1-20.
-
(2014)
Computer Security-ESORICS 2014. Vol. 8713 of Lecture Notes in Computer Science
, pp. 345-364
-
-
Ruffing, T.1
Moreno-Sanchez, P.2
Kate, A.3
-
38
-
-
84951747319
-
Making bitcoin exchanges transparent
-
Pernul G, Y A Ryan P, Weippl E, editors, Springer International Publishing
-
Decker C, Guthrie J, Seidel J, Wattenhofer R. Making Bitcoin Exchanges Transparent. In: Pernul G, Y A Ryan P, Weippl E, editors. Computer Security-ESORICS 2015. vol. 9327 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 561-576. Available from: http://dx.doi.org/10.1007/978-3-319-24177-7 28.
-
(2015)
Computer Security-ESORICS 2015. Vol. 9327 of Lecture Notes in Computer Science
, pp. 561-576
-
-
Decker, C.1
Guthrie, J.2
Seidel, J.3
Wattenhofer, R.4
-
39
-
-
84942589265
-
The bitcoin backbone protocol: Analysis and applications
-
Oswald E, Fischlin M, editors, Springer Berlin Heidelberg
-
Garay J, Kiayias A, Leonardos N. The Bitcoin Backbone Protocol: Analysis and Applications. In: Oswald E, Fischlin M, editors. Advances in Cryptology-EUROCRYPT2015. vol. 9057 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 281-310. Available from: http://dx. doi.org/10.1007/978-3-662-46803-6-10.
-
(2015)
Advances in Cryptology-EUROCRYPT2015. Vol. 9057 of Lecture Notes in Computer Science
, pp. 281-310
-
-
Garay, J.1
Kiayias, A.2
Leonardos, N.3
-
40
-
-
84943402614
-
PoW-based distributed cryptography with no trusted setup
-
Gennaro R, Robshaw M, editors, Springer Berlin Heidelberg
-
Andrychowicz M, Dziembowski S. PoW-Based Distributed Cryptography with No Trusted Setup. In: Gennaro R, Robshaw M, editors. Advances in Cryptology-CRYPTO 2015. vol. 9216 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 379-399. Available from: http://dx.doi.org/10.1007/978-3-662-48000-7-19.
-
(2015)
Advances in Cryptology-CRYPTO 2015. Vol. 9216 of Lecture Notes in Computer Science
, pp. 379-399
-
-
Andrychowicz, M.1
Dziembowski, S.2
-
41
-
-
84904168248
-
Hiding transaction amounts and balances in bitcoin
-
Holz T, Ioannidis S, editors, Springer International Publishing
-
Androulaki E, Karame G. Hiding Transaction Amounts and Balances in Bitcoin. In: Holz T, Ioannidis S, editors. Trust and Trustworthy Computing. vol. 8564 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 161-178. Available from: http://dx.doi.org/10.1007/978-3-319-08593-7 11.
-
(2014)
Trust and Trustworthy Computing. Vol. 8564 of Lecture Notes in Computer Science
, pp. 161-178
-
-
Androulaki, E.1
Karame, G.2
-
42
-
-
84944618002
-
Ripple: Overview and outlook
-
Conti M, Schunter M, Askoxylakis I, editors, Springer International Publishing
-
Armknecht F, Karame G, Mandal A, Youssef F, Zenner E. Ripple: Overview and Outlook. In: Conti M, Schunter M, Askoxylakis I, editors. Trust and Trustworthy Computing. vol. 9229 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 163-180. Available from: http://dx.doi.org/10.1007/978-3-319-22846-4-10.
-
(2015)
Trust and Trustworthy Computing. Vol. 9229 of Lecture Notes in Computer Science
, pp. 163-180
-
-
Armknecht, F.1
Karame, G.2
Mandal, A.3
Youssef, F.4
Zenner, E.5
-
43
-
-
84952360555
-
Electronic contract signing without using trusted third party
-
Qiu M, Xu S, Yung M, Zhang H, editors, Springer International Publishing
-
Wan Z, Deng R, Lee D. Electronic Contract Signing Without Using Trusted Third Party. In: Qiu M, Xu S, Yung M, Zhang H, editors. Network and System Security. vol. 9408 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 386-394. Available from: http://dx.doi.org/10. 1007/978-3-319-25645-0 27.
-
(2015)
Network and System Security. Vol. 9408 of Lecture Notes in Computer Science
, pp. 386-394
-
-
Wan, Z.1
Deng, R.2
Lee, D.3
-
44
-
-
84952324703
-
From pretty good to great: Enhancing PGP using bitcoin and the blockchain
-
Qiu M, Xu S, Yung M, Zhang H, editors, Springer International Publishing
-
Wilson D, Ateniese G. From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. In: Qiu M, Xu S, Yung M, Zhang H, editors. Network and System Security. vol. 9408 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 368-375. Available from: http://dx. doi.org/10.1007/978-3-319-25645-0 25.
-
(2015)
Network and System Security. Vol. 9408 of Lecture Notes in Computer Science
, pp. 368-375
-
-
Wilson, D.1
Ateniese, G.2
-
45
-
-
84943628481
-
Validation of decentralised smart contracts through game theory and formal methods
-
Bodei C, Ferrari GL, Priami C, editors, Springer International Publishing
-
Bigi G, Bracciali A, Meacci G, Tuosto E. Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods. In: Bodei C, Ferrari GL, Priami C, editors. Programming Languages with Applications to Biology and Security. vol. 9465 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 142-161. Available from: http://dx.doi.org/10.1007/978-3-319-25527-9-11.
-
(2015)
Programming Languages with Applications to Biology and Security. Vol. 9465 of Lecture Notes in Computer Science
, pp. 142-161
-
-
Bigi, G.1
Bracciali, A.2
Meacci, G.3
Tuosto, E.4
-
46
-
-
84954102636
-
Demystifying incentives in the consensus computer
-
New York, NY, USA: ACM
-
Luu L, Teutsch J, Kulkarni R, Saxena P. Demystifying Incentives in the Consensus Computer. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security. CCS'15. New York, NY, USA: ACM; 2015. p. 706-719. Available from: http://doi.acm.org/10.1145/2810103.2813659.
-
(2015)
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security. CCS'15
, pp. 706-719
-
-
Luu, L.1
Teutsch, J.2
Kulkarni, R.3
Saxena, P.4
-
47
-
-
84928153811
-
CoinParty: Secure multi-party mixing of bitcoins
-
New York, NY, USA: ACM
-
Ziegeldorf, JH, Grossmann, F, Henze, M, Inden, N, Wehrle, K. CoinParty: Secure Multi-Party Mixing of Bitcoins. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. CODASPY'15. New York, NY, USA: ACM; 2015. p. 75-86. Available from: http://doi.acm.org/10.1145/2699026.2699100.
-
(2015)
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. CODASPY'15
, pp. 75-86
-
-
Ziegeldorf, J.H.1
Grossmann, F.2
Henze, M.3
Inden, N.4
Wehrle, K.5
-
48
-
-
84904876136
-
The analysis and countermeasures on security breach of bitcoin
-
Murgante B, Misra S, Rocha AC, Torre C, Rocha J, Falco M, et al., editors, Springer International Publishing
-
Lim IK, Kim YH, Lee JG, Lee JP, Nam-Gung H, Lee JK. The Analysis and Countermeasures on Security Breach of Bitcoin. In: Murgante B, Misra S, Rocha AC, Torre C, Rocha J, Falco M, et al., editors. Computational Science and Its Applications ICCSA 2014. vol. 8582 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 720-732. Available from: http://dx.doi.org/10.1007/978-3-319-09147-1 52.
-
(2014)
Computational Science and its Applications ICCSA 2014. Vol. 8582 of Lecture Notes in Computer Science
, pp. 720-732
-
-
Lim, I.K.1
Kim, Y.H.2
Lee, J.G.3
Lee, J.P.4
Nam-Gung, H.5
Lee, J.K.6
-
49
-
-
84900790682
-
An inquiry into money laundering tools in the Bitcoin ecosystem
-
Moser M, Bohme R, Breuker D. An inquiry into money laundering tools in the Bitcoin ecosystem. In: eCrime Researchers Summit (eCRS), 2013;2013. p. 1-14.
-
(2013)
ECrime Researchers Summit (eCRS)
, vol.2013
, pp. 1-14
-
-
Moser, M.1
Bohme, R.2
Breuker, D.3
-
50
-
-
84962707017
-
The blockchain-based digital content distribution system
-
Kishigami J, Fujimura S, Watanabe H, Nakadaira A, Akutsu A. The Blockchain-Based Digital Content Distribution System. In: Big Data and Cloud Computing (BDCloud), 2015 IEEE Fifth International Conference on; 2015. p. 187-190.
-
(2015)
Big Data and Cloud Computing (BDCloud), 2015 IEEE Fifth International Conference on
, pp. 187-190
-
-
Kishigami, J.1
Fujimura, S.2
Watanabe, H.3
Nakadaira, A.4
Akutsu, A.5
-
51
-
-
84962106697
-
Bitconeview: Visualization of flows in the bitcoin transaction graph
-
Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R. Bitconeview: visualization of flows in the bitcoin transaction graph. In: Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on; 2015. p. 1-8.
-
(2015)
Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on
, pp. 1-8
-
-
Di Battista, G.1
Di Donato, V.2
Patrignani, M.3
Pizzonia, M.4
Roselli, V.5
Tamassia, R.6
-
53
-
-
84902673916
-
Analyzing the Deployment of Bitcoin's {P2P} Network under an AS-level Perspective
-
Feld S, Schnfeld M, Werner M. Analyzing the Deployment of Bitcoin's {P2P} Network under an AS-level Perspective. Procedia Computer Science. 2014;32:1121-1126. http://dx.doi.org/10.1016/j. procs.2014.05.542.
-
(2014)
Procedia Computer Science
, vol.32
, pp. 1121-1126
-
-
Feld, S.1
Schnfeld, M.2
Werner, M.3
-
54
-
-
84928712295
-
Goldstrike 1: CoinTerra's first-generation cryptocurrency mining processor for bitcoin
-
Barkatullah J, Hanke T. Goldstrike 1: CoinTerra's First-Generation Cryptocurrency Mining Processor for Bitcoin. Micro, IEEE. 2015;35(2):68-76. doi: 10.1109/MM.2015.13
-
(2015)
Micro, IEEE
, vol.35
, Issue.2
, pp. 68-76
-
-
Barkatullah, J.1
Hanke, T.2
-
55
-
-
85057957993
-
Energy-efficient adaptive resource management for real-time vehicular cloud services
-
Shojafar M, Cordeschi N, Baccarelli E. Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services. IEEE Transactions on Cloud Computing. 7(1),2016,pp:196-209
-
(2016)
IEEE Transactions on Cloud Computing
, vol.7
, Issue.1
, pp. 196-209
-
-
Shojafar, M.1
Cordeschi, N.2
Baccarelli, E.3
-
56
-
-
84964260924
-
Cloud-centric multi-level authentication as a service for secure public safety device networks
-
Butun I, Erol-Kantarci M, Kantarci B, Song H. Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communications Magazine. 2016;54(4):47-53. doi: 10. 1109/MCOM.2016.7452265
-
(2016)
IEEE Communications Magazine
, vol.54
, Issue.4
, pp. 47-53
-
-
Butun, I.1
Erol-Kantarci, M.2
Kantarci, B.3
Song, H.4
-
57
-
-
84922968556
-
Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees
-
Cordeschi N, Amendola D, Shojafar M, Baccarelli E. Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees. Vehicular Communications. 2015;2(1):1–12.
-
(2015)
Vehicular Communications
, vol.2
, Issue.1
, pp. 1-12
-
-
Cordeschi, N.1
Amendola, D.2
Shojafar, M.3
Baccarelli, E.4
-
58
-
-
79957507487
-
Usability evaluation methods for the web: A systematic mapping study
-
Fernandez A, Insfran E, Abraho S. Usability evaluation methods for the web: A systematic mapping study. Information and Software Technology. 2011;53(8):789-817. http://dx.doi.org/10.1016/j.infsof. 2011.02.007.
-
(2011)
Information and Software Technology
, vol.53
, Issue.8
, pp. 789-817
-
-
Fernandez, A.1
Insfran, E.2
Abraho, S.3
|