-
5
-
-
85080611225
-
-
The Tor Project. https://www.torproject.org
-
The Tor Project. https://www.torproject.org/.
-
-
-
-
6
-
-
85080627334
-
Chain fork post-mortem
-
March
-
ANDRESEN, G. March 2013 Chain Fork Post-Mortem. BIP 50.
-
(2013)
BIP
, vol.50
-
-
Andresen, G.1
-
7
-
-
84945225920
-
Theoretical bitcoin attacks with less than half of the computational power (draft)
-
Tech. Rep. abs/1312.7013
-
BAHACK, L. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). Tech. Rep. abs/1312.7013, CoRR, 2013.
-
(2013)
CoRR
-
-
Bahack, L.1
-
8
-
-
84893229508
-
Have a snack, pay with bitcoins
-
BAMERT, T., DECKER, C., ELSEN, L., WATTENHOFER, R., AND WELTEN, S. Have a snack, pay with Bitcoins. In IEEE P2P (2013).
-
(2013)
IEEE P2P
-
-
Bamert, T.1
Decker, C.2
Elsen, L.3
Wattenhofer, R.4
Welten, S.5
-
9
-
-
84905400056
-
ZeroCash: Decentralized anonymous payments from bitcoin
-
BEN-SASSON, E., CHIESA, A., GARMAN, C., GREEN, M., MIERS, I., TROMER, E., AND VIRZA, M. Zerocash: Decentralized anonymous payments from Bitcoin. In IEEE S&P (2014).
-
(2014)
IEEE S&P
-
-
Ben-Sasson, E.1
Chiesa, A.2
Garman, C.3
Green, M.4
Miers, I.5
Tromer, E.6
Virza, M.7
-
11
-
-
84945225930
-
Research perspectives and challenges for bitcoin and cryptocurrencies (extended version)
-
Report
-
BONNEAU, J., MILLER, A., CLARK, J., NARAYANAN, A., KROLL, J. A., AND FELTEN, E. W. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (Extended Version). Cryptology ePrint Archive, Report 2015/452, 2015.
-
(2015)
Cryptology ePrint Archive
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.A.5
Felten, E.W.6
-
12
-
-
84928119221
-
Mixcoin: Anonymity for bitcoin with accountable mixes
-
BONNEAU, J., NARAYANAN, A., MILLER, A., CLARK, J., KROLL, J. A., AND FELTEN, E. W. Mixcoin: Anonymity for Bitcoin with accountable mixes. In FC (2014).
-
(2014)
FC
-
-
Bonneau, J.1
Narayanan, A.2
Miller, A.3
Clark, J.4
Kroll, J.A.5
Felten, E.W.6
-
14
-
-
85119225770
-
Analyzing the effectiveness of dos attacks on tor
-
CONRAD, B., AND SHIRAZI, F. Analyzing the effectiveness of dos attacks on tor. In SIN (2014), pp. 355:355–355:358.
-
(2014)
SIN
, pp. 355355-355358
-
-
Conrad, B.1
Shirazi, F.2
-
15
-
-
84893243047
-
Information propagation in the bitcoin network
-
DECKER, C., AND WATTENHOFER, R. Information propagation in the bitcoin network. In IEEE P2P (2013).
-
(2013)
IEEE P2P
-
-
Decker, C.1
Wattenhofer, R.2
-
16
-
-
85084161591
-
Portable multithreading: The signal stack trick for user-space thread creation
-
ENGELSCHALL, R. S. Portable multithreading: The signal stack trick for user-space thread creation. In USENIX ATC (2000).
-
(2000)
USENIX ATC
-
-
Engelschall, R.S.1
-
17
-
-
85035148867
-
The miner’s dilemma
-
EYAL, I. The Miner’s Dilemma. In IEEE S&P (2015).
-
(2015)
IEEE S&P
-
-
Eyal, I.1
-
18
-
-
84945212793
-
Majority is not enough: Bitcoin mining is vulnerable
-
EYAL, I., AND SIRER, E. G. Majority is not enough: Bitcoin mining is vulnerable. In FC (2014).
-
(2014)
FC
-
-
Eyal, I.1
Sirer, E.G.2
-
19
-
-
84922420033
-
How low can you go: Balancing performance with anonymity in tor
-
GEDDES, J., JANSEN, R., AND HOPPER, N. How low can you go: Balancing performance with anonymity in Tor. In PETS (2013).
-
(2013)
PETS
-
-
Geddes, J.1
Jansen, R.2
Hopper, N.3
-
20
-
-
85080584965
-
-
March
-
HEARN, M. Testnet in a box. https://bitcointalk.org/index.php?topic=4483.0, March 2011.
-
(2011)
Testnet in A Box
-
-
Hearn, M.1
-
21
-
-
84978406507
-
-
HEILMAN, E., KENDLER, A., ZOHAR, A., AND GOLDBERG, S. Eclipse attacks on bitcoins peer-to-peer network.
-
Eclipse Attacks on Bitcoins Peer-to-Peer Network
-
-
Heilman, E.1
Kendler, A.2
Zohar, A.3
Goldberg, S.4
-
22
-
-
85084163714
-
Methodically modeling the tor network
-
JANSEN, R., BAUER, K., HOPPER, N., AND DINGLEDINE, R. Methodically modeling the Tor network. In CSET (2012).
-
(2012)
CSET
-
-
Jansen, R.1
Bauer, K.2
Hopper, N.3
Dingledine, R.4
-
23
-
-
84970886453
-
Never been kist: Tor’s congestion management blossoms with kernel-informed socket transport
-
JANSEN, R., GEDDES, J., WACEK, C., SHERR, M., AND SYVERSON, P. Never been KIST: Tor’s congestion management blossoms with kernel-informed socket transport. In USENIX Security (2014).
-
(2014)
USENIX Security
-
-
Jansen, R.1
Geddes, J.2
Wacek, C.3
Sherr, M.4
Syverson, P.5
-
24
-
-
85180760932
-
Shadow: Running tor in a box for accurate and efficient experimentation
-
JANSEN, R., AND HOPPER, N. Shadow: Running Tor in a box for accurate and efficient experimentation. In NDSS (2012).
-
(2012)
NDSS
-
-
Jansen, R.1
Hopper, N.2
-
25
-
-
84883308148
-
Lira: Lightweight incentivized routing for anonymity
-
JANSEN, R., JOHNSON, A., AND SYVERSON, P. LIRA: Lightweight incentivized routing for anonymity. In NDSS (2013).
-
(2013)
NDSS
-
-
Jansen, R.1
Johnson, A.2
Syverson, P.3
-
27
-
-
85180623308
-
The sniper attack: Anonymously deanonymizing and disabling the tor network
-
JANSEN, R., TSCHORSCH, F., JOHNSON, A., AND SCHEUERMANN, B. The Sniper Attack: Anonymously deanonymizing and disabling the Tor network. In NDSS (2014).
-
(2014)
NDSS
-
-
Jansen, R.1
Tschorsch, F.2
Johnson, A.3
Scheuermann, B.4
-
28
-
-
85080613711
-
Tor IMux: Managing connections from two to infinity, and beyond
-
JOHN GEDDES, R. J., AND HOPPER, N. Tor IMUX: Managing connections from two to infinity, and beyond. In WPES (2014).
-
(2014)
WPES
-
-
John Geddes, R.J.1
Hopper, N.2
-
29
-
-
84889028646
-
Users get routed: Traffic correlation on tor by realistic adversaries
-
JOHNSON, A., WACEK, C., JANSEN, R., SHERR, M., AND SYVERSON, P. Users get routed: Traffic correlation on tor by realistic adversaries. In ACM CCS (2013).
-
(2013)
ACM CCS
-
-
Johnson, A.1
Wacek, C.2
Jansen, R.3
Sherr, M.4
Syverson, P.5
-
32
-
-
84890039053
-
A fistful of bitcoins: Characterizing payments among men with no names
-
MEIKLEJOHN, S., POMAROLE, M., JORDAN, G., LEVCHENKO, K., MCCOY, D., VOELKER, G. M., AND SAVAGE, S. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. In IMC (2013).
-
(2013)
IMC
-
-
Meiklejohn, S.1
Pomarole, M.2
Jordan, G.3
Levchenko, K.4
McCoy, D.5
Voelker, G.M.6
Savage, S.7
-
33
-
-
84954128379
-
-
May
-
MILLER, A., LITTON, J., PACHULSKI, A., GUPTA, N., LEVIN, D., SPRING, N., AND BHATTACHARJEE, B. Discovering bitcoin’s public topology and influential nodes, May 2015.
-
(2015)
Discovering Bitcoin’s Public Topology and Influential Nodes
-
-
Miller, A.1
Litton, J.2
Pachulski, A.3
Gupta, N.4
Levin, D.5
Spring, N.6
Bhattacharjee, B.7
|