Abreu, A. S. (2023). Esquemas de privacidade nas moedas criptográficas Monero e Zcash. Unpublished Bacharelado Thesis, Universidade de São Paulo, São Paulo, Brazil. |
|
Added by: Rucknium 4/5/24, 10:07 PM |
|
ACK-J, A.-J. 2022. LORD OF THE RINGS: AN EMPIRICAL ANALYSIS OF MONERO’S RING SIGNATURE RESILIENCE TO ARTIFICIALLY INTELLIGENT ATTACKS. Multidisciplinary Academic Grants in Cryptocurrencies. |
|
Added by: Jack Last edited by: Jack 1/20/23, 4:16 AM |
|
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High Assurance Specification of the halo2 Protocol. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:03 AM |
|
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The Impact of Block Parameters on the Throughput and Security of Blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology. |
|
Added by: endor 4/17/22, 9:05 PM |
|
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota, WIREs Data Mining and Knowledge Discovery, 12(1), e1436. |
|
Added by: Rucknium 2/23/22, 10:27 PM |
|
Alonso, K. M. (2017). Monero-privacy in the blockchain. Universitat Aut`onoma de Barcelona. |
|
Added by: Jack Last edited by: Jack 3/3/23, 4:55 PM |
|
Alupotha, J., & Boyen, X. 2022. Practical UC-Secure Zero-Knowledge Smart Contracts. [Cryptology ePrint Archive, Paper 2022/670]. |
|
Added by: Rucknium Last edited by: Rucknium 7/1/22, 4:11 PM |
|
Amarasinghe, N. (2022). Systematic Modelling of Anonymity with Application to Cryptocurrencies. Unpublished PhD thesis, Queensland University of Technology. |
|
Added by: Jack Last edited by: Jack 2/21/23, 4:34 AM |
|
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023. |
|
Added by: Rucknium 4/5/24, 9:26 PM |
|
Aranha, D. F., Hall-Anderson, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! Extendability for Threshold Ring Signatures. [Cryptology ePrint Archive, Report 2021/1240] |
|
Added by: Plowsof Last edited by: Plowsof 3/9/22, 5:28 PM |
|
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019). |
|
Added by: endor Last edited by: endor 4/19/22, 11:11 PM |
|
Aslam, S., Tošić, A., & Mrissa, M. (2021). Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions, Journal of Cybersecurity and Privacy, 1(1), 164–194. |
|
Added by: Rucknium 2/23/22, 3:58 PM |
|
Aumayr, L., Thyagarajan, S. A., Malavolta, G., Monero-Sánchez, P., & Maffei, M. 2021. Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers. [Cryptology ePrint Archive, Report 2021/1445]. |
|
Added by: Rucknium Last edited by: Rucknium 4/20/22, 3:56 PM |
|
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6, Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 5/5/22, 8:31 PM |
|
Azad, B. A. 2018. Evaluating the Effectiveness of JavaScript Crypto Miner Blocker Browser Extensions. StonyBrook University. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:59 PM |
|
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s Monero Drive-by Crypto-jacking, IOP Conference Series: Materials Science and Engineering, 769(1), 12065. |
|
Added by: Jack Last edited by: Jack 1/18/23, 12:05 AM |
|
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070]. |
|
Added by: Rucknium Last edited by: Rucknium 1/5/24, 10:08 PM |
|
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications. |
|
Added by: Rucknium 1/6/24, 5:36 PM |
|
Bassa, A. (2024). On the Use of Logarithmic Derivatives in Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 11/27/24, 3:39 PM |
|
Bassa, A. (2024). Soundness Proof for Eagen’s Proof of Sums of Points. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 6:02 PM |
|
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. [i]Do fundamentals drive cryptocurrency prices? |
|
Added by: Jack Last edited by: Jack 1/20/23, 6:00 PM |
|
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6, Analysis and Probing of Parallel Channels in the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium Last edited by: Rucknium 5/5/22, 8:31 PM |
|
Biryukov, A., & Tikhomirov, S. (2019). Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash, Pervasive and Mobile Computing, 59, 101030. |
|
Added by: Jack Last edited by: Jack 1/8/23, 3:27 AM |
|
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 7/29/23, 3:05 AM |
|
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042]. |
|
Added by: Rucknium Last edited by: Rucknium 4/5/24, 9:33 PM |
|
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1). |
|
Added by: Rucknium 8/1/24, 4:22 PM |
|
Bonneau, J. 2019, Hostile Blockchain Takeovers (Short Paper). Paper presented at Financial Cryptography and Data Security. |
|
Added by: endor Last edited by: endor 4/17/22, 10:47 PM |
|
Borggren, N., Kim, H.-Y., Yao, L., & Koplik, G. (2020). Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network, arXiv preprint arXiv:2001.03937. |
|
Added by: Jack Last edited by: Jack 4/1/22, 6:46 PM |
|
Borggren, N., & Yao, L. (2020). Correlations of multi-input Monero transactions, arXiv preprint arXiv:2001.04827. |
|
Added by: Jack Last edited by: Rucknium 4/20/22, 3:36 PM |
|
Broniatowski, M. (2021). Minimum Divergence Estimators, Maximum Likelihood and the Generalized Bootstrap, Entropy, 23(2), 185. |
|
Added by: Rucknium Last edited by: Rucknium 3/12/22, 4:40 AM |
|
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop. |
|
Added by: Rucknium 1/5/24, 8:51 PM |
|
Budish, E. (2022). The Economic Limits of Bitcoin and Anonymous, Decentralized Trust on the Blockchain. Unpublished manuscript. |
|
Added by: Rucknium 7/1/22, 4:19 PM |
|
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Jack Last edited by: Jack 3/29/23, 6:22 PM |
|
Butler, S. 2021, Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums. Paper presented at Socio-Technical Aspects in Security and Trust. |
|
Added by: Rucknium 10/12/22, 4:26 PM |
|
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve Trees: Practical and Transparent Zero-Knowledge Accumulators. [Cryptology ePrint Archive, Paper 2022/756]. |
|
Added by: Rucknium Last edited by: Rucknium 8/9/24, 5:59 PM |
|
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the Monero Peer-to-Peer Network. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 12/13/22, 6:56 PM |
|
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the Instability of Bitcoin Without the Block Reward. |
|
Added by: endor 4/17/22, 11:28 PM |
|
Chator, A., & Green, M. 2018, How to squeeze a crowd: reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops. |
|
Added by: Jack Last edited by: Jack 1/20/23, 6:05 PM |
|
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques. |
|
Added by: Jack Last edited by: Jack 8/8/22, 2:40 AM |
|
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary Equilibrium Analysis for Decision on Block Size in Blockchain Systems. Paper presented at Combinatorial Optimization and Applications. |
|
Added by: endor 4/17/22, 10:41 PM |
|
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A Systematic Approach to Cryptocurrency Fees. Paper presented at Financial Cryptography and Data Security. |
|
Added by: endor 4/17/22, 10:41 PM |
|
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:13 PM |
|
Christensen, S. 2018. A Comparative Study of Privacy-Preserving Cryptocurrencies: Monero and ZCash. University of Birmingham. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:36 PM |
|
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger, IEEE Access, 10, 42067–42082. |
|
Added by: Jack Last edited by: Jack 3/29/23, 6:12 PM |
|
Corradini, F., Mostarda, L., & Scala, E. 2022, ZeroMT: Multi-transfer Protocol for Enabling Privacy in Off-Chain Payments. Paper presented at Advanced Information Networking and Applications. |
|
Added by: Rucknium 5/5/22, 9:43 PM |
|
Cremers, C., Loss, J., & Wagner, B. 2023. A Holistic Security Analysis of Monero Transactions. [Cryptology ePrint Archive, Paper 2023/321]. |
|
Added by: Jack Last edited by: Jack 3/8/23, 6:11 PM |
|
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size, Entropy, 24(3), 334. |
|
Added by: Jack Last edited by: Jack 3/28/23, 9:58 PM |
|
Deuber, D., Ronge, V., & Rueckert, C. (2022). SoK: Assumptions Underlying Cryptocurrency Deanonymizations, Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Added by: Rucknium Last edited by: Rucknium 7/5/22, 5:01 PM |
|
Dijk, A., & Schröder, D. (2023). Proof of concept for a Ethereum Virtual Machine on Cryptonote. Unpublished manuscript. |
|
Added by: Rucknium 1/5/24, 8:32 PM |
|
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15. |
|
Added by: Jack Last edited by: Jack 2/27/24, 1:42 PM |
|
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). MProve+: Privacy Enhancing Proof of Reserves Protocol for Monero, IEEE Transactions on Information Forensics and Security, 16, 3900–3915. |
|
Added by: Rucknium Last edited by: Rucknium 2/24/22, 7:18 PM |
|
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510]. |
|
Added by: Plowsof Last edited by: Rucknium 4/5/24, 10:13 PM |
|
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On Defeating Graph Analysis of Anonymous Transactions, Proceedings on Privacy Enhancing Technologies, 2022(3). |
|
Added by: Rucknium Last edited by: Rucknium 7/5/22, 5:03 PM |
|
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting Monero Prices with a Machine Learning Algorithm, Eski{\c{s}}ehir Osmangazi {\"U}niversitesi {\.I}ktisadi ve {\.I}dari Bilimler Dergisi, 16(3), 651–663. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:38 PM |
|
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, MatRiCT+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP). |
|
Added by: Jack Last edited by: Jack 3/28/23, 8:46 PM |
|
Estensen, H. A. 2018. A Comparison of Monero and Zcash. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:40 PM |
|
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1. |
|
Added by: Jack Last edited by: Jack 6/6/23, 9:02 PM |
|
Fantazzini, D., & Kolodin, N. (2020). Does the Hashrate Affect the Bitcoin Price? Journal of Risk and Financial Management, [i]13(11). |
|
Added by: endor 4/17/22, 9:15 PM |
|
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees, Proc. ACM Meas. Anal. Comput. Syst. 2(2). |
|
Added by: Rucknium 10/22/22, 8:53 PM |
|
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network. |
|
Added by: Rucknium Last edited by: Rucknium 8/1/24, 4:27 PM |
|
Feickert, A. 2024. Bulletproofs++ review. Cypher Stack. [Peer review] |
|
Added by: Rucknium 4/5/24, 10:08 PM |
|
Feickert, A. (2024). FCMP++ review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:54 PM |
|
Feickert, A. (2024). Generalized Bulletproofs. Unpublished manuscript. |
|
Added by: Rucknium Last edited by: Rucknium 8/9/24, 5:41 PM |
|
Feickert, A. (2024). Salvium review. Unpublished manuscript. |
|
Added by: opal Last edited by: opal 8/20/24, 2:33 PM |
|
Feickert, A. (2024). Veridise divisor report review. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 6:07 PM |
|
Feickert, A., & Isthmus. (2024). Monero output lock analysis. Unpublished manuscript. |
|
Added by: Rucknium 9/4/24, 4:56 PM |
|
Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). |
|
Added by: Rucknium Last edited by: Rucknium 2/23/22, 4:23 PM |
|
Fomenko, O., & Sokolov, M. (2024). Bulletproofs++. Construction and Examples. Unpublished manuscript. |
|
Added by: Rucknium 8/9/24, 5:33 PM |
|
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303. |
|
Added by: Rucknium 7/10/24, 4:09 PM |
|
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. |
|
Added by: Rucknium 8/9/24, 7:50 PM |
|
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425. |
|
Added by: Rucknium 8/9/24, 6:32 PM |
|
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6, SnarkPack: Practical SNARK Aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 5/5/22, 9:04 PM |
|
Garay, J., Kiayias, A., & Leonardos, N. 2015, The Bitcoin Backbone Protocol: Analysis and Applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015. |
|
Added by: endor 4/17/22, 9:02 PM |
|
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the Security and Performance of Proof of Work Blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. |
|
Added by: endor Last edited by: endor 4/17/22, 7:53 PM |
|
Ghesmati, S., Fdhila, W., & Weippl, E. 2022. User-Perceived Privacy in Blockchain. [Cryptology ePrint Archive, Report 2022/287]. |
|
Added by: endor 4/17/22, 8:59 PM |
|
Gibson, A. From Zero (Knowledge) to Bulletproofs. |
|
Added by: Jack Last edited by: Jack 3/3/23, 4:18 PM |
|
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive. |
|
Added by: Jack Last edited by: Jack 3/6/23, 10:32 PM |
|
Gomzin, S. (2022). How Monero Works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress. |
|
Added by: Rucknium 10/22/22, 4:48 PM |
|
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6, Towards Overcoming the Undercutting Problem. Unpublished paper presented at Financial Cryptography and Data Security 2022. |
|
Added by: Rucknium 5/5/22, 9:01 PM |
|
Goodell, B. (2024). History and state of Monero security analysis. Unpublished manuscript. |
|
Added by: opal 8/20/24, 2:44 PM |
|
Goodell, B., & Noether, S. (2018). Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies. Unpublished manuscript. |
|
Added by: Rucknium 2/22/22, 5:51 PM |
|
Goodell, B., Noether, S., & Blue, A. (2019). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys, Cryptology ePrint Archive, Paper 2019/654. |
|
Added by: Jack Last edited by: Jack 1/20/23, 5:53 PM |
|
Goorha, P. Principles of Natural Resource Economics for Bitcoin, The Journal of The British Blockchain Association, 4(August). |
|
Added by: endor Last edited by: endor 4/14/22, 8:14 PM |
|
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables. |
|
Added by: Rucknium Last edited by: Rucknium 9/13/24, 1:39 PM |
|
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053. |
|
Added by: Rucknium Last edited by: Rucknium 8/23/23, 4:52 PM |
|
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746. |
|
Added by: Rucknium Last edited by: Rucknium 9/14/24, 2:08 PM |
|
Grunspan, C., & Perez-Marco, R. 2022. Ping-Pong Swaps. arXiv. |
|
Added by: Rucknium 12/2/22, 4:36 PM |
|
Gugger, J. 2020. Bitcoin-Monero Cross-chain Atomic Swap. [Cryptology ePrint Archive, Paper 2020/1126]. |
|
Added by: Jack Last edited by: Jack 1/20/23, 6:09 PM |
|
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). MRCC: A Practical Covert Channel Over Monero With Provable Security, IEEE Access, 9, 31816–31825. |
|
Added by: Rucknium Last edited by: Rucknium 8/6/22, 9:24 PM |
|
Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. |
|
Added by: opal 9/25/24, 9:35 PM |
|
Herrera Sufán, R. (2021). Speeding up Monero’s balance computation. Unpublished M.S. Thesis, Pontificia Universidad Católica de Chile. |
|
Added by: Rucknium 2/24/22, 10:40 PM |
|
Hinteregger, A., & Haslhofer, B. 2019, Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. Paper presented at Financial Cryptography and Data Security. |
|
Added by: Rucknium 9/10/22, 8:11 PM |
|
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. [Cryptology ePrint Archive, Paper 2022/1650]. |
|
Added by: Rucknium Last edited by: Rucknium 12/13/22, 7:02 PM |
|
Hoenisch, P., & Pino, L. S. D. (2021). Atomic Swaps between Bitcoin and Monero, CoRR, abs/2101.12332. |
|
Added by: Rucknium Last edited by: Rucknium 2/24/22, 6:54 PM |
|
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium. |
|
Added by: Rucknium 10/22/22, 8:50 PM |
|
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13. |
|
Added by: Rucknium 1/5/24, 7:16 PM |
|
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System, The Review of Economic Studies, 88(6), 3011–3040. |
|
Added by: endor Last edited by: endor 4/19/22, 11:07 PM |
|
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business. |
|
Added by: Rucknium 10/22/22, 5:17 PM |
|
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171. |
|
Added by: Jack Last edited by: Jack 9/19/24, 10:59 PM |
|
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1. |
|
Added by: Rucknium Last edited by: Rucknium 5/23/24, 6:01 PM |
|