MoneroResearch.info

List Resources

Displaying 1 - 100 of 206 (Bibliography: WIKINDX Master Bibliography)
Parameters
List all
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634].  
Added by: Rucknium 2022-12-02 16:10
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May Springproofs: Efficient inner product arguments for vectors of arbitrary length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP).  
Added by: Rucknium 2024-01-06 16:50
Zhang, T. (2023). Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of dash, monero, verge, zcash, and grin. IEEE Transactions on Sustainable Computing, 8(4), 574–582.  
Added by: Rucknium 2024-01-06 17:50
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146.  
Added by: Rucknium 2024-01-05 19:23
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341.  
Added by: Rucknium 2022-05-05 22:33
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6 A centrality analysis of the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 20:36
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability. Computer Standards & Interfaces, 87, 103770.  
Added by: Rucknium 2024-01-06 17:26
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June Re-thinking untraceability in the cryptonote-style blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).  
Added by: Rucknium 2022-07-01 15:50
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New empirical traceability analysis of cryptonote-style blockchains. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-07-02 21:18
Yu, G. (2020). Blockchain stealth address schemes. Cryptology ePrint Archive,  
Last edited by: Jack 2023-06-06 21:04
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.  
Added by: Rucknium 2022-12-02 16:31
Ye, C., Ojukwu, C., Hsu, A., & Hu, R. 2020. Alt-coin traceability. [Cryptology ePrint Archive, Report 2020/593].  
Added by: Rucknium 2022-02-23 16:10
Xu, M., Zhang, Y., & Zhong, S. 2022. Towards fair multiparty computation in scriptless distributed ledger systems. [Cryptology ePrint Archive, Report 2022/176].  
Last edited by: Rucknium 2022-05-05 22:11
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2021, Transparency or anonymity leak: Monero mining pools data publication. Paper presented at Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings.  
Last edited by: Rucknium 2022-02-24 19:54
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2019, Risk of asynchronous protocol update: Attacks to monero protocols. Paper presented at Information Security and Privacy.  
Added by: Rucknium 2022-02-25 18:31
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yu, J. 2019, On the unforkability of monero. Paper presented at Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.  
Added by: Rucknium 2022-02-25 18:37
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE).  
Added by: Jack 2023-01-20 18:34
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yuen, T. H. 2018, Anonymity reduction attacks to monero. Paper presented at Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers.  
Added by: Rucknium 2022-02-23 16:44
Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. 2023. A transaction-level model for blockchain privacy. [Cryptology ePrint Archive, Paper 2023/1902].  
Added by: Rucknium 2024-01-06 17:04
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg.  
Last edited by: Jack 2023-03-06 22:29
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security.  
Added by: Rucknium 2022-09-10 20:13
Wang, X., Lin, L., & Wang, Y. (2023). Stealth address schemes with fast retrievability based on subgroup membership assumptions related to factoring. The Computer Journal, bxad056.  
Last edited by: Jack 2023-06-07 12:27
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13.  
Added by: Rucknium 2022-09-10 19:57
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1.  
Added by: Rucknium 2024-01-06 16:59
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272,  
Last edited by: Jack 2023-07-29 03:09
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach. Energy Research & Social Science, 70, 101721.  
Added by: endor 2022-04-17 19:32
Vranken, H. (2017). Sustainability of bitcoin and blockchains. Current Opinion in Environmental Sustainability, 28, 1–9.  
Added by: endor 2022-04-17 19:32
Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).  
Last edited by: Rucknium 2024-01-10 16:22
Usa v. lichtenstein et al.February 7 2022. US Dept. of Justice.  
Last edited by: Jack 2023-01-20 03:41
Tram`er, F., Boneh, D., & Paterson, K. 2020, Remote Side-Channel attacks on anonymous transactions. Paper presented at 29th USENIX security symposium (USENIX security 20).  
Last edited by: Jack 2023-01-20 18:29
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).  
Added by: Rucknium 2024-01-06 17:53
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable timed linkable ring signatures for scalable payments for monero. Paper presented at Computer Security -- ESORICS 2022.  
Added by: Rucknium 2022-12-02 15:59
Thyagarajan, S. A., Malavolta, G., & Moreno-Sánchez, P. 2021. Universal atomic swaps: Secure exchange of coins across all blockchains. [Cryptology ePrint Archive, Report 2021/1612].  
Added by: Rucknium 2022-02-24 17:35
Thyagarajan, S. A., Malavolta, G., Schmidt, F., & Schröder, D. Paymo: Payment channels for monero. [Cryptology ePrint Archive, Report 2020/1441].  
Last edited by: coinstudent2048 2022-03-05 18:04
Tevador. Tevador/randomx: Proof of work algorithm based on random code execution.  
Added by: Jack 2022-04-01 18:41
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications.  
Added by: Rucknium 2022-12-02 16:03
Taylor, M. B. 2013, Bitcoin and the age of bespoke silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.  
Added by: endor 2022-04-17 20:23
Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst. 4(2).  
Last edited by: Rucknium 2022-10-22 20:37
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies. Security & Future, 6(1).  
Last edited by: Rucknium 2022-09-10 20:04
Taneska, M., & Halimi, F. 2022, Anonymous blockchain based model for e-voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022.  
Last edited by: Jack 2023-02-21 04:30
Szalaty, Z. E. (2023). Privacy preserving blockchains and quantum safety. Unpublished Master's Thesis , Universitat Oberta de Catalunya.  
Last edited by: Rucknium 2024-01-05 22:01
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-money laundering regulation of privacy enabling cryptocurrencies.  
Last edited by: Jack 2023-01-08 16:44
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). Monet: A fast payment channel network for scriptless cryptocurrency monero. Cryptology ePrint Archive,  
Added by: Jack 2022-06-23 04:11
Sui, Z., Liu, J. K., Yu, J., Au, M. H., & Liu, J. 2022. Auxchannel: Enabling efficient bi-directional channel for scriptless blockchains. [Cryptology ePrint Archive, Report 2022/117].  
Added by: Rucknium 2022-02-23 23:28
Su, W., & Ma, L. 2023, April A blockchain-based covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).  
Added by: Rucknium 2024-01-05 19:13
Sharma, P. K., Gosain, D., & Diaz, C. 2022. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies. arXiv.  
Added by: Rucknium 2022-12-13 19:00
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 22:38
Seguias, B. E. K. 2018. Monero’s building blocks part 9 of 10--ringct and anatomy of monero transactions.  
Last edited by: Jack 2023-01-18 00:44
Seguias, B. E. K. 2018. Monero’s building blocks part 8 of 10--introduction to pedersen commitments and confidential transactions.  
Last edited by: Jack 2023-01-18 00:43
Seguias, B. E. K. 2018. Monero’s building blocks part 7 of 10--multilayered linkable spontaneous anonymous group (mlsag) signature scheme.  
Last edited by: Jack 2023-01-18 00:43
Seguias, B. E. K. 2018. Monero’s building blocks part 6 of 10--linkable spontaneous anonymous group (lsag) signature scheme.  
Last edited by: Jack 2023-01-18 00:42
Seguias, B. E. K. 2018. Monero’s building blocks part 5 of 10--cryptonote’s linkable ring signature scheme.  
Last edited by: Jack 2023-01-18 00:41
Seguias, B. E. K. 2018. Monero’s building blocks part 4 of 10--herranz & saez generic ring signature scheme [1].  
Last edited by: Jack 2023-01-18 00:40
Seguias, B. E. K. 2018. Monero’s building blocks part 3 of 10--introduction to ring signatures.  
Last edited by: Jack 2023-01-18 00:40
Seguias, B. E. K. 2018. Monero’s building blocks part 2 of 10--pointcheval & stern’s generic signature scheme.  
Last edited by: Jack 2023-01-18 00:39
Seguias, B. E. K. 2018. Monero’s building blocks part 10 of 10--stealth addresses.  
Last edited by: Jack 2023-01-18 00:44
Seguias, B. E. K. 2018. Monero’s building blocks part 1 of 10--prerequisites.  
Last edited by: Jack 2023-01-18 00:38
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening pandora's box: An analysis of the usage of the data field in blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA).  
Last edited by: Rucknium 2024-01-10 16:59
Scala, E., & Mostarda, L. 2023, Range proofs with constant size and trustless setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.  
Last edited by: Jack 2023-03-29 18:12
Sarier, N. D. (2022). Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervasive and Mobile Computing, 86, 101683.  
Added by: Rucknium 2022-09-10 19:55
van Saberhagen, N. (2013). Cryptonote v 2.0. Unpublished manuscript.  
Last edited by: Rucknium 2022-02-22 17:20
Rueckert, C. (2019). Cryptocurrencies and fundamental rights. Journal of Cybersecurity, 5(1).  
Added by: Rucknium 2022-05-03 12:49
Rucknium, R. Fully specified estimation plan for optimal static parametric estimation of arbitrary distributions (ospead) public version. Monero Research Lab.  
Last edited by: Jack 2023-01-20 04:31
Rosenfeld, M. 2014. Analysis of hashrate-based double spending.  
Last edited by: Rucknium 2023-08-23 16:48
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of ring sampling. Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288.  
Added by: Rucknium 2022-02-23 16:13
Rinberg, R., & Agarwal, N. 2022. Privacy when everyone is watching: An sok on anonymity on the blockchain. [Cryptology ePrint Archive, Paper 2022/985].  
Added by: Rucknium 2022-10-22 17:21
Renwick, R., & Gleasure, R. (2021). Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems. Journal of Information Technology, 36(1), 16–38.  
Added by: Rucknium 2022-03-09 19:45
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security model for privacy-preserving blockchain-based cryptocurrency systems. Paper presented at Network and System Security.  
Added by: Rucknium 2024-01-06 17:22
Rahalkar, C., & Virgaonkar, A. 2021. Summarizing and analyzing the privacy-preserving techniques in bitcoin and other cryptocurrencies.  
Last edited by: Rucknium 2022-02-24 22:15
Quesnelle, J. 2017. On the linkability of zcash transactions. arXiv.  
Last edited by: Rucknium 2022-08-25 00:25
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical analysis of silent mining operation in the monero system. Studies in Informatics and Control, 30(4), 99–108.  
Last edited by: Jack 2023-01-20 18:21
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post quantum fuzzy stealth signatures and applications. Cryptology ePrint Archive,  
Last edited by: Jack 2023-07-29 02:59
Pitu, F., & Gaitan, N. C. 2023, July Survey of security, performance, and profitability of monero: A browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).  
Added by: Rucknium 2024-01-06 17:58
Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A survey on group signatures and ring signatures: Traceability vs. anonymity. Cryptography, 6(1).  
Added by: Rucknium 2022-02-26 22:36
Park, S., & Sealfon, A. 2019. It wasn't me! repudiability and unclaimability of ring signatures. [Cryptology ePrint Archive, Paper 2019/135].  
Last edited by: endor 2022-08-02 13:38
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).  
Last edited by: Rucknium 2024-03-16 13:00
Open letter to fincen’s proposed amendment of the bsa.October 24 2020. FinCEN.  
Last edited by: Jack 2023-01-20 03:41
O'Dwyer, K. J., & Malone, D. 2014, June Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).  
Added by: endor 2022-04-17 20:19
Noether, S. Understanding ge fromfe frombytes vartime.  
Last edited by: Jack 2023-03-28 21:26
Noether, S. (2018). Sets of spent outputs. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:45
Noether, S., Mackenzie, A., & Monero Core Team. (2016). Ring confidential transactions. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:36
Noether, S., Noether, S., & Mackenzie, A. (2014). A note on chain reactions in traceability in cryptonote 2.0. Unpublished manuscript.  
Last edited by: Rucknium 2022-02-22 17:19
Noether, S., & Noether, S. (2014). Monero is not that mysterious. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:29
Noether, S., & Goodell, B. (2017). An efficient implementation of monero subaddresses. Unpublished manuscript.  
Last edited by: Rucknium 2022-02-24 15:22
Noether, S., & Goodell, B. (2018). Dual linkable ring signatures. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:48
Noether, S. (2018). Discrete logarithm equality across groups. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:55
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420.  
Added by: endor 2022-04-17 19:34
Ni, W., Cheng, P., Chen, L., & Lin, X. (2021). When the recursive diversity anonymity meets the ring signature. In Proceedings of the 2021 International Conference on Management of Data (pp. 1359–1371). New York, NY, USA: Association for Computing Machinery.  
Added by: Rucknium 2022-02-23 15:57
Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system. Unpublished manuscript.  
Last edited by: theadmin 2022-02-23 00:13
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155,  
Last edited by: Jack 2023-07-29 03:07
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).  
Added by: Rucknium 2024-01-05 19:14
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163.  
Added by: Rucknium 2022-02-23 16:14
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University.  
Added by: Rucknium 2023-01-08 03:54
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security.  
Last edited by: Jack 2023-01-18 00:01
Mondschein, C. F. (2020). Browser-based crypto mining and eu data protection and privacy law: A critical assessment and possible opportunities for the monetisation of web services. The Journal of The British Blockchain Association,  
Last edited by: Rucknium 2022-05-03 12:53
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.  
Added by: Rucknium 2022-02-23 22:08
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich.  
Added by: Rucknium 2022-10-22 19:40
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK.  
Last edited by: Rucknium 2022-03-09 21:31
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).  
Added by: endor 2022-04-17 19:40
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving obfuscation in the cryptonote protocol. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:33
1 - 100  |  101 - 200  |  201 - 206
WIKINDX 6.5.0 | Total resources: 206 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)