MoneroResearch.info

List Resources

Displaying 1 - 100 of 205 (Bibliography: WIKINDX Master Bibliography)
Parameters
List all
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July “act natural!”: Exchanging private messages on public blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).  
Added by: Rucknium 2024-01-06 17:53
Christensen, S. 2018. a comparative study of privacy-preserving cryptocurrencies: monero and zcash. University of Birmingham.  
Last edited by: Jack 2023-01-20 17:36
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341.  
Added by: Rucknium 2022-05-05 22:33
Jin, R. (2023). The advance of ring confidential transactions. Highlights in Science, Engineering and Technology, 39, 1104–1110.  
Last edited by: Rucknium 2024-01-05 19:46
Ye, C., Ojukwu, C., Hsu, A., & Hu, R. 2020. Alt-coin traceability. [Cryptology ePrint Archive, Report 2020/593].  
Added by: Rucknium 2022-02-23 16:10
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Last edited by: Rucknium 2022-05-05 20:31
Vijayakumaran, S. 2023, Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).  
Last edited by: Rucknium 2024-01-10 16:22
Rosenfeld, M. 2014. Analysis of hashrate-based double spending.  
Last edited by: Rucknium 2023-08-23 16:48
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).  
Last edited by: Rucknium 2022-02-25 18:01
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yuen, T. H. 2018, Anonymity reduction attacks to monero. Paper presented at Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers.  
Added by: Rucknium 2022-02-23 16:44
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-enhancing multi-hop locks for monero-enabled payment channel networks. IEEE Transactions on Information Forensics and Security, 1–1.  
Added by: Rucknium 2024-01-06 16:59
Taneska, M., & Halimi, F. 2022, Anonymous blockchain based model for e-voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022.  
Last edited by: Jack 2023-02-21 04:30
Syracuse, D., Boehm, J., & Lundgren, N. (2022). Anti-money laundering regulation of privacy enabling cryptocurrencies.  
Last edited by: Jack 2023-01-08 16:44
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).  
Added by: endor 2022-04-17 19:40
Hoenisch, P., & Pino, L. S. D. (2021). Atomic swaps between bitcoin and monero. CoRR, abs/2101.12332,  
Last edited by: Rucknium 2022-02-24 18:54
Sui, Z., Liu, J. K., Yu, J., Au, M. H., & Liu, J. 2022. Auxchannel: Enabling efficient bi-directional channel for scriptless blockchains. [Cryptology ePrint Archive, Report 2022/117].  
Added by: Rucknium 2022-02-23 23:28
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). Basesap: Modular stealth address protocol for programmable blockchains. arXiv preprint arXiv:2306.14272,  
Last edited by: Jack 2023-07-29 03:09
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13.  
Added by: Rucknium 2022-09-10 19:57
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).  
Last edited by: endor 2022-04-19 23:11
Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system. Unpublished manuscript.  
Last edited by: theadmin 2022-02-23 00:13
Taylor, M. B. 2013, Bitcoin and the age of bespoke silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.  
Added by: endor 2022-04-17 20:23
Garay, J., Kiayias, A., & Leonardos, N. 2015, The bitcoin backbone protocol: Analysis and applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.  
Added by: endor 2022-04-17 21:02
O'Dwyer, K. J., & Malone, D. 2014, June Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).  
Added by: endor 2022-04-17 20:19
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach. Energy Research & Social Science, 70, 101721.  
Added by: endor 2022-04-17 19:32
Gugger, J. 2020. Bitcoin-monero cross-chain atomic swap. [Cryptology ePrint Archive, Paper 2020/1126].  
Last edited by: Jack 2023-01-20 18:09
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of bitcoin, monero, zcash, ethereum, ripple, and iota. WIREs Data Mining and Knowledge Discovery, 12(1), e1436.  
Added by: Rucknium 2022-02-23 22:27
Wicht, F.-X., Cachin, C., & Le, D. V. (2023). Blockchain privacy notions using the transaction graph model. , University of Fribourg.  
Last edited by: Jack 2023-03-06 22:29
Yu, G. (2020). Blockchain stealth address schemes. Cryptology ePrint Archive,  
Last edited by: Jack 2023-06-06 21:04
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience.  
Added by: Rucknium 2022-12-02 16:05
Su, W., & Ma, L. 2023, April A blockchain-based covert document communication system model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).  
Added by: Rucknium 2024-01-05 19:13
Mondschein, C. F. (2020). Browser-based crypto mining and eu data protection and privacy law: A critical assessment and possible opportunities for the monetisation of web services. The Journal of The British Blockchain Association,  
Last edited by: Rucknium 2022-05-03 12:53
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].  
Last edited by: Rucknium 2023-07-29 02:57
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).  
Last edited by: Jack 2023-03-29 18:22
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger. IEEE Access, 10, 42067–42082.  
Last edited by: Jack 2023-03-29 18:12
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6 A centrality analysis of the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 20:36
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s monero drive-by crypto-jacking. IOP Conference Series: Materials Science and Engineering, 769(1), 12065.  
Last edited by: Jack 2023-01-18 00:05
Estensen, H. A. 2018. A comparison of monero and zcash.  
Last edited by: Jack 2023-01-20 17:40
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys. Cryptology ePrint Archive, Paper 2019/654,  
Last edited by: Jack 2023-01-20 17:53
Borggren, N., & Yao, L. (2020). Correlations of multi-input monero transactions. arXiv preprint arXiv:2001.04827,  
Last edited by: Rucknium 2022-04-20 15:36
Aranha, D. F., Hall-Anderson, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! : Extendability for threshold ring signatures. [Cryptology ePrint Archive, Report 2021/1240]  
Last edited by: Plowsof 2022-03-09 17:28
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via merkle tree exploits within virtual currencies employing the cryptonote protocol. Unpublished manuscript.  
Last edited by: Rucknium 2022-02-22 17:58
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Computer Communications, 205, 136–146.  
Added by: Rucknium 2024-01-05 19:23
Rueckert, C. (2019). Cryptocurrencies and fundamental rights. Journal of Cybersecurity, 5(1).  
Added by: Rucknium 2022-05-03 12:49
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University.  
Added by: Rucknium 2023-01-08 03:54
van Saberhagen, N. (2013). Cryptonote v 2.0. Unpublished manuscript.  
Last edited by: Rucknium 2022-02-22 17:20
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size. Entropy, 24(3), 334.  
Last edited by: Jack 2023-03-28 21:58
Campanelli, M., Hall-Andersen, M., & Kamp, S. H. 2022. Curve trees: Practical and transparent zero-knowledge accumulators. [Cryptology ePrint Archive, Paper 2022/756].  
Last edited by: Rucknium 2022-12-29 16:41
Butler, S. 2021, Cyber 9/11 will not take place: A user perspective of bitcoin and cryptocurrencies from underground and dark net forums. Paper presented at Socio-Technical Aspects in Security and Trust.  
Added by: Rucknium 2022-10-12 16:26
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2).  
Added by: Rucknium 2022-10-22 20:53
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich.  
Added by: Rucknium 2022-10-22 19:40
Noether, S. (2018). Discrete logarithm equality across groups. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:55
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634].  
Added by: Rucknium 2022-12-02 16:10
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security.  
Last edited by: Jack 2023-01-18 00:01
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. Do fundamentals drive cryptocurrency prices?.  
Last edited by: Jack 2023-01-20 18:00
Fantazzini, D., & Kolodin, N. (2020). Does the hashrate affect the bitcoin price?. Journal of Risk and Financial Management, 13(11).  
Added by: endor 2022-04-17 21:15
Grunspan, C., & Perez-Marco, R. (2018). Double spend races. Int. J. Theor. Appl. Finance, 21(8), 1850053.  
Last edited by: Rucknium 2023-08-23 16:52
Noether, S., & Goodell, B. (2018). Dual linkable ring signatures. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:48
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript.  
Added by: Rucknium 2022-07-01 16:19
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 22:38
Noether, S., & Goodell, B. (2017). An efficient implementation of monero subaddresses. Unpublished manuscript.  
Last edited by: Rucknium 2022-02-24 15:22
Kappos, G. (2022). An empirical analysis of privacy in cryptocurrencies. Unpublished PhD thesis, UCL (University College London).  
Last edited by: Jack 2023-02-21 04:36
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical analysis of silent mining operation in the monero system. Studies in Informatics and Control, 30(4), 99–108.  
Last edited by: Jack 2023-01-20 18:21
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163.  
Added by: Rucknium 2022-02-23 16:14
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.  
Added by: Rucknium 2022-12-02 16:31
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160–168.  
Added by: endor 2022-04-17 19:30
Azad, B. A. 2018. Evaluating the effectiveness of javascript crypto miner blocker browser extensions. StonyBrook University.  
Last edited by: Jack 2023-01-20 17:59
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary equilibrium analysis for decision on block size in blockchain systems. Paper presented at Combinatorial Optimization and Applications.  
Added by: endor 2022-04-17 22:41
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-12-13 18:56
Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley.  
Last edited by: Rucknium 2022-07-01 18:05
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1.  
Last edited by: Jack 2023-06-06 21:02
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-shamir security of fri and related snarks. Cryptology ePrint Archive,  
Last edited by: Jack 2023-07-29 03:05
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-grained accountable privacy via unlinkable policy-compliant signatures. [Cryptology ePrint Archive, Paper 2023/1070].  
Last edited by: Rucknium 2024-01-05 22:08
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting monero prices with a machine learning algorithm. Eskic{s}ehir Osmangazi "Universitesi .Iktisadi ve .Idari Bilimler Dergisi, 16(3), 651–663.  
Last edited by: Jack 2023-01-20 17:38
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891.  
Added by: Rucknium 2022-09-10 19:55
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies. Security & Future, 6(1).  
Last edited by: Rucknium 2022-09-10 20:04
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of ring sampling. Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288.  
Added by: Rucknium 2022-02-23 16:13
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155,  
Last edited by: Jack 2023-07-29 03:07
Gibson, A. From zero (knowledge) to bulletproofs.  
Last edited by: Jack 2023-03-03 16:18
Rucknium, R. Fully specified estimation plan for optimal static parametric estimation of arbitrary distributions (ospead) public version. Monero Research Lab.  
Last edited by: Jack 2023-01-20 04:31
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK.  
Last edited by: Rucknium 2022-03-09 21:31
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques.  
Last edited by: Jack 2022-08-08 02:40
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 2022-05-05 20:31
af halo2 Protokollen, H. G. S., & Spitters, B. 2023. High assurance specification of the halo2 protocol.  
Last edited by: Jack 2023-07-29 03:03
Cremers, C., Loss, J., & Wagner, B. 2023. A holistic security analysis of monero transactions. [Cryptology ePrint Archive, Paper 2023/321].  
Last edited by: Jack 2023-03-08 18:11
Bonneau, J. 2019, Hostile blockchain takeovers (short paper). Paper presented at Financial Cryptography and Data Security.  
Last edited by: endor 2022-04-17 22:47
Gomzin, S. (2022). How monero works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress.  
Added by: Rucknium 2022-10-22 16:48
Chator, A., & Green, M. 2018, How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops.  
Last edited by: Jack 2023-01-20 18:05
Li, W., Lin, Z., & Chen, Q. (2022). A hybrid design of linkable ring signature scheme with stealth addresses. Security and Communication Networks, 2022,  
Added by: Rucknium 2022-02-24 15:44
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The impact of block parameters on the throughput and security of blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.  
Added by: endor 2022-04-17 21:05
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving obfuscation in the cryptonote protocol. Unpublished manuscript.  
Added by: Rucknium 2022-02-22 17:33
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.  
Last edited by: Rucknium 2022-05-05 22:24
Park, S., & Sealfon, A. 2019. It wasn't me! repudiability and unclaimability of ring signatures. [Cryptology ePrint Archive, Paper 2019/135].  
Last edited by: endor 2022-08-02 13:38
Jivanyan, A., & Feickert, A. 2021. Lelantus spark: Secure and flexible private transactions. [Cryptology ePrint Archive, Report 2021/1173].  
Last edited by: Rucknium 2022-02-24 22:47
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650].  
Last edited by: Rucknium 2022-12-13 19:02
ACK-J, A.-J. 2022. Lord of the rings: an empirical analysis of monero’s ring signature resilience to artificially intelligent attacks. Multidisciplinary Academic Grants in Cryptocurrencies.  
Last edited by: Jack 2023-01-20 04:16
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making monero hard-to-trace and more efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).  
Last edited by: Jack 2023-01-20 18:12
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, Matrict+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP).  
Last edited by: Jack 2023-03-28 20:46
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing.  
Added by: Rucknium 2022-05-05 22:29
Broniatowski, M. (2021). Minimum divergence estimators, maximum likelihood and the generalized bootstrap. Entropy, 23(2), 185.  
Last edited by: Rucknium 2022-03-12 04:40
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1).  
Last edited by: endor 2022-04-17 19:51
1 - 100  |  101 - 200  |  201 - 205
WIKINDX 6.5.0 | Total resources: 205 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)