MoneroResearch.info

List Resources

Displaying 1 - 100 of 111 (Bibliography: WIKINDX Master Bibliography)
Parameters
List all
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341.  
Added by: Rucknium 5/5/22, 10:33 PM
Ye, C., Ojukwu, C., Hsu, A., & Hu, R. 2020. Alt-coin traceability. [Cryptology ePrint Archive, Report 2020/593].  
Added by: Rucknium 2/23/22, 4:10 PM
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Last edited by: Rucknium 5/5/22, 8:31 PM
Vijayakumaran, S. 2021. Analysis of cryptonote transaction graphs using the dulmage-mendelsohn decomposition. [Cryptology ePrint Archive, Report 2021/760].  
Last edited by: Rucknium 2/24/22, 9:35 PM
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).  
Last edited by: Rucknium 2/25/22, 6:01 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yuen, T. H. 2018, Anonymity reduction attacks to monero. Paper presented at Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers.  
Added by: Rucknium 2/23/22, 4:44 PM
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).  
Added by: endor 4/17/22, 7:40 PM
Hoenisch, P., & Pino, L. S. D. (2021). Atomic swaps between bitcoin and monero. CoRR, abs/2101.12332,  
Last edited by: Rucknium 2/24/22, 6:54 PM
Sui, Z., Liu, J. K., Yu, J., Au, M. H., & Liu, J. 2022. Auxchannel: Enabling efficient bi-directional channel for scriptless blockchains. [Cryptology ePrint Archive, Report 2022/117].  
Added by: Rucknium 2/23/22, 11:28 PM
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13.  
Added by: Rucknium 9/10/22, 7:57 PM
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).  
Last edited by: endor 4/19/22, 11:11 PM
Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system. Unpublished manuscript.  
Last edited by: theadmin 2/23/22, 12:13 AM
Taylor, M. B. 2013, Bitcoin and the age of bespoke silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.  
Added by: endor 4/17/22, 8:23 PM
Garay, J., Kiayias, A., & Leonardos, N. 2015, The bitcoin backbone protocol: Analysis and applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.  
Added by: endor 4/17/22, 9:02 PM
O'Dwyer, K. J., & Malone, D. 2014, June Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).  
Added by: endor 4/17/22, 8:19 PM
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach. Energy Research & Social Science, 70, 101721.  
Added by: endor 4/17/22, 7:32 PM
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of bitcoin, monero, zcash, ethereum, ripple, and iota. WIREs Data Mining and Knowledge Discovery, 12(1), e1436.  
Added by: Rucknium 2/23/22, 10:27 PM
Mondschein, C. F. (2020). Browser-based crypto mining and eu data protection and privacy law: A critical assessment and possible opportunities for the monetisation of web services. The Journal of The British Blockchain Association,  
Last edited by: Rucknium 5/3/22, 12:53 PM
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].  
Last edited by: Rucknium 5/5/22, 2:03 PM
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).  
Added by: Jack 4/1/22, 6:41 PM
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6 A centrality analysis of the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 8:36 PM
Goodell, B., Noether, S., & Blue, A. (2019). Concise linkable ring signatures and forgery against adversarial keys.  
Added by: Jack 4/1/22, 6:41 PM
Borggren, N., & Yao, L. (2020). Correlations of multi-input monero transactions. arXiv preprint arXiv:2001.04827,  
Last edited by: Rucknium 4/20/22, 3:36 PM
Aranha, D. F., Hall-Anderson, M., Nitulescu, A., Pagnin, E., & Yakoubov, S. 2021. Count me in! : Extendability for threshold ring signatures. [Cryptology ePrint Archive, Report 2021/1240]  
Last edited by: Plowsof 3/9/22, 5:28 PM
Macheta, J., Noether, S., Noether, S., & Smooth, J. (2014). Counterfeiting via merkle tree exploits within virtual currencies employing the cryptonote protocol. Unpublished manuscript.  
Last edited by: Rucknium 2/22/22, 5:58 PM
Rueckert, C. (2019). Cryptocurrencies and fundamental rights. Journal of Cybersecurity, 5(1).  
Added by: Rucknium 5/3/22, 12:49 PM
Möser, M. (2022). Cryptocurrency privacy in practice. Unpublished Ph.D. Dissertation, Princeton University.  
Added by: Rucknium 2/23/22, 3:42 PM
van Saberhagen, N. (2013). Cryptonote v 2.0. Unpublished manuscript.  
Last edited by: Rucknium 2/22/22, 5:20 PM
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2(2), 1–35.  
Added by: Jack 4/1/22, 6:41 PM
Noether, S. (2018). Discrete logarithm equality across groups. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:55 PM
Fantazzini, D., & Kolodin, N. (2020). Does the hashrate affect the bitcoin price?. Journal of Risk and Financial Management, 13(11).  
Added by: endor 4/17/22, 9:15 PM
Noether, S., & Goodell, B. (2018). Dual linkable ring signatures. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:48 PM
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript.  
Added by: Rucknium 7/1/22, 4:19 PM
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 10:38 PM
Noether, S., & Goodell, B. (2017). An efficient implementation of monero subaddresses. Unpublished manuscript.  
Last edited by: Rucknium 2/24/22, 3:22 PM
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163.  
Added by: Rucknium 2/23/22, 4:14 PM
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies. Energy, 168, 160–168.  
Added by: endor 4/17/22, 7:30 PM
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary equilibrium analysis for decision on block size in blockchain systems. Paper presented at Combinatorial Optimization and Applications.  
Added by: endor 4/17/22, 10:41 PM
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 7/1/22, 4:03 PM
Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley.  
Last edited by: Rucknium 7/1/22, 6:05 PM
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891.  
Added by: Rucknium 9/10/22, 7:55 PM
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies. Security & Future, 6(1).  
Last edited by: Rucknium 9/10/22, 8:04 PM
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of ring sampling. Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288.  
Added by: Rucknium 2/23/22, 4:13 PM
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK.  
Last edited by: Rucknium 3/9/22, 9:31 PM
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques.  
Last edited by: Jack 8/8/22, 2:40 AM
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 8:31 PM
Bonneau, J. 2019, Hostile blockchain takeovers (short paper). Paper presented at Financial Cryptography and Data Security.  
Last edited by: endor 4/17/22, 10:47 PM
Li, W., Lin, Z., & Chen, Q. (2022). A hybrid design of linkable ring signature scheme with stealth addresses. Security and Communication Networks, 2022,  
Added by: Rucknium 2/24/22, 3:44 PM
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The impact of block parameters on the throughput and security of blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.  
Added by: endor 4/17/22, 9:05 PM
Mackenzie, A., Noether, S., & Monero Core Team. (2015). Improving obfuscation in the cryptonote protocol. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:33 PM
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.  
Last edited by: Rucknium 5/5/22, 10:24 PM
Park, S., & Sealfon, A. 2019. It wasn't me! repudiability and unclaimability of ring signatures. [Cryptology ePrint Archive, Paper 2019/135].  
Last edited by: endor 8/2/22, 1:38 PM
Jivanyan, A., & Feickert, A. 2021. Lelantus spark: Secure and flexible private transactions. [Cryptology ePrint Archive, Report 2021/1173].  
Last edited by: Rucknium 2/24/22, 10:47 PM
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing.  
Added by: Rucknium 5/5/22, 10:29 PM
Broniatowski, M. (2021). Minimum divergence estimators, maximum likelihood and the generalized bootstrap. Entropy, 23(2), 185.  
Last edited by: Rucknium 3/12/22, 4:40 AM
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1).  
Last edited by: endor 4/17/22, 7:51 PM
Noether, S., & Noether, S. (2014). Monero is not that mysterious. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:29 PM
Liyanage, S. G. H. (2018). Monerosci: linkability and traceability analysis of monero blockchain. Unpublished Undergraduate thesis , University of Colombo.  
Added by: Rucknium 2/24/22, 9:29 PM
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). Monet: A fast payment channel network for scriptless cryptocurrency monero. Cryptology ePrint Archive,  
Added by: Jack 6/23/22, 4:11 AM
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies, 88(6), 3011–3040.  
Last edited by: endor 4/19/22, 11:07 PM
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). Mprove+: Privacy enhancing proof of reserves protocol for monero. IEEE Transactions on Information Forensics and Security, 16, 3900–3915.  
Last edited by: Rucknium 2/24/22, 7:18 PM
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). Mrcc: A practical covert channel over monero with provable security. IEEE Access, 9, 31816–31825.  
Last edited by: Rucknium 8/6/22, 9:24 PM
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). Msccs: A monero-based security-enhanced covert communication system. Computer Networks, 205, 108759.  
Added by: Rucknium 2/23/22, 10:46 PM
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New empirical traceability analysis of cryptonote-style blockchains. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 7/2/22, 9:18 PM
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.  
Added by: Rucknium 2/23/22, 10:08 PM
Noether, S., Noether, S., & Mackenzie, A. (2014). A note on chain reactions in traceability in cryptonote 2.0. Unpublished manuscript.  
Last edited by: Rucknium 2/22/22, 5:19 PM
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On defeating graph analysis of anonymous transactions. Proceedings on Privacy Enhancing Technologies, 2022(3).  
Last edited by: Rucknium 7/5/22, 5:03 PM
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the instability of bitcoin without the block reward.  
Added by: endor 4/17/22, 11:28 PM
Quesnelle, J. 2017. On the linkability of zcash transactions. arXiv.  
Last edited by: Rucknium 8/25/22, 12:25 AM
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the security and performance of proof of work blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.  
Last edited by: endor 4/17/22, 7:53 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yu, J. 2019, On the unforkability of monero. Paper presented at Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.  
Added by: Rucknium 2/25/22, 6:37 PM
Thyagarajan, S. A., Malavolta, G., Schmidt, F., & Schröder, D. Paymo: Payment channels for monero. [Cryptology ePrint Archive, Report 2020/1441].  
Last edited by: coinstudent2048 3/5/22, 6:04 PM
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670].  
Last edited by: Rucknium 7/1/22, 4:11 PM
Goorha, P. Principles of natural resource economics for bitcoin. The Journal of The British Blockchain Association, 4(August).  
Last edited by: endor 4/14/22, 8:14 PM
Sarier, N. D. (2022). Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervasive and Mobile Computing, 86, 101683.  
Added by: Rucknium 9/10/22, 7:55 PM
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-work cryptocurrency mining: A statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).  
Added by: endor 4/3/22, 6:53 PM
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June Re-thinking untraceability in the cryptonote-style blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).  
Added by: Rucknium 7/1/22, 3:50 PM
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size. Computer Standards & Interfaces, 80, 103562.  
Added by: Rucknium 2/24/22, 6:04 PM
Noether, S., Mackenzie, A., & Monero Core Team. (2016). Ring confidential transactions. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:36 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2019, Risk of asynchronous protocol update: Attacks to monero protocols. Paper presented at Information Security and Privacy.  
Added by: Rucknium 2/25/22, 6:31 PM
Aslam, S., Tošić, A., & Mrissa, M. (2021). Secure and privacy-aware blockchain design: Requirements, challenges and solutions. Journal of Cybersecurity and Privacy, 1(1), 164–194.  
Added by: Rucknium 2/23/22, 3:58 PM
Kawaguchi, K., & Noda, S. (2021). Security-cost efficiency of competing proof-of-work cryptocurrencies. Unpublished manuscript.  
Added by: Rucknium 2/23/22, 9:55 PM
Noether, S. (2018). Sets of spent outputs. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:45 PM
Hinteregger, A., & Haslhofer, B. 2019, Short paper: An empirical analysis of monero cross-chain traceability. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 9/10/22, 8:11 PM
Borggren, N., Kim, H.-Y., Yao, L., & Koplik, G. (2020). Simulated blockchains for machine learning traceability and transaction values in the monero network. arXiv preprint arXiv:2001.03937,  
Last edited by: Jack 4/1/22, 6:46 PM
Aumayr, L., Thyagarajan, S. A., Malavolta, G., Monero-Sánchez, P., & Maffei, M. 2021. Sleepy channels: Bitcoin-compatible bi-directional payment channels without watchtowers. [Cryptology ePrint Archive, Report 2021/1445].  
Last edited by: Rucknium 4/20/22, 3:56 PM
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.  
Added by: Rucknium 5/5/22, 9:04 PM
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 2022(3).  
Last edited by: Rucknium 7/5/22, 5:01 PM
Herrera Sufán, R. (2021). Speeding up monero’s balance computation. Unpublished M.S. Thesis, Pontificia Universidad Católica de Chile.  
Added by: Rucknium 2/24/22, 10:40 PM
Rahalkar, C., & Virgaonkar, A. 2021. Summarizing and analyzing the privacy-preserving techniques in bitcoin and other cryptocurrencies.  
Last edited by: Rucknium 2/24/22, 10:15 PM
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in monero. Journal of Computer Applications, 42(1).  
Added by: Rucknium 2/23/22, 5:01 PM
Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A survey on group signatures and ring signatures: Traceability vs. anonymity. Cryptography, 6(1).  
Added by: Rucknium 2/26/22, 10:36 PM
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security.  
Added by: Rucknium 9/10/22, 8:13 PM
Vranken, H. (2017). Sustainability of bitcoin and blockchains. Current Opinion in Environmental Sustainability, 28, 1–9.  
Added by: endor 4/17/22, 7:32 PM
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A systematic approach to cryptocurrency fees. Paper presented at Financial Cryptography and Data Security.  
Added by: endor 4/17/22, 10:41 PM
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining. Solar Energy, 232, 409–420.  
Added by: endor 4/17/22, 7:34 PM
Tevador. Tevador/randomx: Proof of work algorithm based on random code execution.  
Added by: Jack 4/1/22, 6:41 PM
Renwick, R., & Gleasure, R. (2021). Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems. Journal of Information Technology, 36(1), 16–38.  
Added by: Rucknium 3/9/22, 7:45 PM
Goodell, B., & Noether, S. (2018). Thring signatures and their applications to spender-ambiguous digital currencies. Unpublished manuscript.  
Added by: Rucknium 2/22/22, 5:51 PM
Xu, M., Zhang, Y., & Zhong, S. 2022. Towards fair multiparty computation in scriptless distributed ledger systems. [Cryptology ePrint Archive, Report 2022/176].  
Last edited by: Rucknium 5/5/22, 10:11 PM
1 - 100  |  101 - 111
WIKINDX 6.5.0 | Total resources: 111 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)