Javascript is disabled or not supported in your browser. JavaScript must be enabled in order for you to use WIKINDX fully. Enable JavaScript through your browser options then
try again
, otherwise, try using a different browser.
MoneroResearch.info
Wikindx
Home
Preferences
Statistics...
Totals
Keywords
Publication years
All creators
Main creators
Publishers
Collections
User Logon
About Wikindx
Resources
Random Resource
Last List View
Export list...
RTF
DOCX
BibTeX
HTML
EndNote
RIS
Search
Quick Search
Advanced Search
Category Tree
Quick List All...
Creator asc.
Title asc.
Publisher asc.
Year desc.
Timestamp desc.
Maturity desc.
Browse...
Types
Creators
Cited
Years
Keywords
Collections...
ALL
Book
Journal
Manuscript
Proceedings
Publishers...
ALL
Book
Conference
Institution
Legal
Categories
Subcategories
Languages
Zoom...
Titles
Creators
Years
Metadata
Random...
Quote
Keywords...
Quotes
List Resources
Displaying 1 - 6 of 6
Parameters
Order by
First Creator
Title
Publisher
Publication Year
Timestamp: added
Timestamp: edited
Maturity Index
Ascending
Descending
Display options
Hint
IGNORE
With no attachments
With at least one attachment
Display only attachments
Tar and compress attachments
With at least one external URL
With DOI
Peer reviewed
Add to basket
Export to COinS
Use all checked:
Use all displayed:
Use all in list:
Duan, J., Wang, W., Wang, L., Gu, L., & Zhu, L. (2025). CRCT: Compact Ring Confidential Transactions Based on Sum Arguments.
IEEE Transactions on Information Forensics and Security
.
Added by: Jack Last edited by: Jack 03/11/2025, 19:46
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). MProve+: Privacy Enhancing Proof of Reserves Protocol for Monero.
IEEE Transactions on Information Forensics and Security
,
16
, 3900–3915.
Added by: Rucknium Last edited by: Rucknium 24/02/2022, 19:18
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks.
IEEE Transactions on Information Forensics and Security
,
19
, 8155–8171.
Added by: Jack Last edited by: Jack 19/09/2024, 22:59
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement.
IEEE Transactions on Information Forensics and Security
, 1–1.
Added by: Rucknium Last edited by: Rucknium 23/05/2024, 18:01
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks.
IEEE Transactions on Information Forensics and Security
, 1–1.
Added by: Rucknium 06/01/2024, 16:59
Yang, X., Xu, L., & Zhu, L. (2025). De-anonymizing Monero: A Maximum Weighted Matching-Based Approach.
IEEE Transactions on Information Forensics and Security
.
Added by: Jack Last edited by: Jack 15/04/2025, 14:25