MoneroResearch.info

List Resources

Displaying 1 - 92  of 92 (Bibliography: WIKINDX Master Bibliography)
Parameters
Order by

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Acquisti, A., Dingledine, R., & Syverson, P. 2003, On the Economics of Anonymity. Paper presented at Financial Cryptography.   
Added by: Rucknium 16/04/2025, 13:54
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The Impact of Block Parameters on the Throughput and Security of Blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.   
Added by: endor 17/04/2022, 21:05
Alupotha, J., & Boyen, X. 2022. Practical UC-Secure Zero-Knowledge Smart Contracts. [Cryptology ePrint Archive, Paper 2022/670].   
Added by: Rucknium   Last edited by: Rucknium 01/07/2022, 16:11
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023.   
Added by: Rucknium 05/04/2024, 21:26
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).   
Added by: endor   Last edited by: endor 19/04/2022, 23:11
Aslam, S., Tošić, A., & Mrissa, M. (2021). Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions, Journal of Cybersecurity and Privacy, 1(1), 164–194.   
Added by: Rucknium 23/02/2022, 15:58
Aumayr, L., Thyagarajan, S. A., Malavolta, G., Monero-Sánchez, P., & Maffei, M. 2021. Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers. [Cryptology ePrint Archive, Report 2021/1445].   
Added by: Rucknium   Last edited by: Rucknium 20/04/2022, 15:56
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6, Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 05/05/2022, 20:31
Badertscher, C., Sedaghat, M., & Waldner, H. 2023. Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures. [Cryptology ePrint Archive, Paper 2023/1070].   
Added by: Rucknium   Last edited by: Rucknium 05/01/2024, 22:08
Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. 2025. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense.   
Added by: Rucknium   Last edited by: Rucknium 27/02/2025, 16:26
Bhambhwani, S., Delikouras, S., Korniotis, G. M., & others. 2019. [i]Do fundamentals drive cryptocurrency prices?   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:00
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6, Analysis and Probing of Parallel Channels in the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium   Last edited by: Rucknium 05/05/2022, 20:31
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:05
Bobolz, J., Diaz, J., & Kohlweiss, M. 2024. Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Cryptology ePrint Archive, Paper 2024/042].   
Added by: Rucknium   Last edited by: Rucknium 05/04/2024, 21:33
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1).   
Added by: Rucknium 01/08/2024, 16:22
Bonhomme, S., Jochmans, K., & Robin, J.-M. (2016). Non-parametric estimation of finite mixtures from repeated measurements, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(1), 211–229.   
Added by: Rucknium 22/02/2025, 23:13
Bonneau, J. 2019, Hostile Blockchain Takeovers (Short Paper). Paper presented at Financial Cryptography and Data Security.   
Added by: endor   Last edited by: endor 17/04/2022, 22:47
Broniatowski, M. (2021). Minimum Divergence Estimators, Maximum Likelihood and the Generalized Bootstrap, Entropy, 23(2), 185.   
Added by: Rucknium   Last edited by: Rucknium 12/03/2022, 04:40
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2024, October, K-Anonymous Payments in Pseudonymous Blockchains. Paper presented at 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).   
Added by: Rucknium 16/04/2025, 15:07
Butler, S. 2021, Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums. Paper presented at Socio-Technical Aspects in Security and Trust.   
Added by: Rucknium 12/10/2022, 16:26
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the Instability of Bitcoin Without the Block Reward.   
Added by: endor 17/04/2022, 23:28
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary Equilibrium Analysis for Decision on Block Size in Blockchain Systems. Paper presented at Combinatorial Optimization and Applications.   
Added by: endor 17/04/2022, 22:41
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A Systematic Approach to Cryptocurrency Fees. Paper presented at Financial Cryptography and Data Security.   
Added by: endor 17/04/2022, 22:41
Corradini, F., Mostarda, L., & Scala, E. 2022, ZeroMT: Multi-transfer Protocol for Enabling Privacy in Off-Chain Payments. Paper presented at Advanced Information Networking and Applications.   
Added by: Rucknium 05/05/2022, 21:43
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size, Entropy, 24(3), 334.   
Added by: Jack   Last edited by: Jack 28/03/2023, 21:58
Dingledine, R., & Mathewson, N. (2005). Anonymity Loves Company: Usability and the Network Effect. In Designing Security Systems That People Can Use (pp. 547–559). O'Reilly..   
Added by: Rucknium 16/04/2025, 14:59
Dittrich, D., Bailey, M., & Kenneally, E. (2013). Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report. U.S. Department of Homeland Security.   
Added by: Rucknium   Last edited by: Rucknium 03/06/2025, 16:42
Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security.   
Added by: Rucknium   Last edited by: Rucknium 03/06/2025, 16:39
Fantazzini, D., & Kolodin, N. (2020). Does the Hashrate Affect the Bitcoin Price? Journal of Risk and Financial Management, [i]13(11).   
Added by: endor 17/04/2022, 21:15
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees, Proc. ACM Meas. Anal. Comput. Syst. 2(2).   
Added by: Rucknium 22/10/2022, 20:53
Fanti, G., & Viswanath, P. 2017. Anonymity Properties of the Bitcoin P2P Network.   
Added by: Rucknium   Last edited by: Rucknium 01/08/2024, 16:27
Feickert, A. (2024). Salvium review. Unpublished manuscript.   
Added by: opal   Last edited by: opal 20/08/2024, 14:33
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303.   
Added by: Rucknium 10/07/2024, 16:09
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962.   
Added by: Rucknium 09/08/2024, 19:50
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425.   
Added by: Rucknium 09/08/2024, 18:32
Garay, J., Kiayias, A., & Leonardos, N. 2015, The Bitcoin Backbone Protocol: Analysis and Applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.   
Added by: endor 17/04/2022, 21:02
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the Security and Performance of Proof of Work Blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.   
Added by: endor   Last edited by: endor 17/04/2022, 19:53
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:32
Goorha, P. Principles of Natural Resource Economics for Bitcoin, The Journal of The British Blockchain Association, 4(August).   
Added by: endor   Last edited by: endor 14/04/2022, 20:14
Grunspan, C., & Perez-Marco, R. 2017. Satoshi Risk Tables.   
Added by: Rucknium   Last edited by: Rucknium 13/09/2024, 13:39
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053.   
Added by: Rucknium   Last edited by: Rucknium 23/08/2023, 16:52
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746.   
Added by: Rucknium   Last edited by: Rucknium 14/09/2024, 14:08
Grunspan, C., & Perez-Marco, R. 2022. Ping-Pong Swaps. arXiv.   
Added by: Rucknium 02/12/2022, 16:36
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.   
Added by: Rucknium 22/10/2022, 20:50
Howell, A., Saber, T., & Bendechache, M. (2023). Measuring node decentralisation in blockchain peer to peer networks, Blockchain: Research and Applications, 4(1), 100109.   
Added by: Rucknium 03/06/2025, 16:28
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System, The Review of Economic Studies, 88(6), 3011–3040.   
Added by: endor   Last edited by: endor 19/04/2022, 23:07
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business.   
Added by: Rucknium 22/10/2022, 17:17
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in Bitcoin: A Study of Double-Spending and Accountability, ACM Trans. Inf. Syst. Secur. 18(1).   
Added by: endor   Last edited by: endor 17/04/2022, 19:51
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks, Array, 10, 100065.   
Added by: Rucknium 03/05/2022, 03:13
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891.   
Added by: Rucknium 10/09/2022, 19:55
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).   
Added by: Jack   Last edited by: Jack 20/01/2023, 18:12
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies, Energy, 168, 160–168.   
Added by: endor 17/04/2022, 19:30
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-Work cryptocurrency mining: a statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).   
Added by: endor 03/04/2022, 18:53
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-Indistinguishable Mixing for Cryptocurrencies, Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.   
Added by: Rucknium   Last edited by: Rucknium 05/05/2022, 22:24
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-Based Confidential Payment System with Controllable Regulation. Paper presented at Information Security Practice and Experience.   
Added by: Rucknium 02/12/2022, 16:05
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751.   
Added by: Rucknium 06/01/2024, 17:44
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305].   
Added by: Jack   Last edited by: Jack 06/03/2023, 22:35
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June, ASIC Clouds: Specializing the Datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).   
Added by: endor 17/04/2022, 19:40
McCloskey, D. N. (2016). Fungibility. In The New Palgrave Dictionary of Economics (pp. 1–1). London: Palgrave Macmillan UK. (Original work published 1987).   
Added by: Rucknium   Last edited by: Rucknium 09/03/2022, 21:31
Meier, J. (2022). Diophantine Satisfiability Arguments for Private Blockchains. Unpublished masters thesis, ETH Zurich, Zurich.   
Added by: Rucknium 22/10/2022, 19:40
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.   
Added by: Rucknium 23/02/2022, 22:08
Mondschein, C. F. (2020). Browser-based Crypto Mining and EU Data Protection and Privacy Law: A Critical Assessment and Possible Opportunities for the Monetisation of Web Services, The Journal of The British Blockchain Association.   
Added by: Rucknium   Last edited by: Rucknium 03/05/2022, 12:53
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).   
Added by: Rucknium 05/01/2024, 19:14
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Unpublished manuscript.   
Added by: Rucknium   Last edited by: theadmin 23/02/2022, 00:13
Nick, J., Eagen, L., & Linus, R. 2025. Shielded CSV: Private and Efficient Client-Side Validation. [Cryptology {ePrint} Archive, Paper 2025/068].   
Added by: Rucknium   Last edited by: Rucknium 27/02/2025, 16:24
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining, Solar Energy, 232, 409–420.   
Added by: endor 17/04/2022, 19:34
O'Dwyer, K. J., & Malone, D. 2014, June, Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).   
Added by: endor 17/04/2022, 20:19
Open Letter to FinCEN’s Proposed Amendment of the BSA. October 24 2020. FinCEN.   
Added by: Jack   Last edited by: Jack 20/01/2023, 03:41
Patra, R. K., & Sen, B. (2016). Estimation of a two-component mixture model with applications to multiple testing, Journal of the Royal Statistical Society. Series B (Statistical Methodology), 78(4), 869–893.   
Added by: Rucknium 22/02/2025, 23:11
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 29/07/2023, 02:59
Quesnelle, J. 2017. On the linkability of Zcash transactions. arXiv.   
Added by: Rucknium   Last edited by: Rucknium 25/08/2022, 00:25
Rinberg, R., & Agarwal, N. 2022. Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain. [Cryptology ePrint Archive, Paper 2022/985].   
Added by: Rucknium 22/10/2022, 17:21
Rosenfeld, M. 2014. Analysis of Hashrate-Based Double Spending.   
Added by: Rucknium   Last edited by: Rucknium 23/08/2023, 16:48
Rueckert, C. (2019). Cryptocurrencies and fundamental rights, Journal of Cybersecurity, 5(1).   
Added by: Rucknium 03/05/2022, 12:49
Sarier, N. D. (2022). Privacy Preserving Biometric Authentication on the blockchain for smart healthcare, Pervasive and Mobile Computing, 86, 101683.   
Added by: Rucknium 10/09/2022, 19:55
Scala, E., & Mostarda, L. 2023, Range Proofs with Constant Size and Trustless Setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.   
Added by: Jack   Last edited by: Jack 29/03/2023, 18:12
Su, W., & Ma, L. 2023, April, A Blockchain-based Covert Document Communication System Model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).   
Added by: Rucknium 05/01/2024, 19:13
Tabatabaee, S. A., Nicer, C., Beschastnikh, I., & Feng, C. 2021. One Bad Apple Spoils the Bunch: Transaction DoS in MimbleWimble Blockchains.   
Added by: Rucknium   Last edited by: Rucknium 03/06/2025, 17:23
Taylor, M. B. 2013, Bitcoin and the Age of Bespoke Silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.   
Added by: endor 17/04/2022, 20:23
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection. Paper presented at Wireless Algorithms, Systems, and Applications.   
Added by: Rucknium 02/12/2022, 16:03
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).   
Added by: Rucknium 06/01/2024, 17:53
USA v. LICHTENSTEIN et al. February 7 2022. US Dept. of Justice.   
Added by: Jack   Last edited by: Jack 20/01/2023, 03:41
Vranken, H. (2017). Sustainability of bitcoin and blockchains, Current Opinion in Environmental Sustainability, 28, 1–9.   
Added by: endor 17/04/2022, 19:32
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach, Energy Research & Social Science, 70, 101721.   
Added by: endor 17/04/2022, 19:32
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains, arXiv preprint arXiv:2306.14272.   
Added by: Jack   Last edited by: Jack 29/07/2023, 03:09
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A Survey on Privacy Protection of Cross-Chain. Paper presented at Advances in Artificial Intelligence and Security.   
Added by: Rucknium 10/09/2022, 20:13
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). BBARHS: Blockchain-Based Anonymous Ride-Hailing Scheme for Autonomous Taxi Network, Security and Communication Networks, 2022, 1–13.   
Added by: Rucknium 10/09/2022, 19:57
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability, Computer Standards & Interfaces, 87, 103770.   
Added by: Rucknium 06/01/2024, 17:26
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions, Computer Communications, 205, 136–146.   
Added by: Rucknium 05/01/2024, 19:23
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. [Cryptology ePrint Archive, Paper 2022/1634].   
Added by: Rucknium 02/12/2022, 16:10
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS).   
Added by: Jack   Last edited by: Jack 25/09/2024, 21:33
Zheng, C., Meng, S., Junxian, D., & Liehuang, Z. 2024, From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. Paper presented at Advanced Parallel Processing Technologies.   
Added by: Rucknium 03/06/2025, 17:38
WIKINDX 6.10.2 | Total resources: 271 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced