MoneroResearch.info

List Resources

Displaying 1 - 9  of 9
Parameters
Order by

Ascending
Descending
 
Display options Hint
Use all checked: 
Use all displayed: 
Use all in list: 
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6, Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 5/5/22, 8:31 PM
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6, Analysis and Probing of Parallel Channels in the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium   Last edited by: Rucknium 5/5/22, 8:31 PM
Buccafurri, F., De Angelis, V., & Lazzaro, S. 2023, May 25–26, A Traffic-Analysis Proof Solution to Allow K-Anonymous Payments in Pseudonymous Blockchains. Unpublished paper presented at 5th Distributed Ledger Technology Workshop.   
Added by: Rucknium 1/5/24, 8:51 PM
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6, SnarkPack: Practical SNARK Aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 5/5/22, 9:04 PM
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6, Towards Overcoming the Undercutting Problem. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 5/5/22, 9:01 PM
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6, The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 5/5/22, 10:38 PM
Shi, R., Peng, Z., Lan, L., Ge, Y., Liu, P., & Wang, Q., et al. 2025, February 24–28, Eclipse Attacks on Monero’s Peer-to-Peer Network. Unpublished paper presented at Network and Distributed System Security (NDSS) Symposium 2025.   
Added by: Rucknium 2/27/25, 4:05 PM
Taneska, M., & Halimi, F. 2022, Anonymous Blockchain based model for e-Voting. Unpublished paper presented at The 19th International Conference on Informatics and Information Technologies – CIIT 2022.   
Added by: Jack   Last edited by: Jack 2/21/23, 4:30 AM
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6, A Centrality Analysis of the Lightning Network. Unpublished paper presented at Financial Cryptography and Data Security 2022.   
Added by: Rucknium 5/5/22, 8:36 PM
WIKINDX 6.12.1 | Total resources: 284 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA) | Time Zone: UTC (Z)