MoneroResearch.info

List Resources

Displaying 1 - 71  of 71 (Bibliography: WIKINDX Master Bibliography)
Parameters
Order by

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2022). Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota, WIREs Data Mining and Knowledge Discovery, 12(1), e1436.   
Added by: Rucknium 2/23/22, 10:27 PM
Aslam, S., Tošić, A., & Mrissa, M. (2021). Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions, Journal of Cybersecurity and Privacy, 1(1), 164–194.   
Added by: Rucknium 2/23/22, 3:58 PM
Aziz, A. B. A., Ngah, S. B., Dun, Y. T., & Bee, T. F. (2020). Coinhive’s Monero Drive-by Crypto-jacking, IOP Conference Series: Materials Science and Engineering, 769(1), 12065.   
Added by: Jack   Last edited by: Jack 1/18/23, 12:05 AM
Biryukov, A., & Tikhomirov, S. (2019). Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash, Pervasive and Mobile Computing, 59, 101030.   
Added by: Jack   Last edited by: Jack 1/8/23, 3:27 AM
Block, A. R., Garreta, A., Katz, J., Thaler, J., Tiwari, P. R., & Zajac, M. (2023). Fiat-Shamir Security of FRI and Related SNARKs, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 7/29/23, 3:05 AM
Bojja Venkatakrishnan, S., Fanti, G., & Viswanath, P. (2017). Dandelion: Redesigning the Bitcoin Network for Anonymity, Proc. ACM Meas. Anal. Comput. Syst. 1(1).   
Added by: Rucknium 8/1/24, 4:22 PM
Borggren, N., Kim, H.-Y., Yao, L., & Koplik, G. (2020). Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network, arXiv preprint arXiv:2001.03937.   
Added by: Jack   Last edited by: Jack 4/1/22, 6:46 PM
Borggren, N., & Yao, L. (2020). Correlations of multi-input Monero transactions, arXiv preprint arXiv:2001.04827.   
Added by: Jack   Last edited by: Rucknium 4/20/22, 3:36 PM
Broniatowski, M. (2021). Minimum Divergence Estimators, Maximum Likelihood and the Generalized Bootstrap, Entropy, 23(2), 185.   
Added by: Rucknium   Last edited by: Rucknium 3/12/22, 4:40 AM
Chow, S. S., Egger, C., Lai, R. W. F., Ronge, V., & Woo, I. K. Y. (2023). On sustainable ring-based anonymous systems, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 6/6/23, 9:13 PM
Chung, H., Han, K., Ju, C., Kim, M., & Seo, J. H. (2022). Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger, IEEE Access, 10, 42067–42082.   
Added by: Jack   Last edited by: Jack 3/29/23, 6:12 PM
Deng, C., You, L., Tang, X., Hu, G., & Gao, S. (2022). Cuproof: Range proof with constant size, Entropy, 24(3), 334.   
Added by: Jack   Last edited by: Jack 3/28/23, 9:58 PM
Deuber, D., Ronge, V., & Rueckert, C. (2022). SoK: Assumptions Underlying Cryptocurrency Deanonymizations, Proceedings on Privacy Enhancing Technologies, 2022(3).   
Added by: Rucknium   Last edited by: Rucknium 7/5/22, 5:01 PM
Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., & Gu, L. (2024). Concise RingCT Protocol Based on Linkable Threshold Ring Signature, IEEE Transactions on Dependable and Secure Computing, (1), 1–15.   
Added by: Jack   Last edited by: Jack 2/27/24, 1:42 PM
Dutta, A., Bagad, S., & Vijayakumaran, S. (2021). MProve+: Privacy Enhancing Proof of Reserves Protocol for Monero, IEEE Transactions on Information Forensics and Security, 16, 3900–3915.   
Added by: Rucknium   Last edited by: Rucknium 2/24/22, 7:18 PM
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On Defeating Graph Analysis of Anonymous Transactions, Proceedings on Privacy Enhancing Technologies, 2022(3).   
Added by: Rucknium   Last edited by: Rucknium 7/5/22, 5:03 PM
Erg"un, Z. C., & KARABIYIK, B. K. Forecasting Monero Prices with a Machine Learning Algorithm, Eski{\c{s}}ehir Osmangazi {\"U}niversitesi {\.I}ktisadi ve {\.I}dari Bilimler Dergisi, 16(3), 651–663.   
Added by: Jack   Last edited by: Jack 1/20/23, 5:38 PM
Fantazzini, D., & Kolodin, N. (2020). Does the Hashrate Affect the Bitcoin Price? Journal of Risk and Financial Management, [i]13(11).   
Added by: endor 4/17/22, 9:15 PM
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees, Proc. ACM Meas. Anal. Comput. Syst. 2(2).   
Added by: Rucknium 10/22/22, 8:53 PM
Franzoni, F., & Daza, V. (2022). Clover: An anonymous transaction relay protocol for the bitcoin P2P network, Peer-to-Peer Networking and Applications, 15(1), 290–303.   
Added by: Rucknium 7/10/24, 4:09 PM
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962.   
Added by: Rucknium 8/9/24, 7:50 PM
Franzoni, F., Salleras, X., & Daza, V. (2022). AToM: Active topology monitoring for the bitcoin peer-to-peer network, Peer-to-Peer Networking and Applications, 15(1), 408–425.   
Added by: Rucknium 8/9/24, 6:32 PM
Gligoroski, D. (2023). A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 3/6/23, 10:32 PM
Goodell, B., Noether, S., & Blue, A. (2019). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys, Cryptology ePrint Archive, Paper 2019/654.   
Added by: Jack   Last edited by: Jack 1/20/23, 5:53 PM
Goorha, P. Principles of Natural Resource Economics for Bitcoin, The Journal of The British Blockchain Association, 4(August).   
Added by: endor   Last edited by: endor 4/14/22, 8:14 PM
Grunspan, C., & Perez-Marco, R. (2018). Double spend races, Int. J. Theor. Appl. Finance, 21(8), 1850053.   
Added by: Rucknium   Last edited by: Rucknium 8/23/23, 4:52 PM
Grunspan, C., & Perez-Marco, R. (2022). On Profitability of Nakamoto Double Spend, Probability in the Engineering and Informational Sciences, 36(3), 732–746.   
Added by: Rucknium   Last edited by: Rucknium 9/14/24, 2:08 PM
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). MRCC: A Practical Covert Channel Over Monero With Provable Security, IEEE Access, 9, 31816–31825.   
Added by: Rucknium   Last edited by: Rucknium 8/6/22, 9:24 PM
Hoenisch, P., & Pino, L. S. D. (2021). Atomic Swaps between Bitcoin and Monero, CoRR, abs/2101.12332.   
Added by: Rucknium   Last edited by: Rucknium 2/24/22, 6:54 PM
Huang, K., Mu, Y., Rezaeibagha, F., Zhang, X., & Li, X. (2023). Monero with Multi-Grained Redaction, IEEE Transactions on Dependable and Secure Computing, 1–13.   
Added by: Rucknium 1/5/24, 7:16 PM
Huberman, G., Leshno, J. D., & Moallemi, C. (2021). Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System, The Review of Economic Studies, 88(6), 3011–3040.   
Added by: endor   Last edited by: endor 4/19/22, 11:07 PM
Jiang, Y., & Zhang, J. (2024). Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks, IEEE Transactions on Information Forensics and Security, 19, 8155–8171.   
Added by: Jack   Last edited by: Jack 9/19/24, 10:59 PM
Jiang, P., Zhu, J., & Zhu, L. (2024). Balancing Privacy and Regulation of Cross-chain Transaction Systems via SoK-assisted Policy Enhancement, IEEE Transactions on Information Forensics and Security, 1–1.   
Added by: Rucknium   Last edited by: Rucknium 5/23/24, 6:01 PM
Jin, R. (2023). The Advance of Ring Confidential Transactions, Highlights in Science, Engineering and Technology, 39, 1104–1110.   
Added by: Rucknium   Last edited by: Rucknium 1/5/24, 7:46 PM
Karame, G. O., Androulaki, E., Roeschlin, M., Gervais, A., & vCapkun, S. (2015). Misbehavior in Bitcoin: A Study of Double-Spending and Accountability, ACM Trans. Inf. Syst. Secur. 18(1).   
Added by: endor   Last edited by: endor 4/17/22, 7:51 PM
Kearney, J. J., & Perez-Delgado, C. A. (2021). Vulnerability of blockchain technologies to quantum attacks, Array, 10, 100065.   
Added by: Rucknium 5/3/22, 3:13 AM
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891.   
Added by: Rucknium 9/10/22, 7:55 PM
Li, J., Li, N., Peng, J., Cui, H., & Wu, Z. (2019). Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies, Energy, 168, 160–168.   
Added by: endor 4/17/22, 7:30 PM
Li, W., Lin, Z., & Chen, Q. (2022). A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses, Security and Communication Networks, 2022.   
Added by: Rucknium 2/24/22, 3:44 PM
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero, Journal of Parallel and Distributed Computing, 169, 301–316.   
Added by: Rucknium 9/10/22, 7:54 PM
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability, IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691.   
Added by: Rucknium 6/30/22, 10:22 PM
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-Indistinguishable Mixing for Cryptocurrencies, Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.   
Added by: Rucknium   Last edited by: Rucknium 5/5/22, 10:24 PM
Lin, H., & Wang, M. (2022). Repudiable ring signature: Stronger security and logarithmic-size, Computer Standards & Interfaces, 80, 103562.   
Added by: Rucknium 2/24/22, 6:04 PM
Lin, D., Yan, J., Ba, N., Fu, Z., & Jiang, H. (2022). Survey of anonymity and tracking technology in Monero, Journal of Computer Applications, 42(1).   
Added by: Rucknium 2/23/22, 5:01 PM
Liu, L., Liu, L., Li, B., Zhong, Y., Liao, S., & Zhang, L. (2022). MSCCS: A Monero-based security-enhanced covert communication system, Computer Networks, 205, 108759.   
Added by: Rucknium 2/23/22, 10:46 PM
Luo, M., Zhou, J., & Yang, P. (2023). RATS: A regulatory anonymous transaction system based on blockchain, Journal of Parallel and Distributed Computing, 182, 104751.   
Added by: Rucknium 1/6/24, 5:44 PM
Mondschein, C. F. (2020). Browser-based Crypto Mining and EU Data Protection and Privacy Law: A Critical Assessment and Possible Opportunities for the Monetisation of Web Services, The Journal of The British Blockchain Association.   
Added by: Rucknium   Last edited by: Rucknium 5/3/22, 12:53 PM
Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., & Srivastava, S., et al. (2018). An Empirical Analysis of Traceability in the Monero Blockchain, Proceedings on Privacy Enhancing Technologies, 2018(3), 143–163.   
Added by: Rucknium 2/23/22, 4:14 PM
Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance, arXiv preprint arXiv:2307.01155.   
Added by: Jack   Last edited by: Jack 7/29/23, 3:07 AM
Nikzad, A., & Mehregan, M. (2022). Techno-economic, and environmental evaluations of a novel cogeneration system based on solar energy and cryptocurrency mining, Solar Energy, 232, 409–420.   
Added by: endor 4/17/22, 7:34 PM
Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C.-M., & Sakurai, K. (2022). A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity, Cryptography, 6(1).   
Added by: Rucknium 2/26/22, 10:36 PM
Pu, S., Thyagarajan, S. A., D"ottling, N., & Hanzlik, L. (2023). Post Quantum Fuzzy Stealth Signatures and Applications, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 7/29/23, 2:59 AM
Purkovic, S., Mekic, E., Kuk, K., & Gostimirovic, L. (2021). Empirical Analysis of Silent Mining Operation in the Monero System, Studies in Informatics and Control, 30(4), 99–108.   
Added by: Jack   Last edited by: Jack 1/20/23, 6:21 PM
Renwick, R., & Gleasure, R. (2021). Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems, Journal of Information Technology, 36(1), 16–38.   
Added by: Rucknium 3/9/22, 7:45 PM
Ronge, V., Egger, C., Lai, R. W. F., Schröder, D., & Yin, H. H. F. (2021). Foundations of Ring Sampling, Proceedings on Privacy Enhancing Technologies, 2021(3), 265–288.   
Added by: Rucknium 2/23/22, 4:13 PM
Rueckert, C. (2019). Cryptocurrencies and fundamental rights, Journal of Cybersecurity, 5(1).   
Added by: Rucknium 5/3/22, 12:49 PM
Sarier, N. D. (2022). Privacy Preserving Biometric Authentication on the blockchain for smart healthcare, Pervasive and Mobile Computing, 86, 101683.   
Added by: Rucknium 9/10/22, 7:55 PM
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero, Cryptology ePrint Archive.   
Added by: Jack 6/23/22, 4:11 AM
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies, Security & Future, 6(1).   
Added by: Rucknium   Last edited by: Rucknium 9/10/22, 8:04 PM
Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks, Proc. ACM Meas. Anal. Comput. Syst. 4(2).   
Added by: Rucknium   Last edited by: Rucknium 10/22/22, 8:37 PM
Vranken, H. (2017). Sustainability of bitcoin and blockchains, Current Opinion in Environmental Sustainability, 28, 1–9.   
Added by: endor 4/17/22, 7:32 PM
Vries, A. D. (2020). Bitcoin’s energy consumption is underestimated: A market dynamics approach, Energy Research & Social Science, 70, 101721.   
Added by: endor 4/17/22, 7:32 PM
Wahrst"atter, A., Solomon, M., DiFrancesco, B., Buterin, V., & Svetinovic, D. (2023). BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains, arXiv preprint arXiv:2306.14272.   
Added by: Jack   Last edited by: Jack 7/29/23, 3:09 AM
Wang, X., Lin, C., Huang, X., & He, D. (2023). Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks, IEEE Transactions on Information Forensics and Security, 1–1.   
Added by: Rucknium 1/6/24, 4:59 PM
Wang, X., Lin, L., & Wang, Y. (2023). Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring, The Computer Journal, bxad056.   
Added by: Jack   Last edited by: Jack 6/7/23, 12:27 PM
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). BBARHS: Blockchain-Based Anonymous Ride-Hailing Scheme for Autonomous Taxi Network, Security and Communication Networks, 2022, 1–13.   
Added by: Rucknium 9/10/22, 7:57 PM
Yu, G. (2020). Blockchain stealth address schemes, Cryptology ePrint Archive.   
Added by: Jack   Last edited by: Jack 6/6/23, 9:04 PM
Yu, Q., Liao, S., Wang, L., Yu, Y., Zhang, L., & Zhao, Y. (2024). A regulated anonymous cryptocurrency with batch linkability, Computer Standards & Interfaces, 87, 103770.   
Added by: Rucknium 1/6/24, 5:26 PM
Zhang, T. (2023). Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin, IEEE Transactions on Sustainable Computing, 8(4), 574–582.   
Added by: Rucknium 1/6/24, 5:50 PM
Zhang, T., Li, B., Zhu, Y., Han, T., & Wu, Q. (2023). Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions, Computer Communications, 205, 136–146.   
Added by: Rucknium 1/5/24, 7:23 PM
Zhang, Y., & Xu, H. (2022). Accountable Monero System with Privacy Protection, Security and Communication Networks, 2022, 7746341.   
Added by: Rucknium 5/5/22, 10:33 PM
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced