MoneroResearch.info

List Resources

Displaying 1 - 56  of 56 (Bibliography: WIKINDX Master Bibliography)
Parameters
Order by

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The Impact of Block Parameters on the Throughput and Security of Blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.   
Added by: endor 4/17/22, 9:05 PM
Amrollahi, A., & Mofrad, M. A. 2023, Towards unraveling power dynamics in Information Systems research: A systematic literature review through the lens of activity theory. Paper presented at ACIS 2023.   
Added by: Rucknium 4/5/24, 9:26 PM
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).   
Added by: endor   Last edited by: endor 4/19/22, 11:11 PM
Barj, S., Ouaddah, A., & Mezrioui, A. 2023, A Review of Privacy-Preserving Cryptographic Techniques Used in Blockchain Platforms. Paper presented at Digital Technologies and Applications.   
Added by: Rucknium 1/6/24, 5:36 PM
Bonneau, J. 2019, Hostile Blockchain Takeovers (Short Paper). Paper presented at Financial Cryptography and Data Security.   
Added by: endor   Last edited by: endor 4/17/22, 10:47 PM
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).   
Added by: Jack   Last edited by: Jack 3/29/23, 6:22 PM
Butler, S. 2021, Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums. Paper presented at Socio-Technical Aspects in Security and Trust.   
Added by: Rucknium 10/12/22, 4:26 PM
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the Monero Peer-to-Peer Network. Paper presented at Financial Cryptography and Data Security.   
Added by: Rucknium 12/13/22, 6:56 PM
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the Instability of Bitcoin Without the Block Reward.   
Added by: endor 4/17/22, 11:28 PM
Chator, A., & Green, M. 2018, How to squeeze a crowd: reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops.   
Added by: Jack   Last edited by: Jack 1/20/23, 6:05 PM
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques.   
Added by: Jack   Last edited by: Jack 8/8/22, 2:40 AM
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary Equilibrium Analysis for Decision on Block Size in Blockchain Systems. Paper presented at Combinatorial Optimization and Applications.   
Added by: endor 4/17/22, 10:41 PM
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A Systematic Approach to Cryptocurrency Fees. Paper presented at Financial Cryptography and Data Security.   
Added by: endor 4/17/22, 10:41 PM
Corradini, F., Mostarda, L., & Scala, E. 2022, ZeroMT: Multi-transfer Protocol for Enabling Privacy in Off-Chain Payments. Paper presented at Advanced Information Networking and Applications.   
Added by: Rucknium 5/5/22, 9:43 PM
Esgin, M. F., Steinfeld, R., & Zhao, R. K. 2022, MatRiCT+: More efficient post-quantum private blockchain payments. Paper presented at 2022 IEEE Symposium on Security and Privacy (SP).   
Added by: Jack   Last edited by: Jack 3/28/23, 8:46 PM
Fan, X. 2018, Faster dual-key stealth address for blockchain-based internet of things systems. Paper presented at Blockchain--ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1.   
Added by: Jack   Last edited by: Jack 6/6/23, 9:02 PM
Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September, A Traceability Analysis of Monero’s Blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS).   
Added by: Rucknium   Last edited by: Rucknium 2/23/22, 4:23 PM
Garay, J., Kiayias, A., & Leonardos, N. 2015, The Bitcoin Backbone Protocol: Analysis and Applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.   
Added by: endor 4/17/22, 9:02 PM
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the Security and Performance of Proof of Work Blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.   
Added by: endor   Last edited by: endor 4/17/22, 7:53 PM
Hinteregger, A., & Haslhofer, B. 2019, Short Paper: An Empirical Analysis of Monero Cross-chain Traceability. Paper presented at Financial Cryptography and Data Security.   
Added by: Rucknium 9/10/22, 8:11 PM
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.   
Added by: Rucknium 10/22/22, 8:50 PM
Klinec, D., & Matyas, V. 2020, Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. Paper presented at ICT Systems Security and Privacy Protection.   
Added by: Rucknium 10/22/22, 7:45 PM
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).   
Added by: Jack   Last edited by: Jack 1/20/23, 6:12 PM
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-Work cryptocurrency mining: a statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).   
Added by: endor 4/3/22, 6:53 PM
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-Based Confidential Payment System with Controllable Regulation. Paper presented at Information Security Practice and Experience.   
Added by: Rucknium 12/2/22, 4:05 PM
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making Monero Hard-to-Trace and More Efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).   
Added by: Jack   Last edited by: Jack 1/20/23, 6:12 PM
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June, ASIC Clouds: Specializing the Datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).   
Added by: endor 4/17/22, 7:40 PM
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.   
Added by: Rucknium 2/23/22, 10:08 PM
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Paper presented at Financial Cryptography and Data Security.   
Added by: Jack   Last edited by: Jack 1/18/23, 12:01 AM
Movsowitz Davidow, D., Manevich, Y., & Toch, E. 2023, Privacy-Preserving Transactions with Verifiable Local Differential Privacy. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).   
Added by: Rucknium 1/5/24, 7:14 PM
O'Dwyer, K. J., & Malone, D. 2014, June, Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).   
Added by: endor 4/17/22, 8:19 PM
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against Monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).   
Added by: Rucknium   Last edited by: Rucknium 3/16/24, 1:00 PM
Pitu, F., & Gaitan, N. C. 2023, July, Survey of security, performance, and profitability of Monero: a browser-based cryptocurrency. Paper presented at 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).   
Added by: Rucknium 1/6/24, 5:58 PM
Raikwar, M., Wu, S., & Gjosteen, K. 2023, Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Paper presented at Network and System Security.   
Added by: Rucknium 1/6/24, 5:22 PM
Scala, E., & Mostarda, L. 2023, Range Proofs with Constant Size and Trustless Setup. Paper presented at Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 3.   
Added by: Jack   Last edited by: Jack 3/29/23, 6:12 PM
Scala, E., & Mostarda, L. 2024, Efficient Inner-Product Argument from Compressed $Sigma$-Protocols and Applications. Paper presented at International Conference on Advanced Information Networking and Applications.   
Added by: Jack   Last edited by: Jack 6/12/24, 12:50 PM
Scheid, E. J., Küng, S., Franco, M., & Stiller, B. 2023, Opening Pandora's Box: An Analysis of the Usage of the Data Field in Blockchains. Paper presented at 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA).   
Added by: Rucknium   Last edited by: Rucknium 1/10/24, 4:59 PM
Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024.   
Added by: Rucknium 5/23/24, 5:47 PM
Su, W., & Ma, L. 2023, April, A Blockchain-based Covert Document Communication System Model. Paper presented at 2023 8th International Conference on Computer and Communication Systems (ICCCS).   
Added by: Rucknium 1/5/24, 7:13 PM
Taylor, M. B. 2013, Bitcoin and the Age of Bespoke Silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.   
Added by: endor 4/17/22, 8:23 PM
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection. Paper presented at Wireless Algorithms, Systems, and Applications.   
Added by: Rucknium 12/2/22, 4:03 PM
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero. Paper presented at Computer Security -- ESORICS 2022.   
Added by: Rucknium 12/2/22, 3:59 PM
Tiemann, T., Berndt, S., Eisenbarth, T., & Liśkiewicz, M. 2023, July, “Act natural!”: Exchanging Private Messages on Public Blockchains. Paper presented at 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P).   
Added by: Rucknium 1/6/24, 5:53 PM
Tram`er, F., Boneh, D., & Paterson, K. 2020, Remote Side-Channel Attacks on Anonymous Transactions. Paper presented at 29th USENIX security symposium (USENIX security 20).   
Added by: Jack   Last edited by: Jack 1/20/23, 6:29 PM
Vijayakumaran, S. 2023, Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition. Paper presented at 5th Conference on Advances in Financial Technologies (AFT 2023).   
Added by: Rucknium   Last edited by: Rucknium 1/10/24, 4:22 PM
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A Survey on Privacy Protection of Cross-Chain. Paper presented at Advances in Artificial Intelligence and Security.   
Added by: Rucknium 9/10/22, 8:13 PM
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE).   
Added by: Jack 1/20/23, 6:34 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2021, Transparency or Anonymity Leak: Monero Mining Pools Data Publication. Paper presented at Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings.   
Added by: Rucknium   Last edited by: Rucknium 2/24/22, 7:54 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2019, Risk of asynchronous protocol update: attacks to Monero protocols. Paper presented at Information Security and Privacy.   
Added by: Rucknium 2/25/22, 6:31 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yu, J. 2019, On The Unforkability of Monero. Paper presented at Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.   
Added by: Rucknium 2/25/22, 6:37 PM
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yuen, T. H. 2018, Anonymity Reduction Attacks to Monero. Paper presented at Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers.   
Added by: Rucknium 2/23/22, 4:44 PM
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.   
Added by: Rucknium 12/2/22, 4:31 PM
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June, Re-Thinking Untraceability in the CryptoNote-Style Blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).   
Added by: Rucknium 7/1/22, 3:50 PM
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Paper presented at Financial Cryptography and Data Security.   
Added by: Rucknium 7/2/22, 9:18 PM
Zhang, J., Su, M., Liu, X., & Wang, G. 2024, May, Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. Paper presented at 2024 IEEE Symposium on Security and Privacy (SP).   
Added by: Rucknium 1/6/24, 4:50 PM
Zheng, J., Huang, H., Li, C., Zheng, Z., & Guo, S. 2021, Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings. Paper presented at 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS).   
Added by: Jack   Last edited by: Jack 9/25/24, 9:33 PM
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced