MoneroResearch.info

List Resources

Displaying 1 - 40 of 40 (Bibliography: WIKINDX Master Bibliography)
Parameters
Type:  Proceedings Article
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Akbari, E., Zhao, W., Yang, S., & Luo, X. 2020, The impact of block parameters on the throughput and security of blockchains. Paper presented at Proceedings of the 2020 The 2nd International Conference on Blockchain Technology.  
Added by: endor 2022-04-17 21:05
Arnosti, N., & Weinberg, M. S. 2018, Bitcoin: A Natural Oligopoly. Paper presented at 10th Innovations in Theoretical Computer Science Conference (ITCS 2019).  
Last edited by: endor 2022-04-19 23:11
Bonneau, J. 2019, Hostile blockchain takeovers (short paper). Paper presented at Financial Cryptography and Data Security.  
Last edited by: endor 2022-04-17 22:47
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. 2018, Bulletproofs: Short proofs for confidential transactions and more. Paper presented at 2018 IEEE Symposium on Security and Privacy (SP).  
Last edited by: Jack 2023-01-20 17:33
Butler, S. 2021, Cyber 9/11 will not take place: A user perspective of bitcoin and cryptocurrencies from underground and dark net forums. Paper presented at Socio-Technical Aspects in Security and Trust.  
Added by: Rucknium 2022-10-12 16:26
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-12-13 18:56
Carlsten, M., Kalodner, H., Weinberg, S., & Narayanan, A. 2016, On the instability of bitcoin without the block reward.  
Added by: endor 2022-04-17 23:28
Chator, A., & Green, M. 2018, How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies. Paper presented at 2018 IEEE European Symposium on Security and Privacy Workshops.  
Last edited by: Jack 2023-01-20 18:05
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques.  
Last edited by: Jack 2022-08-08 02:40
Chen, J., Cheng, Y., Xu, Z., & Cao, Y. 2021, Evolutionary equilibrium analysis for decision on block size in blockchain systems. Paper presented at Combinatorial Optimization and Applications.  
Added by: endor 2022-04-17 22:41
Chepurnoy, A., Kharin, V., & Meshkov, D. 2019, A systematic approach to cryptocurrency fees. Paper presented at Financial Cryptography and Data Security.  
Added by: endor 2022-04-17 22:41
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications.  
Added by: Rucknium 2022-05-05 21:43
Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September A traceability analysis of monero’s blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS).  
Last edited by: Rucknium 2022-02-23 16:23
Garay, J., Kiayias, A., & Leonardos, N. 2015, The bitcoin backbone protocol: Analysis and applications. Paper presented at Advances in Cryptology - EUROCRYPT 2015.  
Added by: endor 2022-04-17 21:02
Gervais, A., Karame, G. O., W"ust, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. 2016, On the security and performance of proof of work blockchains. Paper presented at Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.  
Last edited by: endor 2022-04-17 19:53
Hinteregger, A., & Haslhofer, B. 2019, Short paper: An empirical analysis of monero cross-chain traceability. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-09-10 20:11
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.  
Added by: Rucknium 2022-10-22 20:50
Klinec, D., & Matyas, V. 2020, Privacy-friendly monero transaction signing on a hardware wallet. Paper presented at ICT Systems Security and Privacy Protection.  
Added by: Rucknium 2022-10-22 19:45
Leevik, A., Beliaev, V., Stasenko, B., Davydov, V., & Bezzateev, S. 2020, Review and analysis of the classical and post-quantum ring signature algorithms. Paper presented at 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).  
Last edited by: Jack 2023-01-20 18:12
Li, S.-N., Yang, Z., & Tessone, C. J. 2020, Proof-of-work cryptocurrency mining: A statistical approach to fairness. Paper presented at 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops).  
Added by: endor 2022-04-03 18:53
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience.  
Added by: Rucknium 2022-12-02 16:05
Liu, Q., Liu, Z., Long, Y., Liu, Z., Sui, Z., & Sun, S., et al. 2019, Making monero hard-to-trace and more efficient. Paper presented at 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).  
Last edited by: Jack 2023-01-20 18:12
Magaki, I., Khazraee, M., Gutierrez, L. V., & Taylor, M. B. 2016, June Asic clouds: Specializing the datacenter. Paper presented at 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).  
Added by: endor 2022-04-17 19:40
Miller, A., Kosba, A., Katz, J., & Shi, E. 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Paper presented at Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.  
Added by: Rucknium 2022-02-23 22:08
Moreno-Sánchez, P., Blue, A., Le, D. V., Noether, S., Goodell, B., & Kate, A. 2020, Dlsag: Non-interactive refund transactions for interoperable payment channels in monero. Paper presented at Financial Cryptography and Data Security.  
Last edited by: Jack 2023-01-18 00:01
O'Dwyer, K. J., & Malone, D. 2014, June Bitcoin mining and its energy footprint. Paper presented at 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014).  
Added by: endor 2022-04-17 20:19
Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).  
Last edited by: Rucknium 2022-02-25 18:01
Taylor, M. B. 2013, Bitcoin and the age of bespoke silicon. Paper presented at Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems.  
Added by: endor 2022-04-17 20:23
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications.  
Added by: Rucknium 2022-12-02 16:03
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable timed linkable ring signatures for scalable payments for monero. Paper presented at Computer Security -- ESORICS 2022.  
Added by: Rucknium 2022-12-02 15:59
Tram`er, F., Boneh, D., & Paterson, K. 2020, Remote Side-Channel attacks on anonymous transactions. Paper presented at 29th USENIX security symposium (USENIX security 20).  
Last edited by: Jack 2023-01-20 18:29
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security.  
Added by: Rucknium 2022-09-10 20:13
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yuen, T. H. 2018, Anonymity reduction attacks to monero. Paper presented at Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers.  
Added by: Rucknium 2022-02-23 16:44
Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. 2018, Monero ring attack: Recreating zero mixin transaction effect. Paper presented at 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE).  
Added by: Jack 2023-01-20 18:34
Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D., & Yu, J. 2019, On the unforkability of monero. Paper presented at Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.  
Added by: Rucknium 2022-02-25 18:37
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2019, Risk of asynchronous protocol update: Attacks to monero protocols. Paper presented at Information Security and Privacy.  
Added by: Rucknium 2022-02-25 18:31
Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2021, Transparency or anonymity leak: Monero mining pools data publication. Paper presented at Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings.  
Last edited by: Rucknium 2022-02-24 19:54
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.  
Added by: Rucknium 2022-12-02 16:31
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New empirical traceability analysis of cryptonote-style blockchains. Paper presented at Financial Cryptography and Data Security.  
Added by: Rucknium 2022-07-02 21:18
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June Re-thinking untraceability in the cryptonote-style blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).  
Added by: Rucknium 2022-07-01 15:50
WIKINDX 6.5.0 | Total resources: 161 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)