|
栏目分类
|
|
2014
-
[SCG14] Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized anonymous payments from bitcoin //Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 2014: 459-474.
-
[SMZ14] Spagnuolo M, Maggi F, Zanero S. Bitiodine: Extracting intelligence from the bitcoin network //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 457-468.
-
[KKM14] Koshy P, Koshy D, McDaniel P. An analysis of anonymity in bitcoin using p2p network traffic //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 469-485.
-
[BNM14] Bonneau J, Narayanan A, Miller A, et al. Mixcoin: Anonymity for Bitcoin with accountable mixes //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 486-504.
-
[RS14] Ron D, Shamir A. How did dread pirate roberts acquire and protect his bitcoin wealth? //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 3-15.
-
[MBB14] Möser M, Böhme R, Breuker D. Towards risk scoring of Bitcoin transactions //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 16-32.
-
[Vandervort14] Vandervort D. Challenges and opportunities associated with a bitcoin-based transaction rating system //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 33-42.
-
[BP14] Boehm F, Pesch P. Bitcoin: A First Legal Analysis //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 43-54.
-
[VTM14] Vasek M, Thornton M, Moore T. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 57-71.
-
[JLG14] Johnson B, Laszka A, Grossklags J, et al. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 72-86.
-
[DPH14] Donet J A D, Pérez-Sola C, Herrera-Joancomartí J. The bitcoin p2p network //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 87-102.
-
[ADM14] Andrychowicz M, Dziembowski S, Malinowski D, et al. Fair two-party computations via bitcoin deposits //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 105-121.
-
[SMD14] Saxena A, Misra J, Dhar A. Increasing anonymity in bitcoin //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 122-139.
-
[GGM14] Garman C, Green M, Miers I, et al. Rational zero: Economic security for zerocoin with everlasting anonymity //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 140-155.
-
[DNS14] Dmitrienko A, Noack D, Sadeghi A R, et al. On offline payments with bitcoin (poster abstract) //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 159-160.
-
[Heilman14] Heilman E. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 161-162.
-
[Hileman14] Hileman G. From bitcoin to the Brixton pound: history and prospects for alternative currencies (poster abstract) //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014: 163-165.
|