A Survey on Security and Privacy Issues of Bitcoin
暂无分享,去创建一个
Mauro Conti | Sushmita Ruj | Chhagan Lal | E. Sandeep Kumar | S. Ruj | M. Conti | Chhagan Lal | Surinder Kumar | E. Sandeep Kumar
[1] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[2] Ilya Aldanov. CryptoNote+ , 2019, IACR Cryptol. ePrint Arch..
[3] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[6] Giulio Malavolta,et al. Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..
[7] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[8] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[9] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[10] Vallipuram Muthukkumarasamy,et al. Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[11] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[12] Masooda Bashir,et al. What Motivates People to Use Bitcoin? , 2016, SocInfo.
[13] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[14] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[15] George Danezis,et al. Consensus in the Age of Blockchains , 2017, ArXiv.
[16] Warren He,et al. Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.
[17] Luke Valenta,et al. Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.
[18] T. Maugh. Why buy when you can rent? , 1984, Science.
[19] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[20] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[21] Emin Gün Sirer,et al. (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work , 2017, Financial Cryptography Workshops.
[22] Mario Gerla,et al. Securing Vehicle to Vehicle Communications using Blockchain through Visible Light and Acoustic Side-Channels , 2017, ArXiv.
[23] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.
[24] Jeremy Clark,et al. A first look at the usability of bitcoin key management , 2018, ArXiv.
[25] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[26] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.
[27] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[28] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[29] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[30] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[31] Feng Hao,et al. Towards Bitcoin Payment Networks , 2016, ACISP.
[32] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[33] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[34] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[35] Sushmita Ruj,et al. Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.
[36] Ethan Heilman,et al. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.
[37] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[38] Aviv Zohar,et al. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..
[39] Zeyar Aung,et al. Investigating factors behind choosing a cryptocurrency , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.
[40] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[41] Bryan Ford,et al. Dissent: accountable anonymous group messaging , 2010, CCS '10.
[42] Qi Wang,et al. Anonymity for Bitcoin From Secure Escrow Address , 2018, IEEE Access.
[43] Pramod Viswanath,et al. Dandelion: Redesigning the Bitcoin Network for Anonymity , 2017, Proc. ACM Meas. Anal. Comput. Syst..
[44] Chandra Adhikari,et al. Secure Framework for Healthcare Data Management Using Ethereum-based Blockchain Technology , 2017 .
[45] Róbert Párhonyi,et al. Micropayment Systems , 2010, Handbook of Financial Cryptography and Security.
[46] Ghassan O. Karame,et al. Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.
[47] Cristina Pérez-Solà,et al. Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions , 2016, MDAI.
[48] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[49] Robert H. Deng,et al. Fair deposits against double-spending for Bitcoin transactions , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[50] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[51] Maureen O'Hara,et al. From Mining to Markets: The Evolution of Bitcoin Transaction Fees , 2018, Journal of Financial Economics.
[52] Daniel Kraft,et al. Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..
[53] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[54] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[55] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[56] Aggelos Kiayias,et al. Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.
[57] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[58] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[59] Conrad Burchert,et al. Scalable funding of Bitcoin micropayment channel networks , 2017, Royal Society Open Science.
[60] Adi Shamir,et al. On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak , 2008, ICALP.
[61] Nicolas Courtois,et al. The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining , 2013, ArXiv.
[62] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[63] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[64] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[65] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.
[66] Giuseppe Ateniese,et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[67] Martin White,et al. Internet of Things, Blockchain and Shared Economy Applications , 2016, EUSPN/ICTH.
[68] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[69] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[70] Vincent Gramoli,et al. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example , 2016, ArXiv.
[71] Kerem Kaskaloglu,et al. Near Zero Bitcoin Transaction Fees Cannot Last Forever , 2014 .
[72] Georg Fuchsbauer,et al. SpaceMint: A Cryptocurrency Based on Proofs of Space , 2018, ERCIM News.
[73] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[74] Aggelos Kiayias,et al. Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..
[75] Ariel Gabizon,et al. Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.
[76] Hannes Hartenstein,et al. A simulation model for analysis of attacks on the Bitcoin peer-to-peer network , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[77] Aniket Kate,et al. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.
[78] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[79] Edgar R. Weippl,et al. The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy , 2016, Financial Cryptography.
[80] Joshua A. Kroll,et al. Securing Bitcoin wallets via threshold signatures , 2014 .
[81] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.
[82] Aggelos Kiayias,et al. Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[83] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[84] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[85] Peter Fairley,et al. Blockchain world - Feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous , 2017, IEEE Spectrum.
[86] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[87] Paulo Martins,et al. TrustZone-backed bitcoin wallet , 2017, CS2@HiPEAC.
[88] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[89] Bart Preneel,et al. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.
[90] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[91] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[92] Haozhang Li,et al. Bitcoin for smart trading in smart grid , 2015, The 21st IEEE International Workshop on Local and Metropolitan Area Networks.
[93] Pedro Moreno-Sanchez,et al. Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin , 2017, IACR Cryptol. ePrint Arch..
[94] Tyler Moore,et al. The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox , 2017, J. Cybersecur..
[95] Nicolas Courtois,et al. Could Bitcoin transactions be 100x faster? , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[96] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[97] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[98] Brian Neil Levine,et al. Sybil-Resistant Mixing for Bitcoin , 2014, WPES.
[99] Anthony E. Krzesinski,et al. Increased block size and Bitcoin blockchain dynamics , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[100] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[101] Michael O. Rabin,et al. Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..
[102] Jeremy Clark,et al. Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.
[103] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[104] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[105] Burton Rosenberg,et al. Handbook of Financial Cryptography and Security , 2010 .
[106] Aggelos Kiayias,et al. Blockchain Mining Games , 2016, EC.
[107] Ethan Heilman,et al. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.
[108] Klaus Wehrle,et al. CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.
[109] Hong-Sheng Zhou,et al. TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake , 2018, BCC '18.
[110] Laura Ricci,et al. Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[111] Qingzhong Li,et al. A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[112] Arvind Narayanan,et al. Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security , 2016, ACNS.
[113] Ludwig Krippahl,et al. CONDENSER: A Graph-Based Approachfor Detecting Botnets , 2014, ArXiv.
[114] Mauro Conti,et al. REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks , 2017, ARES.
[115] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[116] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[117] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[118] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[119] Pedro Moreno-Sanchez,et al. P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.
[120] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[121] Abhi Shelat,et al. Socially Optimal Mining Pools , 2017, WINE.
[122] Tyler Moore,et al. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.
[123] Kasper Bonne Rasmussen,et al. On Bitcoin Security in the Presence of Broken Cryptographic Primitives , 2016, ESORICS.
[124] Ethan Heilman,et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.
[125] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[126] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[127] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[128] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[129] Michael S. Kester,et al. Bitcoin Transaction Graph Analysis , 2015, ArXiv.
[130] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin , 2016 .
[131] Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..
[132] Karl J. O'Dwyer,et al. Bitcoin mining and its energy footprint , 2014 .
[133] Bitcoin Risk Analysis , 2014 .
[134] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[135] A. Narayanan,et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .
[136] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[137] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[138] Rob Jansen,et al. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications , 2015, IACR Cryptol. ePrint Arch..
[139] Christian Decker,et al. BlueWallet: The Secure Bitcoin Wallet , 2014, STM.
[140] Pedro Moreno-Sanchez,et al. ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin , 2017, Financial Cryptography Workshops.
[141] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin , 2011, IACR Cryptol. ePrint Arch..
[142] Roberto Tamassia,et al. Bitconeview: visualization of flows in the bitcoin transaction graph , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[143] Yu Zhang,et al. An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[144] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[145] Ren Zhang. Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[146] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[147] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[148] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[149] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[150] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[151] Xingtong Liu,et al. Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin , 2018, IEEE Access.
[152] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[153] Feng Hao,et al. Refund Attacks on Bitcoin's Payment Protocol , 2016, Financial Cryptography.
[154] Marcin Andrychowicz,et al. On the Malleability of Bitcoin Transactions , 2015, Financial Cryptography Workshops.
[155] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[156] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[157] Adam Doupé,et al. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[158] Rainer Böhme,et al. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.
[159] David L. Mills,et al. Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .
[160] Nigel P. Smart,et al. Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..
[161] Sushmita Ruj,et al. Retricoin: Bitcoin based on compact proofs of retrievability , 2016, ICDCN.
[162] Albert Levi,et al. A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.
[163] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[164] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[165] Arvind Narayanan,et al. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies , 2017, Proc. Priv. Enhancing Technol..
[166] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[167] Mo Adda,et al. Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[168] Jeremy Clark,et al. Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).