On The Unforkability of Monero
暂无分享,去创建一个
[1] Joseph K. Liu,et al. Linkable Ring Signature with Unconditional Anonymity , 2014, IEEE Transactions on Knowledge and Data Engineering.
[2] Edgar R. Weippl,et al. (Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice , 2018, IACR Cryptol. ePrint Arch..
[3] Ethan Heilman,et al. Atomically Trading with Roger: Gambling on the Success of a Hardfork , 2017, DPM/CBT@ESORICS.
[4] Aggelos Kiayias,et al. Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..
[5] Dongxi Liu,et al. Monero Ring Attack: Recreating Zero Mixin Transaction Effect , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[6] Surae Noether,et al. MRL-0001 A Note on Chain Reactions in Traceability in CryptoNote 2 . 0 12 September 2014 , 2014 .
[7] Dongxi Liu,et al. Anonymity Reduction Attacks to Monero , 2018, Inscrypt.
[8] Joseph K. Liu,et al. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability , 2008, NDSS.
[9] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[10] Ethan Heilman,et al. An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..
[11] Prateek Saxena,et al. A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.
[12] Man Ho Au,et al. New Empirical Traceability Analysis of CryptoNote-Style Blockchains , 2019, Financial Cryptography.
[13] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[14] Shen Noether,et al. Ring Confidential Transactions , 2016, Ledger.
[15] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[16] Jeff Sauro,et al. Quantifying the User Experience: Practical Statistics for User Research , 2012 .
[17] Jeff Sauro,et al. Chapter 2 – Quantifying user research , 2016 .
[18] David Hutchison,et al. Scalable Bloom Filters , 2007, Inf. Process. Lett..
[19] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[20] Nicolas van Saberhagen. CryptoNote v 2.0 , 2013 .
[21] Tsz Hon Yuen,et al. RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero , 2017, ESORICS.
[22] Amir Herzberg,et al. Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.
[23] Jeff Sauro,et al. Quantifying the User Experience, Second Edition: Practical Statistics for User Research , 2016 .
[24] Ron Steinfeld,et al. Platform-independent Secure Blockchain-Based Voting System , 2018, IACR Cryptol. ePrint Arch..
[25] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[26] Dongxi Liu,et al. Risk of Asynchronous Protocol Update: Attacks to Monero Protocols , 2019, ACISP.