暂无分享,去创建一个
[1] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[2] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[3] Rainer Böhme,et al. Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[4] Christoph Fretter,et al. The Unreasonable Effectiveness of Address Clustering , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[5] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[6] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[7] Guido Caldarelli,et al. Blockchain inefficiency in the Bitcoin peers network , 2017, EPJ Data Science.
[8] Massimo Bartoletti,et al. An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.
[9] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[10] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[11] Cristina Pérez-Solà,et al. The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.
[12] Rainer Böhme,et al. Towards Risk Scoring of Bitcoin Transactions , 2014, Financial Cryptography Workshops.
[13] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[14] Damon McCoy,et al. Stressing Out: Bitcoin "Stress Testing" , 2016, Financial Cryptography Workshops.
[15] Feng Hao,et al. Refund Attacks on Bitcoin's Payment Protocol , 2016, Financial Cryptography.
[16] Adam Doupé,et al. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[17] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[18] Tyler Moore,et al. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.
[19] Benjamin Fabian,et al. Analyzing the Bitcoin Network: The First Four Years , 2016, Future Internet.
[20] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[21] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[22] Stefan Katzenbeisser,et al. Structure and Anonymity of the Bitcoin Transaction Graph , 2013, Future Internet.
[23] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[24] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[25] Rainer Böhme,et al. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.
[26] Lavanya Ramakrishnan,et al. Performance evaluation of a MongoDB and hadoop platform for scientific data analysis , 2013, Science Cloud '13.
[27] Jonathan Katz,et al. Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.
[28] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[29] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[30] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.