Can Cryptocurrencies Preserve Privacy and Comply With Regulations?
暂无分享,去创建一个
[1] Sarah Meiklejohn,et al. An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.
[2] N. Sotirakopoulos. Cryptomarkets as a libertarian counter-conduct of resistance , 2018 .
[3] Mansoor Ahmed,et al. Making Bitcoin Legal , 2018, Security Protocols Workshop.
[4] Aiman Erbad,et al. When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis , 2018, Comput. Secur..
[5] Arvind Narayanan,et al. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies , 2017, Proc. Priv. Enhancing Technol..
[6] Wolfie Christl,et al. Corporate Surveillance In Everyday Life. How Companies Collect, Combine, Analyze, Trade, and Use Personal Data on Billions , 2017 .
[7] Ethan Heilman,et al. An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..
[8] Nicolas Courtois,et al. Stealth Address and Key Management Techniques in Blockchain Systems , 2017, ICISSP.
[9] D. Robinson,et al. Data Brokers in an Open Society , 2016 .
[10] Adam S. Hayes,et al. The Evolution of the Bitcoin Economy: Extracting and Analyzing the Network of Payment Relationships , 2016 .
[11] Doug Hopton,et al. Financial Action Task Force (FATF) , 2016, Money Laundering.
[12] C. Engel,et al. Privacy as a Public Good , 2015 .
[13] Matthew Green,et al. Keys under doormats , 2015, J. Cybersecur..
[14] Shoshana Zuboff,et al. Big other: surveillance capitalism and the prospects of an information civilization , 2015, J. Inf. Technol..
[15] Stefan Savage,et al. A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.
[16] Jan Camenisch,et al. Concepts and languages for privacy-preserving attribute-based authentication , 2013, J. Inf. Secur. Appl..
[17] Simone Polillo,et al. Society for Worldwide Interbank Financial Telecommunication , 2012 .
[18] M. Forstater. Tax-driven Money: Additional Evidence from the History of Economic Thought, Economic History and Economic Policy , 2006 .
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[21] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[22] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[23] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[24] H. London. The Meaning of Decentralization , 1975 .
[25] Jeremiah Smith. Bank for International Settlements , 1929, International Organization.
[26] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[27] Stuart Breslow,et al. The new frontier in anti–money laundering , 2017 .
[28] S. Hughes,et al. Advancing a Framework for Regulating Cryptocurrency Payments Intermediaries , 2015 .
[29] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[30] Kenneth S. Rogoff,et al. The Risks of Unilateral Exchange Rate Pegs , 1998 .
[31] S. Fender. The New York Review of Books , 1986 .
[32] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[33] Paul Armer,et al. PRIVACY ASPECTS OF THE CASHLESS AND CHECKLESS SOCIETY. TESTIMONY BEFORE THE SENATE SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE , 1968 .