Blockchain Transaction Analysis Using Dominant Sets
暂无分享,去创建一个
[1] Carlo Kleber da Silva Rodrigues,et al. Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time , 2015 .
[2] Benjamin Fabian,et al. Analyzing the Bitcoin Network: The First Four Years , 2016, Future Internet.
[3] Agostino Cortesi,et al. SAILS: static analysis of information leakage with sample , 2012, SAC '12.
[4] M. Pavan,et al. A new graph-theoretic approach to clustering and segmentation , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[5] Rob Jansen,et al. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications , 2015, IACR Cryptol. ePrint Arch..
[6] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[7] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[8] Marcello Pelillo,et al. Dominant Sets and Pairwise Clustering , 2007 .
[9] T. Motzkin,et al. Maxima for Graphs and a New Proof of a Theorem of Turán , 1965, Canadian Journal of Mathematics.
[10] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[11] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[13] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[14] Agostino Cortesi,et al. Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications , 2015, VMCAI.
[15] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[16] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[17] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[18] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[19] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[20] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[21] Agostino Cortesi,et al. Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis , 2015, CISIM.
[22] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[23] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[24] Stefan Savage,et al. A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.
[25] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.