Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks
暂无分享,去创建一个
[1] Prateek Saxena,et al. OHIE: Blockchain Scaling Made Simple , 2018, 2020 IEEE Symposium on Security and Privacy (SP).
[2] John N. Tsitsiklis,et al. Delay-Predictability Trade-offs in Reaching a Secret Goal , 2018, Oper. Res..
[3] ChaumD.. The dining cryptographers problem , 1988 .
[4] Srdjan Capkun,et al. Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .
[5] Giulio Malavolta,et al. Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..
[6] Aviv Zohar,et al. Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.
[7] Giulio Malavolta,et al. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks , 2017, NDSS.
[8] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[9] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[10] Kannan Ramchandran,et al. Hiding the Rumor Source , 2015, IEEE Transactions on Information Theory.
[11] Mariusz Nowostawski,et al. Split Payments in Payment Networks , 2018, DPM/CBT@ESORICS.
[12] Xiaozhou Li,et al. Celer Network: Bring Internet Scale to Every Blockchain , 2018, ArXiv.
[13] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[14] Sören Preibusch,et al. Unwillingness to Pay for Privacy: A Field Experiment , 2011, SSRN Electronic Journal.
[15] Rami Khalil,et al. Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..
[16] Ian Goldberg,et al. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions , 2017, NDSS.
[17] Pramod Viswanath,et al. Spy vs. Spy , 2014, SIGMETRICS.
[18] William H. Cunningham,et al. Optimal attack and reinforcement of a network , 1985, JACM.