Thwarting Unwanted Blockchain Content Insertion
暂无分享,去创建一个
Klaus Wehrle | Martin Henze | Jan Henrik Ziegeldorf | Jens Hiller | Roman Matzutt | J. H. Ziegeldorf | Martin Henze | Jens Hiller | Roman Matzutt | Klaus Wehrle
[1] Peretz Shoval,et al. Information Filtering: Overview of Issues, Research and Systems , 2001, User Modeling and User-Adapted Interaction.
[2] Laura Ricci,et al. Data-driven analysis of Bitcoin properties: exploiting the users graph , 2018, International Journal of Data Science and Analytics.
[3] Klaus Wehrle,et al. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin , 2018, Financial Cryptography.
[4] Srdjan Capkun,et al. μchain: How to Forget without Hard Forks , 2017, IACR Cryptol. ePrint Arch..
[5] Gail-Joon Ahn,et al. FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.
[6] Massimo Bartoletti,et al. An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.
[7] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[8] Giuseppe Ateniese,et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[9] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[10] J. D. Bruce. The Mini-Blockchain Scheme , 2014 .
[11] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[13] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[14] Mario Larangeira,et al. Rollerchain, a Blockchain With Safely Pruneable Full Blocks , 2016 .
[15] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[16] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper) , 2012, Financial Cryptography.
[17] Klaus Wehrle,et al. POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store , 2016, CCS.
[18] Daniel Slamanig,et al. Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures , 2017, IACR Cryptol. ePrint Arch..