A Bayesian approach to identify Bitcoin users
暂无分享,去创建一个
József Stéger | Gábor Vattay | Dániel Kondor | Péter L. Juhász | Dániel Kondor | G. Vattay | J. Stéger | Péter Juhász
[1] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[2] Bitcoin Proof of Stake: A Peer-to-Peer Electronic Cash System , 2020 .
[3] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[4] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[5] Cristina Pérez-Solà,et al. The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.
[6] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[7] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[8] Pramod Viswanath,et al. Dandelion: Redesigning the Bitcoin Network for Anonymity , 2017, Proc. ACM Meas. Anal. Comput. Syst..
[9] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[10] A. Pel. Money for Nothing and Bits for Free: The Geographies of Bitcoin , 2015 .
[11] Philip Koshy. CoinSeer: A Telescope Into Bitcoin , 2013 .
[12] David D. Lewis,et al. Naive (Bayes) at Forty: The Independence Assumption in Information Retrieval , 1998, ECML.
[13] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[14] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[15] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[16] Hannes Hartenstein,et al. Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[17] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[18] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[19] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[20] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[21] Keaton Brown. Bitcoin and Ethereum: Empirical Evidence on Node Distribution , 2018 .
[22] Rish,et al. An analysis of data characteristics that affect naive Bayes performance , 2001 .
[23] Kevin Lee,et al. An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.
[24] Liang Wang,et al. Towards Better Understanding of Bitcoin Unreachable Peers , 2017, ArXiv.
[25] Arvind Narayanan,et al. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies , 2017, Proc. Priv. Enhancing Technol..
[26] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.