A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
暂无分享,去创建一个
Klaus Wehrle | Oliver Hohlfeld | Martin Henze | Jan Henrik Ziegeldorf | Roman Matzutt | Jens Hiller | Dirk Müllmann | J. H. Ziegeldorf | Martin Henze | Jens Hiller | O. Hohlfeld | Roman Matzutt | Klaus Wehrle | Dirk Müllmann
[1] Jude C. Nelson,et al. Blockstack : A New Decentralized Internet , 2017 .
[2] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[3] Jan Rüth,et al. Maintaining integrity and reputation in content offloading , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[4] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[5] Lorrie Faith Cranor,et al. Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.
[6] Samantha H. Scheller. A Picture Is Worth a Thousand Words: The Legal Implications of Revenge Porn , 2015 .
[7] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[8] David M. Douglas,et al. Doxing: a conceptual analysis , 2016, Ethics and Information Technology.
[9] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[10] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin , 2011, IACR Cryptol. ePrint Arch..
[11] Klaus Wehrle,et al. POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store , 2016, CCS.
[12] Massimo Bartoletti,et al. An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.
[13] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[14] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[15] M. Zeilinger. Digital Art as ‘Monetised Graphics’: Enforcing Intellectual Property on the Blockchain , 2016, Philosophy & Technology.
[16] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[17] Lisa Lynch. The Leak Heard Round the World? Cablegate in the Evolving Global Mediascape , 2013 .
[18] John B Bellinger,et al. Freedom of Speech: The Great Divide and the Common Ground between the United States and the Rest of the World , 2012 .
[19] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[20] J. Hirst,et al. Section 2 , 2007, Developing Self and Self-Concepts in Early Childhood Education and Beyond.
[21] Matteo Marsili,et al. The Interrupted Power Law and the Size of Shadow Banking , 2013, PloS one.
[22] Laura Ricci,et al. Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[23] Srdjan Capkun,et al. μchain: How to Forget without Hard Forks , 2017, IACR Cryptol. ePrint Arch..
[24] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[25] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[26] Giuseppe Ateniese,et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[27] Tadayoshi Kohno,et al. Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions , 2015, Financial Cryptography Workshops.
[28] Randall Peerenboom,et al. Assessing Human Rights in China: Why the Double Standard? , 2005 .
[29] Stefan Katzenbeisser,et al. Structure and Anonymity of the Bitcoin Transaction Graph , 2013, Future Internet.
[30] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[31] Michael S. Kester,et al. Bitcoin Transaction Graph Analysis , 2015, ArXiv.
[32] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[33] István Csabai,et al. Do the Rich Get Richer? An Empirical Analysis of the Bitcoin Transaction Network , 2013, PloS one.
[34] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[35] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[36] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[37] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[38] Klaus Wehrle,et al. Secure and anonymous decentralized Bitcoin mixing , 2018, Future Gener. Comput. Syst..
[39] Greg Taylor,et al. Concepts of Intention in German Criminal Law , 2004 .
[40] Klaus Wehrle,et al. myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data , 2017, GI-Jahrestagung.
[41] Roman Yampolskiy,et al. Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System , 2015, 2015 International Conference on Cyberworlds (CW).
[42] Klaus Wehrle,et al. CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.