暂无分享,去创建一个
[1] H. Simon,et al. ON A CLASS OF SKEW DISTRIBUTION FUNCTIONS , 1955 .
[2] A. H. Anderson. An electronic cash and credit system , 1966 .
[3] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[4] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[5] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[6] Felix Stalder,et al. Failures and Successes: Notes on the Development of Electronic Cash , 2002, Inf. Soc..
[7] Hector Garcia-Molina,et al. PPay: micropayments for peer-to-peer systems , 2003, CCS '03.
[8] Emin Gün Sirer,et al. KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .
[9] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[10] Huseyin Cavusoglu,et al. Emerging Issues in Responsible Vulnerability Disclosure , 2005, WEIS.
[11] 斉藤 賢爾. i-WAT : the internet WAT system : an architecture for maintaining trust and facilitating peer-to-peer barter relationships , 2006 .
[12] T. Geisel,et al. The scaling laws of human travel , 2006, Nature.
[13] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[14] Marco Gonzalez,et al. Tastes, ties, and time: A new social network dataset using Facebook.com , 2008, Soc. Networks.
[15] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] N. Kichiji,et al. Network Analyses of the Circulation Flow of Community Currency , 2008 .
[18] Rami Puzis,et al. Collaborative attack on Internet users' anonymity , 2009, Internet Res..
[19] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[20] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[21] Dan Cosley,et al. Inferring social ties from geographic coincidences , 2010, Proceedings of the National Academy of Sciences.
[22] Alex Pentland,et al. Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) , 2011, IEEE Intelligent Systems.
[23] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[24] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[25] Reuben Grinberg. Bitcoin: An Innovative Alternative Digital Currency , 2011 .