-
Notifications
You must be signed in to change notification settings - Fork 1
/
mybib01.bib
409 lines (373 loc) · 13.2 KB
/
mybib01.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
@inproceedings{barber2012bitter,
title={Bitter to better—how to make bitcoin a better currency},
author={Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={399--414},
year={2012},
organization={Springer}
}
@techreport{ozisikestimation,
title={Estimation of Miner Hash Rates and Consensus on Blockchains},
author={Ozisik, A Pinar and Bissias, George and Levine, Brian N},
institution={Tech. rep., PDF available from arxiv. org and https://www. cs. umass. edu/~ brian/status-reports. pdf (June 2017)}
}
@inproceedings{dobbertin1996ripemd,
title={RIPEMD-160: A strengthened version of RIPEMD},
author={Dobbertin, Hans and Bosselaers, Antoon and Preneel, Bart},
booktitle={Fast Software Encryption},
pages={71--82},
year={1996},
organization={Springer}
}
@misc{dagdiscussion2014,
author={Discussion},
title={DAG, a generalized blockchain},
year={2014},
note={\url{https://nxtforum.org/proof-of-stake-algorithm/dag-a-generalized-blockchain/} (registration at \url{nxtforum.org} required)}
}
@misc{dagcoin2015,
author={Lerner, Sergio Demian},
title={DagCoin: a cryptocurrency without blocks},
year={2015},
note={Available at \url{https://bitslog.wordpress.com/2015/09/11/dagcoin/}}
}
@misc{sompolinsky2013,
author={Sompolinsky, Yonatan and Zohar, Aviv},
title={Accelerating Bitcoin’s Transaction Processing. Fast Money Grows on Trees, Not Chains},
year={2013},
note={Available at \url{https://eprint.iacr.org/2013/881.pdf}}
}
@misc{lewenberg2015,
author={Lewenberg, Yoad and Sompolinsky, Yonatan and Zohar, Aviv},
title={Inclusive Block Chain Protocols},
year={2015},
note={Available at \url{http://www.cs.huji.ac.il/~avivz/pubs/15/inclusive btc.pdf}}
}
@misc{vorick2015,
author={Vorick, David},
title={Getting rid of blocks},
year={2015},
note={Available at \url{slides.com/davidvorick/braids}}
}
@book{cormen2009introduction,
title={Introduction to algorithms},
author={Cormen, Thomas H},
year={2009},
publisher={MIT press}
}
@article{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi},
year={2008},
note={Available at \url{https://bitcoin.org/bitcoin.pdf}}
}
@misc{coinmarketcapbtc,
title={Bitcoin Market Capitalizations},
author={CoinMarketCap},
note={\url{http://coinmarketcap.com/currencies/bitcoin/}. Last accessed on July 14, 2017.},
}
@misc{coinmarketcap,
title={Cryptocurrency Market Capitalizations},
author={CoinMarketCap},
note={\url{https://coinmarketcap.com/}. Last accessed on July 14, 2017.},
}
@misc{iotacoordinator,
title={The Transparency Compendium},
author={David Sønstebø},
note={\url{https://blog.iota.org/the-transparency-compendium-26aa5bb8e260}. Last accessed on July 20, 2017.},
}
@misc{blockchaininfosize,
title={Bitcoin Blockchain Size},
author={Blockchain.info},
note={\url{https://blockchain.info/charts/blocks-size}. Last accessed on July 14, 2017.},
}
@article{tangle2016,
title={The tangle},
author={Popov, Serguei},
year={2016},
note={Available at \url{https://iota.org/IOTA_Whitepaper.pdf}.}
}
@inproceedings{gilbert2003security,
title={Security analysis of SHA-256 and sisters},
author={Gilbert, Henri and Handschuh, Helena},
booktitle={International workshop on selected areas in cryptography},
pages={175--193},
year={2003},
organization={Springer}
}
@article{bailey1954queueing,
title={On queueing processes with bulk service},
author={Bailey, Norman TJ},
journal={Journal of the Royal Statistical Society. Series B (Methodological)},
pages={80--87},
year={1954},
publisher={JSTOR}
}
@article{shah2009gossip,
title={Gossip algorithms},
author={Shah, Devavrat and others},
journal={Foundations and Trends{\textregistered} in Networking},
volume={3},
number={1},
pages={1--125},
year={2009},
publisher={Now Publishers, Inc.}
}
@inproceedings{decker2013information,
title={Information propagation in the bitcoin network},
author={Decker, Christian and Wattenhofer, Roger},
booktitle={Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on},
pages={1--10},
year={2013},
organization={IEEE}
}
@article{karame2012two,
title={Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.},
author={Karame, Ghassan and Androulaki, Elli and Capkun, Srdjan},
journal={IACR Cryptology ePrint Archive},
volume={2012},
number={248},
year={2012}
}
@misc{bitcoinstats,
author={BitcoinStats},
title={Data Propagation},
year={2013-2017},
note={\url{http://bitcoinstats.com/network/propagation/}}
}
@inproceedings{babaioff2012bitcoin,
title={On bitcoin and red balloons},
author={Babaioff, Moshe and Dobzinski, Shahar and Oren, Sigal and Zohar, Aviv},
booktitle={Proceedings of the 13th ACM conference on electronic commerce},
pages={56--73},
year={2012},
organization={ACM}
}
@techreport{debo2010prices,
title={Prices and congestion as signals of quality},
author={Debo, Laurens and Veeraraghavan, Senthil},
year={2010},
institution={Working paper, Chicago Booth School of Business, University of Chicago}
}
@inproceedings{dods2005hash,
title={Hash based digital signature schemes},
author={Dods, Chris and Smart, Nigel P and Stam, Martijn},
booktitle={IMA International Conference on Cryptography and Coding},
pages={96--115},
year={2005},
organization={Springer}
}
@misc{iotamultisign,
author={Dominik Schiener},
title={IOTA Multi-Signature Scheme},
year={2017},
note={\url{https://github.com/iotaledger/wiki/blob/master/multisigs.md}}
}
@article{heilman2017iota,
title={Iota vulnerability report: Cryptanalysis of the curl hash function enabling practical signature forgery attacks on the iota cryptocurrency},
author={Heilman, Ethan and Narula, Neha and Dryja, Thaddeus and Virza, Madars},
year={2017},
note={\url{https://github.com/mit-dci/tangled-curl/blob/master/vuln-iota.md}}
}
@misc{iotakerl,
author={Alon Elmaliah},
title={IOTA Kerl},
year={2017},
note={\url{https://github.com/iotaledger/kerl/blob/master/IOTA-Kerl-spec.md}}
}
@article{fleisch2010internet,
title={What is the internet of things? An economic perspective.},
author={Fleisch, Elgar},
journal={Economics, Management \& Financial Markets},
volume={5},
number={2},
year={2010}
}
@misc{bitcoinsupply,
author={BitcoinWiki},
title={Controlled supply},
year={2017},
note={\url{https://en.bitcoin.it/wiki/Controlled_supply}}
}
@inproceedings{chaum1983blind,
title={Blind signatures for untraceable payments},
author={Chaum, David},
booktitle={Advances in cryptology},
pages={199--203},
year={1983},
organization={Springer}
}
@inproceedings{okamoto1995efficient,
title={An efficient divisible electronic cash scheme},
author={Okamoto, Tatsuaki},
booktitle={Annual International Cryptology Conference},
pages={438--451},
year={1995},
organization={Springer}
}
@inproceedings{camenisch2005compact,
title={Compact e-cash},
author={Camenisch, Jan and Hohenberger, Susan and Lysyanskaya, Anna},
booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
pages={302--321},
year={2005},
organization={Springer}
}
@inproceedings{canard2007divisible,
title={Divisible e-cash systems can be truly anonymous},
author={Canard, S{\'e}bastien and Gouget, Aline},
booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
pages={482--497},
year={2007},
organization={Springer}
}
@article{back2016partial,
title={A partial hash collision based postage scheme (1997)},
author={Back, Adam},
journal={URL http://www.hashcash.org/papers/announce. txt},
year={2016}
}
@inproceedings{chaum1988untraceable,
title={Untraceable electronic cash},
author={Chaum, David and Fiat, Amos and Naor, Moni},
booktitle={Conference on the Theory and Application of Cryptography},
pages={319--327},
year={1988},
organization={Springer}
}
@article{chaum1985security,
title={Security without identification: Transaction systems to make big brother obsolete},
author={Chaum, David},
journal={Communications of the ACM},
volume={28},
number={10},
pages={1030--1044},
year={1985},
publisher={ACM}
}
@article{gencer2018decentralization,
title={Decentralization in Bitcoin and Ethereum Networks},
author={Gencer, Adem Efe and Basu, Soumya and Eyal, Ittay and van Renesse, Robbert and Sirer, Emin G{\"u}n},
journal={arXiv preprint arXiv:1801.03998},
year={2018}
}
@techreport{ma2018market,
title={Market structure in bitcoin mining},
author={Ma, June and Gans, Joshua S and Tourky, Rabee},
year={2018},
institution={National Bureau of Economic Research}
}
@techreport{catalini2016some,
title={Some simple economics of the blockchain},
author={Catalini, Christian and Gans, Joshua S},
year={2016},
institution={National Bureau of Economic Research}
}
@inproceedings{osipkov2007combating,
title={Combating double-spending using cooperative P2P systems},
author={Osipkov, Ivan and Vasserman, Eugene Y and Hopper, Nicholas and Kim, Yongdae},
booktitle={Distributed Computing Systems, 2007. ICDCS'07. 27th International Conference on},
pages={41--41},
year={2007},
organization={IEEE}
}
@inproceedings{zongkai2004new,
title={A new fair micropayment system based on hash chain},
author={Zongkai, Yang and Weimin, Lang and Yunmeng, Tan},
booktitle={e-Technology, e-Commerce and e-Service, 2004. EEE'04. 2004 IEEE International Conference on},
pages={139--145},
year={2004},
organization={IEEE}
}
@inproceedings{hoepman2007distributed,
title={Distributed double spending prevention},
author={Hoepman, Jaap-Henk},
booktitle={International Workshop on Security Protocols},
pages={152--165},
year={2007},
organization={Springer}
}
@misc{bitcoinspam2017,
author={Parker, Luke},
publisher={Brave New Coin},
title={Bitcoin `spam attack' stressed network for at least 18 months, claims software developer},
year={2017},
note={\url{https://bravenewcoin.com/news/bitcoin-spam-attack-stressed-network-for-at-least-18-months-claims-software-developer/}}
}
@misc{bitcoinblocksize,
author={Bitcoin Wiki},
title={Block size limit controversy},
year={2017},
note={\url{https://en.bitcoin.it/wiki/Block_size_limit_controversy}}
}
@article{jawaheri2018small,
title={When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis},
author={Jawaheri, Husam Al and Sabah, Mashael Al and Boshmaf, Yazan and Erbad, Aimen},
journal={arXiv preprint arXiv:1801.07501},
year={2018}
}
@inproceedings{biryukov2014deanonymisation,
title={Deanonymisation of clients in Bitcoin P2P network},
author={Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan},
booktitle={Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
pages={15--29},
year={2014},
organization={ACM}
}
@article{shentu2015research,
title={Research on Anonymization and De-anonymization in the Bitcoin System},
author={ShenTu, QingChun and Yu, JianPing},
journal={arXiv preprint arXiv:1510.07782},
year={2015}
}
@misc{bloomberg2017civilwar,
author={Chen, Lulu Yilun and Nakamura, Yuji},
publisher={Bloomberg},
title={Bitcoin Is Having a Civil War Right as It Enters a Critical Month},
year={2017},
note={\url{https://www.bloomberg.com/news/articles/2017-07-10/bitcoin-risks-splintering-as-civil-war-enters-critical-month}}
}
@misc{forbes2017civilwar,
author={Shin, Laura},
publisher={Forbes},
title={Bitcoin Cash Skyrockets, Bitcoin Price Drops As Civil War Continues},
year={2017},
note={\url{https://www.forbes.com/sites/laurashin/2017/11/12/bitcoin-cash-skyrockets-bitcoin-price-drops-as-civil-war-continues/#67ffeed635b5}}
}
@article{hsieh2017internal,
title={The Internal and External Governance of Blockchain-Based Organizations: Evidence from Cryptocurrencies},
author={Hsieh, Ying-Ying and Vergne, Jean-Philippe and Wang, Sha},
year={2017}
}
@article{hacker2017corporate,
title={Corporate Governance for Complex Cryptocurrencies? A Framework for Stability and Decision Making in Blockchain-Based Monetary Systems},
author={Hacker, Philipp},
year={2017}
}
@inproceedings{heilman2015eclipse,
title={Eclipse Attacks on Bitcoin's Peer-to-Peer Network.},
author={Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon},
booktitle={USENIX Security Symposium},
pages={129--144},
year={2015}
}
@article{bahack2013theoretical,
title={Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)},
author={Bahack, Lear},
journal={arXiv preprint arXiv:1312.7013},
year={2013}
}
@article{bonneau2016buy,
title={Why buy when you can rent? Bribery attacks on Bitcoin consensus},
author={Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind},
year={2016},
publisher={Citeseer}
}
@inproceedings{neudecker2015simulation,
title={A simulation model for analysis of attacks on the bitcoin peer-to-peer network},
author={Neudecker, Till and Andelfinger, Philipp and Hartenstein, Hannes},
booktitle={Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on},
pages={1327--1332},
year={2015},
organization={IEEE}
}