[1]
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” Oct. 2008.##
|
[2]
|
I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous Distributed E-Cash from Bitcoin,” in IEEE Symposium on Security and Privacy, 2013.##
|
[3]
|
E. B. Sasson , A. Chiesa , C. Garman, M. Green, I. Miers , E. Tromer, and M. Virza, “Zerocash: Decentralized Anonymous Payments from Bitcoin,” in Symposium on Security and Privacy, 2014.##
|
[4]
|
N. Van Saberhagen, “CryptoNote v. 2.0,” [Online]. Available: https://cryptonote.org/whitepaper.pdf.##
|
[5]
|
|
[6]
|
A. Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies,” O'Reilly, 2015.##
|
[7]
|
J. Bonneau, A. Miller , J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Research Perspectives and Challenges for Bitcoin and Cryptocurrencies,” in IEEE Symposium on Security and Privacy, 2015.##
|
[8]
|
M. Moser and R. Bohme, “Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees,” in International Workshops Financial Cryptography and Data Security, 2015.##
|
[9]
|
T. Moore and N. Christin, “Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk,” in 17th International Conference Financial Cryptography and Data Security, 2013.##
|
[10]
|
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, “Bitcoin and Cryptocurrency Technologies,” Princeton University Press, Feb. 2016.##
|
[11]
|
M. Rosenfeld, “Analysis of Bitcoin Pooled Mining Reward Systems,” arXiv, 2011.##
|
[12]
|
A. Back, “Hashcash - A Denial of Service Counter-Measure,” 2002. [Online]. Available: http://www.hashcash.org/papers/hashcash.pdf.##
|
[13]
|
M. B. Taylor, “Bitcoin and the Age of Bespoke Silicon,” in International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 2013.##
|
[14]
|
A. Kampl, “Analysis of Large-Scale Bitcoin Mining Operations,” White paper, 2014.##
|
[15]
|
|
[16]
|
J. Kroll, I. C. Davey, and E. W. Felten, “The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries,” in Workshop on the Economics of Information Security 2013, 2013.##
|
[17]
|
I. Eyal, “The Miner’s Dilemma,” in Symposium on Security and Privacy, 2015.##
|
[18]
|
I. Eyal and M. G. Esirer, “Majority Is Not Enough: Bitcoin Mining Is Vulnerable,” in 18th International Conference Financial Cryptography and Data Security, 2014.##
|
[19]
|
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage, “A fistful of Bitcoins: characterizing payments among men with no names,” Commun. {ACM}, vol. 59, no. 4, pp. 86-93, 2016.##
|
[20]
|
J. Bonneau, A. Narayanan, A. Miller, J. Clark , J. A. Kroll, and E. W. Felten, “Mixcoin: Anonymity for Bitcoin with Accountable Mixes,” in 18th International Conference Financial Cryptography and Data Security, 2014.##
|
[21]
|
M. Malte, R. Böhme, and D. Breuker, “An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem,” in eCrime Researchers Summit, 2013.##
|