Mixcoin: Anonymity for Bitcoin with Accountable Mixes (Englisch)
- Neue Suche nach: Bonneau, Joseph
- Neue Suche nach: Narayanan, Arvind
- Neue Suche nach: Miller, Andrew
- Neue Suche nach: Clark, Jeremy
- Neue Suche nach: Kroll, Joshua A.
- Neue Suche nach: Felten, Edward W.
- Neue Suche nach: Christin, Nicolas
- Neue Suche nach: Safavi-Naini, Reihaneh
- Neue Suche nach: Bonneau, Joseph
- Neue Suche nach: Narayanan, Arvind
- Neue Suche nach: Miller, Andrew
- Neue Suche nach: Clark, Jeremy
- Neue Suche nach: Kroll, Joshua A.
- Neue Suche nach: Felten, Edward W.
In:
Financial Cryptography and Data Security
: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
;
Kapitel: 31
;
486-504
;
2014
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Mixcoin: Anonymity for Bitcoin with Accountable Mixes
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Christin, Nicolas ( Herausgeber:in ) / Safavi-Naini, Reihaneh ( Herausgeber:in ) / Bonneau, Joseph ( Autor:in ) / Narayanan, Arvind ( Autor:in ) / Miller, Andrew ( Autor:in ) / Clark, Jeremy ( Autor:in ) / Kroll, Joshua A. ( Autor:in ) / Felten, Edward W. ( Autor:in )
-
Kongress:International Conference on Financial Cryptography and Data Security ; 2014 ; Christ Church, Barbados
-
Erschienen in:Financial Cryptography and Data Security : 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ; Kapitel: 31 ; 486-504Lecture Notes in Computer Science ; 8437 ; 486-504Security and Cryptology ; 486-504
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:09.11.2014
-
Format / Umfang:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Digital Check Forgery Attacks on Client Check Truncation SystemsGjomemo, Rigel / Malik, Hafiz / Sumb, Nilesh / Venkatakrishnan, V. N. / Ansari, Rashid et al. | 2014
- 2
-
Security Protocols and Evidence: Where Many Payment Systems FailMurdoch, Steven J. / Anderson, Ross et al. | 2014
- 3
-
The Ghosts of Banking Past: Empirical Analysis of Closed Bank WebsitesMoore, Tyler / Clayton, Richard et al. | 2014
- 4
-
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting SchemesMcCarthy, Adam / Smyth, Ben / Quaglia, Elizabeth A. et al. | 2014
- 5
-
Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing MessagesRoesner, Franziska / Gill, Brian T. / Kohno, Tadayoshi et al. | 2014
- 6
-
On the Awareness, Control and Privacy of Shared Photo MetadataHenne, Benjamin / Koch, Maximilian / Smith, Matthew et al. | 2014
- 7
-
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing SecurityMigicovsky, Alex / Durumeric, Zakir / Ringenberg, Jeff / Halderman, J. Alex et al. | 2014
- 8
-
A Secure Data Deduplication Scheme for Cloud StorageStanek, Jan / Sorniotti, Alessandro / Androulaki, Elli / Kencl, Lukas et al. | 2014
- 9
-
Confidentiality Issues on a GPU in a Virtualized EnvironmentMaurice, Clémentine / Neumann, Christoph / Heen, Olivier / Francillon, Aurélien et al. | 2014
- 10
-
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random StringsTibouchi, Mehdi et al. | 2014
- 11
-
Elliptic Curve Cryptography in PracticeBos, Joppe W. / Halderman, J. Alex / Heninger, Nadia / Moore, Jonathan / Naehrig, Michael / Wustrow, Eric et al. | 2014
- 12
-
Practical Secure Decision Tree Learning in a Teletreatment Applicationde Hoogh, Sebastiaan / Schoenmakers, Berry / Chen, Ping / op den Akker, Harm et al. | 2014
- 13
-
Scaling Private Set Intersection to Billion-Element SetsKamara, Seny / Mohassel, Payman / Raykova, Mariana / Sadeghian, Saeed et al. | 2014
- 14
-
Efficient Non-Interactive Zero Knowledge Arguments for Set OperationsFauzi, Prastudy / Lipmaa, Helger / Zhang, Bingsheng et al. | 2014
- 15
-
Garbled Searchable Symmetric EncryptionKurosawa, Kaoru et al. | 2014
- 16
-
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID DocumentsBringer, Julien / Chabanne, Hervé / Lescuyer, Roch / Patey, Alain et al. | 2014
- 17
-
A Short Paper on How to Improve U-Prove Using Self-Blindable CertificatesHanzlik, Lucjan / Kluczniak, Kamil et al. | 2014
- 18
-
Attack on U-Prove Revocation Scheme from FC’13 - Passing Verification by Revoked UsersHanzlik, Lucjan / Kluczniak, Kamil / Kutyłowski, Mirosław et al. | 2014
- 19
-
Sample or Random Security – A Security Model for Segment-Based Visual CryptographyPape, Sebastian et al. | 2014
- 20
-
You Won’t Be Needing These Any More: On Removing Unused Certificates from Trust StoresPerl, Henning / Fahl, Sascha / Smith, Matthew et al. | 2014
- 21
-
Challenges in Protecting Tor Hidden Services from Botnet AbuseHopper, Nicholas et al. | 2014
- 22
-
Identifying Risk Factors for Webserver CompromiseVasek, Marie / Moore, Tyler et al. | 2014
- 23
-
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensingShrestha, Babins / Saxena, Nitesh / Truong, Hien Thi Thu / Asokan, N. et al. | 2014
- 24
-
On the (In)Security of Mobile Two-Factor AuthenticationDmitrienko, Alexandra / Liebchen, Christopher / Rossow, Christian / Sadeghi, Ahmad-Reza et al. | 2014
- 25
-
MoP-2-MoP – Mobile Private MicrobloggingSenftleben, Marius / Bucicoiu, Mihai / Tews, Erik / Armknecht, Frederik / Katzenbeisser, Stefan / Sadeghi, Ahmad-Reza et al. | 2014
- 26
-
Privacy Preserving TâtonnementWallrabenstein, John Ross / Clifton, Chris et al. | 2014
- 27
-
Estimating Systematic Risk in Real-World NetworksLaszka, Aron / Johnson, Benjamin / Grossklags, Jens / Felegyhazi, Mark et al. | 2014
- 28
-
Majority Is Not Enough: Bitcoin Mining Is VulnerableEyal, Ittay / Sirer, Emin Gün et al. | 2014
- 29
-
BitIodine: Extracting Intelligence from the Bitcoin NetworkSpagnuolo, Michele / Maggi, Federico / Zanero, Stefano et al. | 2014
- 30
-
An Analysis of Anonymity in Bitcoin Using P2P Network TrafficKoshy, Philip / Koshy, Diana / McDaniel, Patrick et al. | 2014
- 31
-
Mixcoin: Anonymity for Bitcoin with Accountable MixesBonneau, Joseph / Narayanan, Arvind / Miller, Andrew / Clark, Jeremy / Kroll, Joshua A. / Felten, Edward W. et al. | 2014