Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
65
views
2
references
Top references
cited by
113
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,888
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography and Data Security
Quantitative Analysis of the Full Bitcoin Transaction Graph
other
Author(s):
Dorit Ron
,
Adi Shamir
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Core Readings in Statistical Mediation Analysis
Most cited references
2
Record
: found
Abstract
: not found
Book Chapter
: not found
An Analysis of Anonymity in the Bitcoin System
Fergal Reid
,
Martin Harrigan
(2013)
0
comments
Cited
94
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Report
: not found
Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace
Nicolas Christin
(2012)
0
comments
Cited
8
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 6-24
DOI:
10.1007/978-3-642-39884-1_2
SO-VID:
d0335856-8bcb-4679-8cee-00fd720c275f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Can Nature Help Us Solve Risk Management Issues?
pp. 6
Quantitative Analysis of the Full Bitcoin Transaction Graph
pp. 25
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
pp. 34
Evaluating User Privacy in Bitcoin
pp. 52
The Importance of Being Earnest [In Security Warnings]
pp. 60
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
pp. 69
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication
pp. 78
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication
pp. 96
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size
pp. 111
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
pp. 126
“Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks
pp. 144
Hey, You, Get Off of My Clipboard
pp. 162
Unique Ring Signatures: A Practical Construction
pp. 171
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
pp. 189
Accumulators and U-Prove Revocation
pp. 197
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy
pp. 205
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
pp. 213
Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault Injections
pp. 221
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study
pp. 230
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards
pp. 239
Securely Solving Simple Combinatorial Graph Problems
pp. 258
Parallel and Dynamic Searchable Symmetric Encryption
pp. 275
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
pp. 293
The Untapped Potential of Trusted Execution Environments on Mobile Devices
pp. 295
Stark
pp. 313
Risks of Offline Verify PIN on Contactless Cards
pp. 322
How to Attack Two-Factor Authentication Internet Banking
pp. 329
CAge: Taming Certificate Authorities by Inferring Restricted Scopes
pp. 338
Interdependent Privacy: Let Me Share Your Data
pp. 354
A Secure Submission System for Online Whistleblowing Platforms
pp. 362
Securing Anonymous Communication Channels under the Selective DoS Attack
pp. 371
PIRMAP: Efficient Private Information Retrieval for MapReduce
pp. 386
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates
pp. 395
Three-Factor User Authentication Method Using Biometrics Challenge Response
pp. 397
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services
pp. 399
Onions for Sale: Putting Privacy on the Market
pp. 401
Searchable Encryption Supporting General Boolean Expression Queries
pp. 402
A Privacy Preserving E-Payment Architecture
pp. 403
Communication Services Empowered with a Classical Chaos Based Cryptosystem
Similar content
5,888
Revisiting the Risks of Bitcoin Currency Exchange Closure
Authors:
Tyler Moore
,
Nicolas Christin
,
Janos Szurdi
…
Deep learning classification of bitcoin miners and exploration of upper confidence bound algorithm with less regret for the selection of honest mining
Authors:
SoK: Unraveling Bitcoin Smart Contracts
Authors:
Nicola Atzei
,
Massimo Bartoletti
,
Tiziana Cimoli
…
See all similar
Cited by
110
Blockchains and Smart Contracts for the Internet of Things
Authors:
Konstantinos Christidis
,
Michael Devetsikiotis
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Authors:
Florian Tschorsch
,
Bjorn Scheuermann
A Blockchain Research Framework
Authors:
Marten Risius
,
Kai Spohrer
See all cited by