Hiding transaction amounts and balances in bitcoin, International Conference on Trust and Trustworthy Computing, pp.161-178, 2014. ,
Evaluating user privacy in bitcoin, International Conference on Financial Cryptography and Data Security, pp.34-51, 2013. ,
Provably secure and practical onion routing, 2012 IEEE 25th Computer Security Foundations Symposium, pp.369-385, 2012. ,
Differentially private smart metering with battery recharging, Data Privacy Management and Autonomous Spontaneous Security, pp.194-212, 2014. ,
A local-ratio theorem for approximating the weighted vertex cover problem, Annals of Discrete Mathematics, vol.25, pp.27-46, 1985. ,
Sybil-resistant mixing for bitcoin, Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp.149-158, 2014. ,
Mixcoin: Anonymity for bitcoin with accountable mixes, International Conference on Financial Cryptography and Data Security, pp.486-504, 2014. ,
How to charge lightning, 2017. ,
Onion routing circuit construction via latency graphs, Computers & Security, vol.37, pp.197-214, 2013. ,
A survey on security and privacy issues of bitcoin, IEEE Communications Surveys & Tutorials, 2018. ,
A fast and scalable payment network with bitcoin duplex micropayment channels, Symposium on SelfStabilizing Systems, pp.3-18, 2015. ,
The bitcoin P2P network, International Conference on Financial Cryptography and Data Security, pp.87-102, 2014. ,
Differential privacy: A survey of results, International Conference on Theory and Applications of Models of Computation, pp.1-19, 2008. ,
, Elements Project. c-lightning -a lightning network implementation in C, 2019.
Deanonymization in the bitcoin P2P network, Advances in Neural Information Processing Systems, pp.1364-1373, 2017. ,
Energy life-time of wireless nodes with network attacks and mitigation, 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp.1-6, 2018. ,
Research and challenges on bitcoin anonymity, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, pp.3-16, 2014. ,
When a small leak sinks a great ship: Deanonymizing tor hidden service users through bitcoin transactions analysis, 2018. ,
Double-spending fast payments in bitcoin, Proceedings of the 2012 ACM conference on Computer and communications security, pp.906-917, 2012. ,
An analysis of anonymity in bitcoin using P2P network traffic, International Conference on Financial Cryptography and Data Security, pp.469-485, 2014. ,
A new approach to deanonymization of unreachable bitcoin nodes, International Conference on Cryptology and Network Security, pp.277-298, 2017. ,
A fistful of bitcoins: characterizing payments among men with no names, Proceedings of the 2013 conference on Internet measurement conference, pp.127-140, 2013. ,
Anonymous distributed e-cash from bitcoin, Security and Privacy (SP), 2013 IEEE Symposium on, pp.397-411, 2013. ,
DOI : 10.1109/sp.2013.34
URL : http://spar.isi.jhu.edu/~mgreen/ZerocoinOakland.pdf
On identifying the causative network of an epidemic, Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pp.909-914, 2012. ,
An inquiry into money laundering tools in the bitcoin ecosystem, eCrime Researchers Summit (eCRS), pp.1-14, 2013. ,
The bitcoin lightning network: Scalable off-chain instant payments, 2015. ,
A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation, IEEE Systems Journal, vol.12, issue.1, pp.834-842, 2018. ,
Lightning factories. Cryptology ePrint Archive, 2018. ,
An analysis of anonymity in the bitcoin system, Security and privacy in social networks, pp.197-223, 2013. ,
How did dread pirate roberts acquire and protect his bitcoin wealth, International Conference on Financial Cryptography and Data Security, pp.3-15, 2014. ,
DOI : 10.1007/978-3-662-44774-1_1
URL : https://eprint.iacr.org/2013/782.pdf
Lightning Network In-Progress Specifications. BOLT 11: Invoice Protocol for Lightning Payments, 2018. ,
The lightning network daemon, 2018. ,
Zerocash: Decentralized anonymous payments from bitcoin, 2014 IEEE Symposium on Security and Privacy (SP), pp.459-474, 2014. ,
DOI : 10.1109/sp.2014.36
URL : http://cs.tau.ac.il/~tromer/papers/zerocash-oakland2014.pdf
Bitiodine: Extracting intelligence from the bitcoin network, International Conference on Financial Cryptography and Data Security, pp.457-468, 2014. ,
Odar: On-demand anonymous routing in ad hoc networks, Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on, pp.267-276, 2006. ,
Vampire attacks: draining life from wireless ad hoc sensor networks, IEEE transactions on mobile computing, vol.12, issue.2, pp.318-332, 2013. ,
DOI : 10.1109/tmc.2011.274
URL : http://people.cs.vt.edu/~irchen/6204/pdf/Vasserman-TMC13.pdf