Most Cited Blockchain Forensic Analysis Publications

FingerprintLast updated November 4th, 2017.

  1. Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system“. P Resnick, R Zeckhauser. 2002. emeraldinsight.com The Economics of the Internet and …. 2072 cites.
  2. Bitcoin and beyond: A technical survey on decentralized digital currencies“. F Tschorsch, B Scheuermann. 2016. ieeexplore.ieee.org IEEE Communications Surveys …. 80 cites.
  3. Protocols for secure electronic commerce“. MH Sherif. 2016. books.google.com . 70 cites.
  4. Cutting the gordian knot: A look under the hood of ransomware attacks“. A Kharraz, W Robertson, D Balzarotti, L Bilge…. 2015. Springer … on Detection of …. 57 cites.
  5. Bitiodine: Extracting intelligence from the bitcoin network“. M Spagnuolo, F Maggi, S Zanero. 2014. Springer International Conference on Financial …. 52 cites.
  6. Virtual currencies; Bitcoin & what now after Liberty Reserve, Silk Road, and Mt. Gox?“. LJ Trautman. 2014. papers.ssrn.com . 49 cites.
  7. Mobile security technology“. US Patent 9,014,661. 2015. Google Patents. 48 cites.
  8. Beyond Bitcoin: Issues in Regulating Blockchain Tranactions“. TI Kiviat. 2015. HeinOnline Duke LJ. 41 cites.
  9. A learned representation for artistic style“. V Dumoulin, J Shlens, M Kudlur, A Behboodi…. 2016. arxiv.org arXiv preprint arXiv …. 40 cites.
  10. Corporate governance and blockchains“. D Yermack. 2017. academic.oup.com Review of Finance. 40 cites.
  11. Information management systems on construction projects: case reviews“. N Craig, J Sommerville. 2006. emeraldinsight.com Records Management Journal. 37 cites.
  12. What will be the next records management orthodoxy?“. J Lappin. 2010. emeraldinsight.com Records Management Journal. 37 cites.
  13. Bitcoin: under the hood“. A Zohar. 2015. dl.acm.org Communications of the ACM. 28 cites.
  14. Keeping authorities” honest or bust” with decentralized witness cosigning“. E Syta, I Tamas, D Visher, DI Wolinsky…. 2016. ieeexplore.ieee.org Security and Privacy …. 26 cites.
  15. Recordkeeping informatics: re-figuring a discipline in crisis with a single minded approach“. F Upward, B Reed, G Oliver…. 2013. emeraldinsight.com Records Management …. 25 cites.
  16. Medrec: Using blockchain for medical data access and permission management“. A Azaria, A Ekblaw, T Vieira…. 2016. ieeexplore.ieee.org Open and Big Data (OBD …. 24 cites.
  17. Near zero Bitcoin transaction fees cannot last forever“. K Kaskaloglu. 2014. sdiwc.net … Conference on Digital Security and Forensics  …. 23 cites.
  18. Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial Cryptography and Data …. 23 cites.
  19. Daemon“. D Suarez. 2017. books.google.com . 16 cites.
  20. Development of RMJ: A mirror of the development of the profession and discipline of records management“. J McLeod, C Hare. 2010. emeraldinsight.com Records Management Journal. 16 cites.
  21. Security protocols and evidence: Where many payment systems fail“. SJ Murdoch, R Anderson. 2014. Springer … on Financial Cryptography and Data Security. 16 cites.
  22. A survey of P2P Network security“. L Washbourne. 2015. arxiv.org arXiv preprint arXiv:1504.01358. 15 cites.
  23. Blockchains and Bitcoin: Regulatory responses to cryptocurrencies“. A Guadamuz, C Marsden. 2015. papers.ssrn.com . 15 cites.
  24. New Private Monies: A Bit-Part Player?“. K Dowd. 2014. papers.ssrn.com . 14 cites.
  25. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage“. Y Yu, MH Au, G Ateniese, X Huang…. 2017. ieeexplore.ieee.org … Forensics and …. 13 cites.
  26. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on Dependable …. 13 cites.
  27. On the security of key extraction from measuring physical quantities“. M Edman, A Kiayias, Q Tang…. 2016. ieeexplore.ieee.org … on Information Forensics …. 12 cites.
  28. Diplomatics of born digital documents–considering documentary form in a digital environment“. C Rogers. 2015. emeraldinsight.com Records Management Journal. 11 cites.
  29. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network“. P Moreno-Sanchez, MB Zafar, A Kate. 2016. degruyter.com Proceedings on Privacy …. 11 cites.
  30. On the properties of non-media digital watermarking: a review of state of the art techniques“. AS Panah, R Van Schyndel, T Sellis, E Bertino. 2016. ieeexplore.ieee.org IEEE Access. 11 cites.
  31. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications“. TM Fernández-Caramés, P Fraga-Lamas…. 2016. mdpi.com Sensors. 11 cites.
  32. A trustless privacy-preserving reputation system“. A Schaub, R Bazin, O Hasan, L Brunie. 2016. Springer IFIP International Information …. 10 cites.
  33. Cyberspace and cybersecurity“. G Kostopoulos. 2017. books.google.com . 10 cites.
  34. Electronic Currency: The Potential Risks to National Security and Methods to Minimize Them“. GN Vovchenko, NE Tishchenko, VT Epifanova…. 2017. ersj.eu European Research …. 9 cites.
  35. Tackling the wicked problem of ERM: using the Cynefin framework as a lens“. S Childs, J McLeod. 2013. emeraldinsight.com Records Management Journal. 9 cites.
  36. Virtual Currencies: Bitcoin & What Now after Liberty Reserve, Silk Road, and Mt. Gox“. L Trautman. 2013. HeinOnline Rich. JL & Tech.. 9 cites.
  37. Bitcoin and the uniform commercial code“. JL Schroeder. 2015. HeinOnline U. Miami Bus. L. Rev.. 8 cites.
  38. BitIodine: extracting intelligence from the Bitcoin network“. M Spagnuolo. 2013. politesi.polimi.it . 8 cites.
  39. Cryptocurrency-Based Law“. M Abramaowicz. 2016. HeinOnline Ariz. L. Rev.. 8 cites.
  40. P2P Mixing and Unlinkable Bitcoin Transactions.“. T Ruffing, P Moreno-Sanchez…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …. 8 cites.
  41. Sovereign money: Beyond reserve banking“. J Huber. 2016. books.google.com . 8 cites.
  42. A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data“. A Ekblaw, A Azaria, JD Halamka…. 2016. healthit.gov … of IEEE Open & Big Data …. 7 cites.
  43. A dangerous trend of cybercrime: ransomware growing challenge“. DPB Pathak, YM Nanded. 2016. ijarcet.org … Journal of Advanced Research in Computer …. 7 cites.
  44. A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering“. Z Zhu, G Qi, Y Chai, Y Chen. 2016. mdpi.com Future Internet. 7 cites.
  45. A Wearable Revolution: Is the smartwatch the next small big thing?“. M Kracheel, W Bronzi, H Kazemi. 2014. publications.uni.lu IT ONE Magazine 2014. 7 cites.
  46. Cryptocurrencies: The Next Generation of Terrorist Financing?“. AE Brill, L Keene. 2014. papers.ssrn.com . 7 cites.
  47. The Unreasonable Effectiveness of Address Clustering“. M Harrigan, C Fretter. 2016. ieeexplore.ieee.org … Cloud and Big Data Computing, Internet …. 7 cites.
  48. An Empirical Analysis of Linkability in the Monero Blockchain“. A Miller, M Möser, K Lee, A Narayanan. 2017. arxiv.org arXiv preprint arXiv:1704.04299. 6 cites.
  49. Apple Pay, Bitcoin, and Consumers: The ABCs of Future Public Payments Law“. ME Burge. 2015. papers.ssrn.com . 6 cites.
  50. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin“. K Liao, Z Zhao, A Doupé, GJ Ahn. 2016. ieeexplore.ieee.org Electronic Crime Research …. 6 cites.
  51. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments.“. E Gaetani, L Aniello, R Baldoni, F Lombardi…. 2017. ceur-ws.org ITASEC. 6 cites.
  52. Cryptocurrencies and business ethics“. C Dierksmeier, P Seele. 2016. Springer Journal of Business Ethics. 6 cites.
  53. Cryptocurrency: how bitcoin and digital money are challenging the global economic order“. P Vigna, MJ Casey. 2015. Random House . 6 cites.
  54. International accounting standards and accounting quality in code-law countries: The case of Egypt“. IES Ebaid. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 6 cites.
  55. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation“. PP Jayaraman, X Yang, A Yavari…. 2017. Elsevier Future Generation …. 6 cites.
  56. Bitcoin block withholding attack: Analysis and mitigation“. S Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org … on Information Forensics and …. 5 cites.
  57. Bitcoin-based fair payments for outsourcing computations of fog devices“. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier Future Generation Computer …. 5 cites.
  58. Entering the matrix: the challenge of regulating Radical Leveling Technologies“. JJ Snow. 2015. calhoun.nps.edu . 5 cites.
  59. Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R Osborne, P Pacifico. 2016. eprints.mdx.ac.uk . 5 cites.
  60. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability“. X Liang, S Shetty, D Tosh, C Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …. 5 cites.
  61. The implications of economic cybercrime for policing“. M Levi, A Doig, R Gundur, D Wall, ML Williams. 2016. orca.cf.ac.uk . 5 cites.
  62. Tomorrow’s Inheritance: The Frontiers of Estate Planning Formalism“. D Horton. 2017. HeinOnline BCL Rev.. 5 cites.
  63. “Justice delayed is justice denied” Records management and the travesty of justice in South Africa“. M Ngoepe, S Makhubela. 2015. emeraldinsight.com Records Management Journal. 4 cites.
  64. A New Framework for a Novel Lattice: 3D Printers, DNA Fabricators, and the Perils in Regulating the Raw Materials of the Next Era of Revolution, Renaissance, and …“. P Jensen-Haxel. 2015. HeinOnline Wake Forest JL & Pol’y. 4 cites.
  65. Optimizing Governed Blockchains for Financial Process Authentications“. LN Lundbaek, AC D’Iddio, M Huth. 2016. arxiv.org arXiv preprint arXiv:1612.00407. 4 cites.
  66. Security of Electronic Payment Systems: A Comprehensive Survey“. S Solat. 2017. arxiv.org arXiv preprint arXiv:1701.04556. 4 cites.
  67. The Decision to Produce Altcoins: Miners’ Arbitrage in Cryptocurrency Markets“. A Hayes. 2015. papers.ssrn.com Browser Download This Paper. 4 cites.
  68. Towards automated threat intelligence fusion“. A Modi, Z Sun, A Panwar, T Khairnar…. 2016. ieeexplore.ieee.org … (CIC), 2016 IEEE …. 4 cites.
  69. A review of existing and emerging digital technologies to combat the global trade in fake medicines“. TK Mackey, G Nayyar. 2017. Taylor & Francis Expert Opinion on Drug Safety. 3 cites.
  70. A Survey on Security and Privacy Issues of Bitcoin“. M Conti, C Lal, S Ruj. 2017. arxiv.org arXiv preprint arXiv:1706.00916. 3 cites.
  71. A Traceability Analysis of Monero’s Blockchain.“. A Kumar, C Fischer, S Tople, P Saxena. 2017. eprint.iacr.org IACR Cryptology ePrint …. 3 cites.
  72. Decentralizing authorities into scalable strongest-link cothorities“. E Syta, I Tamas, D Visher…. 2015. pdfs.semanticscholar.org CoRR, abs …. 3 cites.
  73. Electronic Voting Service Using Block-Chain“. K Lee, JI James, TG Ejeta…. 2016. search.proquest.com … Journal of Digital Forensics …. 3 cites.
  74. Investment funds, shadow banking and systemic risk“. E Bengtsson. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 3 cites.
  75. Money“. J Huber. 2017. Springer Sovereign Money. 3 cites.
  76. Radical Technologies: The Design of Everyday Life“. A Greenfield. 2017. books.google.com . 3 cites.
  77. Security implications of blockchain cloud with analysis of block withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …. 3 cites.
  78. The Board’s Responsibility for Crisis Governance“. LJ Trautman. 2016. HeinOnline Hastings Bus. LJ. 3 cites.
  79. The Scandal of Money: Why Wall Street Recovers But the Economy Never Does“. G Gilder. 2016. books.google.com . 3 cites.
  80. The use of crypto-currencies in funding violent jihad“. ASM Irwin, ASM Irwin, G Milad…. 2016. emeraldinsight.com Journal of Money …. 3 cites.
  81. The WPA-Lancet Psychiatry Commission on the Future of psychiatry“. D Bhugra, A Tasman, S Pathare, S Priebe, S Smith…. 2017. Elsevier The Lancet …. 3 cites.
  82. Using crime data in academic research: issues of comparability and integrity“. A Ludwig, M Marshall. 2015. emeraldinsight.com Records Management Journal. 3 cites.
  83. Why Won’t Johnny Encrypt?“. H Orman. 2015. ieeexplore.ieee.org IEEE Internet Computing. 3 cites.
  84. A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.“. R Bazin, A Schaub, O Hasan…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …. 2 cites.
  85. A Probabilistic Nanopayment Scheme for Golem“. P Bylica, L Glen, P Janiuk, A Skrzypcaz, A Zawlocki. 2015. golemproject.net . 2 cites.
  86. Analysis of the Cryptocurrency Marketplace“. A Heid. 2013. hackmiami.org Retrieved February. 2 cites.
  87. BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments“. Q Xia, EB Sifah, A Smahi, S Amofa, X Zhang. 2017. mdpi.com Information. 2 cites.
  88. Cyber Guerilla“. J Van Haaster, R Gevers, M Sprengers. 2016. books.google.com . 2 cites.
  89. Cybersecurity problems in a typical hospital (and probably in all of them)“. H Thimbleby. 2017. cronfa.swan.ac.uk . 2 cites.
  90. Developing a comprehensive information security framework for mHealth: a detailed analysis“. N Vithanwattana, G Mapp, C George. 2017. Springer Journal of Reliable Intelligent …. 2 cites.
  91. Digital Forensics: Threatscape and Best Practices“. J Sammons. 2015. books.google.com . 2 cites.
  92. Knowledge discovery from within: An examination of records management and electronic records management syllabi“. DC Force, DC Force, J Zhang…. 2016. emeraldinsight.com Records Management …. 2 cites.
  93. Peer-to-peer law, built on Bitcoin“. MB Abramowicz. 2015. scholarship.law.gwu.edu . 2 cites.
  94. Publics and counterpublics on the front page of the internet: The cultural practices, technological affordances, hybrid economics and politics of reddit’s public …“. NJ Springer. 2015. search.proquest.com . 2 cites.
  95. Real-time digital signatures for time-critical networks“. AA Yavuz, A Mudgerikar, A Singla…. 2017. ieeexplore.ieee.org … Forensics and …. 2 cites.
  96. Research Ideas for Artificial Intelligence in Auditing: The Formalization of Audit and Workforce Supplementation“. H Issa, T Sun, MA Vasarhelyi. 2016. aaajournals.org Journal of Emerging Technologies …. 2 cites.
  97. Rich Credentials for Remote Identity Proofing“. K Lewison, F Corella. 2016. pomcor.com . 2 cites.
  98. Scaling SPADE to “Big Provenance”“. A Gehani, H Kazmi, H Irshad. 2016. usenix.org … of the 8th USENIX Conference on Theory …. 2 cites.
  99. Scoping: Exploring a collective R&D process for entrepreneurs, microenterprises, and SMEs“. S COULSON, M WOODS. 2016. discovery.dundee.ac.uk the Proceedings of the 20th DMI …. 2 cites.
  100. Silicon to syringe: Cryptomarkets and disruptive innovation in opioid supply chains“. M Gilbert, N Dasgupta. 2017. Elsevier International Journal of Drug Policy. 2 cites.
  101. Social Palimpsests–Clouding the Lens of the Personal Panopticon“. N SHADBOLT. 2014. books.google.com … Yearbook 2014: Social Networks and Social …. 2 cites.
  102. Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks“. J Dilley, A Poelstra, J Wilkins, M Piekarska…. 2016. arxiv.org arXiv preprint arXiv …. 2 cites.
  103. Sustainability of bitcoin and blockchains“. H Vranken. 2017. Elsevier Current Opinion in Environmental Sustainability. 2 cites.
  104. Systems and methods for executing cryptographically secure transactions using voice and natural language processing“. MS Meadows. 2015. Google Patents US Patent App. 14/668,882. 2 cites.
  105. The Alpha Engine: Designing an Automated Trading Algorithm“. A Golub, J Glattfelder, RB Olsen. 2017. papers.ssrn.com . 2 cites.
  106. The Anthropocene, resilience and post-colonial computation“. D McQuillan. 2017. Taylor & Francis Resilience. 2 cites.
  107. the Deep Web“. V Ciancaglini, M Balduzzi, R McArdle, M Rösler. 2015. trendmicro.nl Trend Micro. 2 cites.
  108. The economics of crypto-democracy“. DWE Allen, C Berg, AM Lane, J Potts. 2017. papers.ssrn.com . 2 cites.
  109. Towards self-sovereign identity using blockchain technology“. DS Baars. 2016. essay.utwente.nl . 2 cites.
  110. Trust Implications of DDoS Protection in Online Elections“. C Culnane, M Eldridge, A Essex, V Teague. 2017. Springer … Joint Conference on …. 2 cites.
  111. Virtual currencies and the implications for US anti-money laundering regulations“. BA Pamplin. 2014. search.proquest.com . 2 cites.
  112. What happened to global banking after the crisis?“. D Schoenmaker, D Schoenmaker. 2017. emeraldinsight.com Journal of Financial …. 2 cites.
  113. A forensic look at Bitcoin cryptocurrency“. MD Doran. 2014. search.proquest.com . 1 cites.
  114. An Analysis of Attacks on Blockchain Consensus“. G Bissias, BN Levine, AP Ozisik…. 2016. arxiv.org arXiv preprint arXiv …. 1 cites.
  115. An Efficient E2E Verifiable E-voting System without Setup Assumptions“. A Kiayias, T Zacharias, B Zhang. 2017. ieeexplore.ieee.org IEEE Security & Privacy. 1 cites.
  116. An Introduction to the Blockchain and Its Implications for Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical Reference Services Quarterly. 1 cites.
  117. Anonymity Properties of the Bitcoin P2P Network“. G Fanti, P Viswanath. 2017. arxiv.org arXiv preprint arXiv:1703.08761. 1 cites.
  118. As technology goes democratic, nations lose military control“. B FitzGerald, J Parziale. 2017. Taylor & Francis Bulletin of the Atomic Scientists. 1 cites.
  119. Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks“. C Wressnegger, K Freeman, F Yamaguchi…. 2017. dl.acm.org … of the 2017 ACM on Asia …. 1 cites.
  120. Autonomous Weapon Systems and Strategic Stability“. J Altmann, F Sauer. 2017. iiss.tandfonline.com Survival. 1 cites.
  121. BITCOIN COMO ALTERNATIVA TRANSVERSAL DE INTERCAMBIO MONETARIO EN LA ECONOMÍA DIGITAL“. ZJP Cárdenas, MAV Avellaneda…. 2015. revistas.udistrital.edu.co Redes de …. 1 cites.
  122. Bitcoin, the Law and Emerging Public Policy: Towards a 21st Century Regulatory Scheme“. GM Karch. 2014. HeinOnline Fla. A & M UL Rev.. 1 cites.
  123. Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)“. ST Ali. 2015. Springer Cambridge International Workshop on Security …. 1 cites.
  124. BitIodine: Extracting Intelligence from the Bitcoin Network“. F Maggi, S Zanero, M Spagnuolo. 2014. . 1 cites.
  125. Cloud as a Service: Understanding the Service Innovation Ecosystem“. E Castro-Leon, R Harmon. 2016. books.google.com . 1 cites.
  126. Conflict of Laws Cross to Public International Laws: The Conflicting Models in the Conceptualisation of Disability Rights Under International Humanitarian Law and …“. I Mugabi. 2015. papers.ssrn.com . 1 cites.
  127. Cyberinsurance Value Generator or Cost Burden?“. SK Ishaq, C CISA. 2016. isaca.org . 1 cites.
  128. Data Analytics and Big Data: Opportunity or Threat for the Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos, C Wong. 2016. papers.ssrn.com . 1 cites.
  129. Dealer, Hacker, Lawyer, Spy. Modern Techniques and Legal Boundaries of Counter-cybercrime Operations“. K Bojarski. 2015. academia.edu The European Review of Organised Crime. 1 cites.
  130. Digital diplomatics and forensics: going forward on a global basis“. FB Cohen. 2015. emeraldinsight.com Records Management Journal. 1 cites.
  131. Digital diplomatics and measurement of electronic public data qualities: What lessons should be learned?“. B Makhlouf Shabou. 2015. emeraldinsight.com Records Management Journal. 1 cites.
  132. Digital Preservation: From Possible to Practical“. G Dingwall. 2017. books.google.com Currents of Archival Thinking. 1 cites.
  133. Disrupting Agents, Distributing Agency“. CHP Zuckerman. 2017. books.google.com Distributed Agency. 1 cites.
  134. How companies achieve balance between technology enabled innovation and cyber-security“. NNN Nelson. 2016. dspace.mit.edu . 1 cites.
  135. Incentivizing blockchain forks via whale transactions“. K Liao, J Katz. 2017. cs.umd.edu Bitcoin Workshop. 1 cites.
  136. Information Security and Privacy“. JK Liu, R Steinfeld. 2007. Springer . 1 cites.
  137. Macroprudential policy–closing the financial stability gap“. S Fahr, S Fahr, J Fell, J Fell. 2017. emeraldinsight.com Journal of Financial Regulation …. 1 cites.
  138. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain“. Q Xia, EB Sifah, KO Asamoah, J Gao, X Du…. 2017. ieeexplore.ieee.org IEEE …. 1 cites.
  139. MOBILE SECURITY TECHNOLOGY“. C Decharms. 2016. freepatentsonline.com US Patent 20,160,192,166. 1 cites.
  140. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users“. A Fu, S Yu, Y Zhang, H Wang…. 2017. ieeexplore.ieee.org IEEE Transactions on Big …. 1 cites.
  141. Object-oriented diplomatics: Using archival diplomatics in software application development to support authenticity of digital records“. A Jansen. 2015. emeraldinsight.com Records Management Journal. 1 cites.
  142. P2P Mixing and Unlinkable P2P Transactions“. P Moreno-Sanchez, T Ruffing, A Kate. 2016. pdfs.semanticscholar.org Draft, June. 1 cites.
  143. Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging“. Z Chen, Y Zhu. 2017. ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE …. 1 cites.
  144. Preserving the Archival Bond in Distributed Ledgers: A Data Model and Syntax“. VL Lemieux, M Sporny. 2017. dl.acm.org … of the 26th International Conference on World …. 1 cites.
  145. Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts“. F Knirsch, A Unterweger, G Eibl, D Engel. 2018. Springer Sustainable Cloud and Energy …. 1 cites.
  146. Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. researchgate.net Proceedings of the International …. 1 cites.
  147. Revisiting the effect of regulation, supervision and risk on banking performance: Evidence from European banks based on PSTR model“. H Rachdi, F Ben Bouheni. 2016. emeraldinsight.com Journal of Financial Regulation and …. 1 cites.
  148. Securing Claim Data via Block-Chains for a Peer to Peer Platform“. W Slavin. 2016. Google Patents US Patent App. 15/004,702. 1 cites.
  149. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes“. MA Ferrag, L Maglaras, A Argyriou…. 2017. arxiv.org arXiv preprint arXiv …. 1 cites.
  150. Short selling and the development of anti-shorting laws in the UK“. A Mohamad. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 1 cites.
  151. Software independence revisited“. RL Rivest, M Virza. 2017. people.csail.mit.edu … -World Electronic Voting: Design, Analysis …. 1 cites.
  152. Solving Modern Crime in Financial Markets: Analytics and Case Studies“. MC Frunza. 2015. books.google.com . 1 cites.
  153. System and method for data management structure using auditable delta records in a distributed environment“. S Grefen, A Jaehde, D Mackie. 2016. Google Patents US Patent App. 15/367,873. 1 cites.
  154. The 21st Century Case for Gold: A New Information Theory of Money“. G Gilder. 2016. thescienceexperience.org . 1 cites.
  155. The Adoption Process of Cryptocurrencies-Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective“. HF Spenkelink. 2014. essay.utwente.nl . 1 cites.
  156. The Challenge of Bitcoin Pseudo-Anonymity to Computer Forensics“. EJ Imwinkelried, J Luu. 2015. papers.ssrn.com . 1 cites.
  157. The crowdjury, a crowdsourced justice system for the collaboration era“. F Ast, A Sewrjugin. 2015. weusecoins.com . 1 cites.
  158. The measurement and regulation of shadow banking in Ireland“. J Stewart, J Stewart, C Doyle…. 2017. emeraldinsight.com Journal of Financial …. 1 cites.
  159. The New Market Manipulation“. TCW Lin. 2016. HeinOnline Emory LJ. 1 cites.
  160. The Tao of open source intelligence“. S Bertram. 2015. books.google.com . 1 cites.
  161. Time intervals as a Behavioral Biometric“. JV Monaco. 2015. researchgate.net . 1 cites.
  162. Towards an internet of trust: issues and solutions for identification and authentication in the internet of things“. M Signorini. 2015. tdx.cat . 1 cites.
  163. Tracking digital footprints: anonymity within the bitcoin system“. P Reynolds, P Reynolds, ASM Irwin…. 2017. emeraldinsight.com Journal of Money …. 1 cites.
  164. Uncoupling the relationship between corruption and money laundering crimes“. N Mugarura. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 1 cites.
  165. Virtual Currencies and Fundamental Rights“. C Rueckert. 2016. papers.ssrn.com Browser Download This Paper. 1 cites.
  166. Visualization and Data Provenance Trends in Decision Support for Cybersecurity“. J Garae, RKL Ko. 2017. Springer Data Analytics and Decision Support for Cybersecurity. 1 cites.
  167. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies“. S Goldfeder, H Kalodner, D Reisman…. 2017. arxiv.org arXiv preprint arXiv …. 1 cites.
  168. Точки экономического и инновационного роста: модель организации эффективного функционирования региона“. ДД Буркальцева. 2017. cyberleninka.ru МИР (Модернизация. Инновации. Развитие). 1 cites.
  169. “SMART” CONTRACT MARKETS: TRADING DERIVATIVES CONTRACTS ON THE BLOCKCHAIN“. TI KIVIAT. 2015. pdfs.semanticscholar.org . 0 cites.
  170. 11th USENIX Symposium on Networked Systems Design and Implementation“. S IX. 2016. enigma.usenix.org . 0 cites.
  171. 12 Social media’s impact on intellectual property rights“. D Collopy. 2017. books.google.com Handbook of Research on Counterfeiting and Illicit …. 0 cites.
  172. 3TH1CS: A reinvention of ethics in the digital age?“. P Otto, E Gräf. 2017. iRights Media . 0 cites.
  173. 4.25 Chromatic index/edge coloring“. M Lewenstein, S Pettie…. 2017. vesta.informatik.rwth-aachen.de … and Hardness in …. 0 cites.
  174. 4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy …“. PH Jones, KM Dye. 2016. dtic.mil . 0 cites.
  175. 4-D printing (four-dimensional printing)“. A Rajey. 0. tngconsultores.com. 0 cites.
  176. A Bibliography of O’Reilly & Associates and O’Reilly Media. Inc. Publishers“. NHF Beebe. 2017. 155.101.98.136 . 0 cites.
  177. A blockchain future to Internet of Things security: A position paper“. M Banerjee, J Lee, KKR Choo. 2017. Elsevier Digital Communications and Networks. 0 cites.
  178. A Block-Chain Implemented Voting System“. F Caiazzo, M Chow. 2016. cs.tufts.edu . 0 cites.
  179. A Comprehensive Insight towards Research Direction in Information Propagation“. N Kayarvizhy. 0. researchgate.net. 0 cites.
  180. A conceptual framework for the Basel accords-based regulation“. J Mohammed Ahmed. 2016. emeraldinsight.com Journal of Financial Regulation and …. 0 cites.
  181. A Cross-Sectional Overview of Cryptoasset Governance and Implications for Investors“. N Carter. 0. coinmetrics.io. 0 cites.
  182. A Distributed Public Key Infrastructure for the Web Backed by a Blockchain“. B Fredriksson. 2017. diva-portal.org . 0 cites.
  183. A Distributed X. 509 Public Key Infrastructure Backed by a Blockchain“. B Fredriksson. 2017. helix.stormhub.org . 0 cites.
  184. A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS“. C Zhao, Y Guan. 2015. Springer IFIP International Conference on Digital Forensics. 0 cites.
  185. A novel method to authenticate in website using CAPTCHA‐based validation“. SK Krishnamoorthy…. 2016. Wiley Online Library Security and …. 0 cites.
  186. A platform for end-to-end mobile application infrastructure analytics using system log correlation“. V Ramakrishna, N Rajput…. 2017. ieeexplore.ieee.org IBM Journal of …. 0 cites.
  187. A proposal to improve the authentication process in m-health environments“. FD Guillén-Gámez, I García-Magariño…. 2017. ieeexplore.ieee.org IEEE …. 0 cites.
  188. A restful e-health interoperability platform: case of Nairobi County health facilities“. DK Rono. 2016. su-plus.strathmore.edu . 0 cites.
  189. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications“. S Rostampour, N Bagheri, M Hosseinzadeh…. 2017. Springer The Journal of …. 0 cites.
  190. A study of Bitcoin as a currency for email-based micro-transactions“. B Eriksson. 2016. diva-portal.org . 0 cites.
  191. A Survey on FinTech“. K Gai, M Qiu, X Sun. 2017. Elsevier Journal of Network and Computer Applications. 0 cites.
  192. A Text-Independent Speaker Authentication System for Mobile Devices“. F Thullier, B Bouchard, BAJ Menelas. 2017. mdpi.com Cryptography. 0 cites.
  193. Adaptation 12 strategies of cybercriminals to interventions from public and private sectors“. F Jansen, J van Lenthe. 2016. books.google.com Cybercrime Through an Interdisciplinary …. 0 cites.
  194. Advance Program“. P MobiApps, E SNAMS, ABA SITA. 2016. ficloud.org . 0 cites.
  195. Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30-February 1, 2017, Revised Selected Papers“. G Peterson, S Shenoi. 2017. books.google.com . 0 cites.
  196. Advances in Internetworking, Data & Web Technologies: The 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT …“. L Barolli, M Zhang, XA Wang. 2017. books.google.com . 0 cites.
  197. Algorithmic governance: Developing a research agenda through the power of collective intelligence“. J Danaher, MJ Hogan, C Noone…. 2017. journals.sagepub.com Big Data & …. 0 cites.
  198. Alumni US“. JP Mitrovic. 2010. alumnius.net The Center for Leadership Studies Network at the …. 0 cites.
  199. Amazon Cloud Journal“. PR Newswire. 0. amazon.ulitzer.com. 0 cites.
  200. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road“. N Bilton. 2017. books.google.com . 0 cites.
  201. American Kingpin: The Epic Hunt for the Criminal Mastermind behind the Silk Road Drugs Empire“. N Bilton. 2017. Random House . 0 cites.
  202. An Analysis of Energy and Hardware Impacts on the Bitcoin Mining Network“. J LEE, Y KIM. 0. jakehlee.com. 0 cites.
  203. An approach for initiating interventions for bank recovery“. CAE Goodhart, CAE Goodhart…. 2017. emeraldinsight.com Journal of Financial …. 0 cites.
  204. An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“. K Markantonakis. 2017. books.google.com Trust, Privacy and Security in Digital Business …. 0 cites.
  205. An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“. C Shepherd, FAP Petitcolas, RN Akram…. 2017. Springer … Conference on Trust …. 0 cites.
  206. An Innovative Merger of Academe and Corporation: A Non-Thesis Distance Computing Masters’ Degree with IBM Open Badging Technologies“. RF Roggio, K Shaik. 2017. search.proquest.com International Conference on Computer …. 0 cites.
  207. Analysis of Bitcoin Transaction Flows to Reveal Usage and Geographic Patterns“. SP Bissessar. 2013. nicolascourtois.com The New York Times. 0 cites.
  208. Analysis of Present Day Election Processes Vis-À-Vis Elections Through Blockchain Technology“. K Hegadekatti. 2017. papers.ssrn.com . 0 cites.
  209. Analysis of the impact of technological advances on financial institutions“. MJ Michalow. 2016. search.proquest.com . 0 cites.
  210. and the Chair of the Applied Economics Department at the Sapir Academic College. His main areas of interest are innovation and high-tech policy, economic growth …“. R Bar-El. 2017. emeraldinsight.com Human Capital and Assets in the Networked World. 0 cites.
  211. Arbitrage and International Trade and Finance“. K Doshi. 2017. qrius.com Science. 0 cites.
  212. Artificial Intelligence and Blockchains in financial services. Potential applications, challenges, and risks“. A Shet Shirodkar. 2017. content.grin.com . 0 cites.
  213. Artificial Intelligence–Fact or Fiction“. KVN Rajesh, KVN Ramesh. 2012. csi-india.org Computing NaNo. 0 cites.
  214. Authenticated Data Redaction with Fine-Grained Control“. J Ma, J Liu, X Huang, Y Xiang…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 0 cites.
  215. Authorization by Documents“. H Sato. 2017. jstage.jst.go.jp Journal of Information Processing. 0 cites.
  216. Automated Workflow Scheduling in Self-Adaptive Clouds: Concepts, Algorithms and Methods“. G Kousalya, P Balakrishnan, CP Raj. 2017. Springer . 0 cites.
  217. Automating the accounts payable process“. M Heusser. 0. tngconsultores.com. 0 cites.
  218. Automating the accounts payable process“. M Heusser. 0. tngconsultores.com. 0 cites.
  219. Backchanneling Quantum Bit (Qubit)’Shuffling’: Quantum Bit (Qubit)’Shuffling’as Added Security by Slipstreaming Q-Morse“. J Ronczka. 2016. ieeexplore.ieee.org Computer Science and Engineering (APWC on …. 0 cites.
  220. Bare Feet Pat The Earth: Hardships, Future And Legislations For The Salt Pan Workers In Kutch“. K Doshi. 2017. qrius.com Science. 0 cites.
  221. Big Data Analytics: Opportunity or Threat for the Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos…. 2017. aaajournals.org Journal of Information …. 0 cites.
  222. Big Data on Ulitzer“. M Walker, K Irwin. 0. bigdata.ulitzer.com. 0 cites.
  223. Big Data Orchestration as a Service Network“. C Esposito, A Castiglione…. 2017. ieeexplore.ieee.org IEEE Communications …. 0 cites.
  224. Bioengineering and biocrime“. V Sutton. 2017. books.google.com The Routledge Handbook of Technology, Crime and …. 0 cites.
  225. Bitcoin as an investment asset: The added value of bitcoin in a global market portfolio“. S Klabbers. 2017. theses.ubn.ru.nl . 0 cites.
  226. Bitcoin forensics: a tutorial“. D Neilson, S Hara, I Mitchell. 2017. Springer … Conference on Global Security, Safety, and …. 0 cites.
  227. Bitcoin regulations and investigations: A proposal for US policies“. JP Fawcett. 2017. search.proquest.com . 0 cites.
  228. Bitcoin: Between Digital Currency and Financial Commodity“. ML Perugini, C Maioli. 2014. papers.ssrn.com . 0 cites.
  229. Bitcoin: Pyramid-scheme Wildfire, New Online Payment Medium, or Future Alternative Currency?“. H Vozak. 0. dspace.cuni.cz. 0 cites.
  230. BITCOIN-BANKING AND TECHNOLOGICAL CHALLENGES“. G Kunjadić. 0. . 0 cites.
  231. BitIodine: Extracting Intelligence from the Bitcoin Network“. D NECSTLab. 2014. books.google.com Financial Cryptography and Data Security: 18th …. 0 cites.
  232. BLOCK CHAIN BASED DATA LOGGING AND INTEGRITY MANAGEMENT SYSTEM FOR CLOUD FORENSICS“. JH Park, JY Park, EN Huh. 0. pdfs.semanticscholar.org. 0 cites.
  233. Blockchain and Distributed Ledgers as Trusted Recordkeeping Systems“. VL Lemieux. 0. researchgate.net. 0 cites.
  234. Blockchain as an Audit-Able Communication Channel“. S Suzuki, J Murai. 2017. ieeexplore.ieee.org Computer Software and Applications …. 0 cites.
  235. Blockchain as an enabler for public mHealth solutions in South Africa“. M WEISS, A BOTHA, M HERSELMAN, G LOOTS. 0. researchgate.net. 0 cites.
  236. Blockchain entrepreneurship opportunity in the practices of the unbanked“. GJ Larios-Hernández. 2017. Elsevier Business Horizons. 0 cites.
  237. Blockchain Explorer: An Analytical Process and Investigation Environment for Bitcoin“. H Kuzuno, C Karam. 0. ieeexplore.ieee.org. 0 cites.
  238. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security“. M Mylrea, SNG Gourisetti. 2017. ieeexplore.ieee.org Resilience Week (RWS), 2017. 0 cites.
  239. Blockchain for the people: Blockchain technology as the basis for a secure and reliable e-voting system“. M Kovic. 2017. osf.io . 0 cites.
  240. Blockchain or not blockchain, that is the question of the insurance and other sectors“. F Lamberti, V Gatteschi, C Demartini…. 2017. ieeexplore.ieee.org IT …. 0 cites.
  241. Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions“. JH Park, JH Park. 2017. mdpi.com Symmetry. 0 cites.
  242. Blockchain: Emergent Industry Adoption and Implications for Accounting“. J Kokina, R Mancha…. 2017. aaajournals.org Journal of Emerging …. 0 cites.
  243. Blockchain: Vision and Challenges“. G Caglar, YS Hanay. 2016. internetinitiative.ieee.org Newsletter. 0 cites.
  244. Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms“. A Judmayer, N Stifter, K Krombholz…. 2017. morganclaypool.com Synthesis Lectures on …. 0 cites.
  245. BlockSci: Design and applications of a blockchain analysis platform“. H Kalodner, S Goldfeder, A Chator, M Möser…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
  246. Bobbies on the net: a police workforce for the digital age“. A Hitchcock, R Holmes, E Sundorph. 2017. reform.uk . 0 cites.
  247. Breaking Data as a Service News“. PR Newswire. 0. daas.ulitzer.com. 0 cites.
  248. Breaking van Gogh: Saint-Rémy, Forgery, and the $95 Million Fake at the Met“. JO Grundvig. 2016. books.google.com . 0 cites.
  249. Buying Votes in the 21st Century: The Potential Use of Bitcoins and Blockchain Technology in Electronic Voting Reform“. B Bogucki. 2017. HeinOnline Asper Rev. Int’l Bus. & Trade L.. 0 cites.
  250. by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o Milestones. 0. tngconsultores.com. 0 cites.
  251. by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o Milestones. 0. tngconsultores.com. 0 cites.
  252. Call for Participants“. JPY Regular, FT Student. 0. jstage.jst.go.jp. 0 cites.
  253. Career Summary“. BM David. 0. bmdavid.com. 0 cites.
  254. CEOs in Technology“. FDA First. 0. ceo.ulitzer.com. 0 cites.
  255. CHANGE HISTORY“. S Martín. 0. truessec.eu. 0 cites.
  256. Changing the Practice of Law Leadership“. K Grady. 0. seytlines.com. 0 cites.
  257. Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime?“. P Amann, A Klayn, G Mounier. 2017. ingentaconnect.com Cyber Security: A Peer …. 0 cites.
  258. Characterization of Counterfeit and Substandard Medicines Using Capillary Electrophoresis“. JSS Rudaz. 2016. chromatographyonline.com . 0 cites.
  259. Child abuse materials as digital goods: Why we should fear new commercial forms“. KV Acar. 2017. econstor.eu . 0 cites.
  260. Chuncan Deng, Cheng Yang, Fangyong Xiao, Dajie Suolang and Wenshan She. Accurate Recognition and Extraction of Massive Device Monitoring Signals Based …“. AR Arban Uka, O Tahan, R Hawchar, F Matar. 0. ieeexplore.ieee.org Algorithms. 0 cites.
  261. Cloud as a Service“. E Castro-Leon, R Harmon. 0. Springer. 0 cites.
  262. Cloud Computing as a Service“. E Castro-Leon, R Harmon. 2016. Springer Cloud as a Service. 0 cites.
  263. Cloud Storage: Background and Related Work“. J Reardon. 2016. Springer Secure Data Deletion. 0 cites.
  264. Command Disaggregation Attack and Mitigation in Industrial Internet of Things“. P Xun, PD Zhu, YF Hu, PS Cui, Y Zhang. 2017. mdpi.com Sensors. 0 cites.
  265. Cómo funciona blockchain: Una explicación infográfica“. E McLaughlin. 0. tngconsultores.com. 0 cites.
  266. Computer Security–ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings“. SN Foley, D Gollmann, E Snekkenes. 2017. books.google.com . 0 cites.
  267. CONNECTING MULTIPLE DEVICES WITH BLOCKCHAIN IN THE INTERNET OF THINGS“. JJ Karst, G Brodar. 0. courses.cs.ut.ee. 0 cites.
  268. Conspiracy Theories and Their Investigator (s), Matthew RX Dentith“. MRX Dentith. 0. social-epistemology.com. 0 cites.
  269. Constructing Narrative in the Contemporary Music Industries“. K Barr. 2017. joebennett.net Presented at IASPM. 0 cites.
  270. Contemplating human-centred security & privacy research: Suggesting future directions“. K Renaud, S Flowerday. 2017. Elsevier Journal of Information Security and Applications. 0 cites.
  271. Contributions to Content Placement, Load-balancing and Caching: System Design and Security“. C Neumann. 2016. hal.inria.fr . 0 cites.
  272. Controlling Cyberspace“. D Lewis. 2017. qrius.com History. 0 cites.
  273. Critical analysis and comparison of data protection techniques for genomics data sets“. D Naro. 2016. upcommons.upc.edu . 0 cites.
  274. CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing“. M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, J Liu. 0. eprint.iacr.org. 0 cites.
  275. Cryptocurrency the new money laundering problem for banking, law enforcement, and the legal system“. T Jacquez. 2016. search.proquest.com . 0 cites.
  276. Cryptographic Key Management in Delay Tolerant Networks: A Survey“. SA Menesidou, V Katos, G Kambourakis. 2017. mdpi.com Future Internet. 0 cites.
  277. Cryptography“. B Buchanan. 2017. books.google.com . 0 cites.
  278. Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing“. A Haouari, Z Mostapha, S Yassir. 2018. igi-global.com Cloud Computing Technologies for …. 0 cites.
  279. Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings“. S Wen, W Wu, A Castiglione. 2017. books.google.com . 0 cites.
  280. Cyber-und Computerkriminalität: Prüfung doloser Handlungen“. A Sowa. 2017. Springer Management der Informationssicherheit. 0 cites.
  281. Cyrilic encryption based image Steganography algorithm“. V Shah. 2017. irjet.net . 0 cites.
  282. D4. 1 Findings on economic modelling of malware as business model“. D Hurley-Smith. 0. . 0 cites.
  283. Damon Liwanu McCoy“. CAD Grunwald, D Sicker. 0. pdfs.semanticscholar.org. 0 cites.
  284. Darknet Forensics“. D Rathod. 0. ijettcs.org future. 0 cites.
  285. Data and the City“. R Kitchin, TP Lauriault, G McArdle. 2017. books.google.com . 0 cites.
  286. Data provenance assurance in the cloud using blockchain“. S Shetty, V Red, C Kamhoua, K Kwiat…. 2017. spiedigitallibrary.org … in Sensors and …. 0 cites.
  287. Decentralized enforcement of document lifecycle constraints“. S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone. 2017. Elsevier Information Systems. 0 cites.
  288. DECIPHERING CRYPTOCURRENCY: SHINING A LIGHT ON THE DEEP DARK WEB“. C DiPiero. 2017. litigation-essentials.lexisnexis.com U. Ill. L. Rev.. 0 cites.
  289. Deep web: Challenges of catching the cyber criminal“. N Williamson. 2014. search.proquest.com . 0 cites.
  290. Defence Against Terrorism Review-DATR“. A Richards. 0. researchgate.net. 0 cites.
  291. Defining cybercrime based on roles of data processing systems“. X Li. 2016. search.informit.com.au Pandora’s Box. 0 cites.
  292. Deliverable D5. 2.1-Conception Exploitation plan“. P Meyer, M Weinrich, S Custic, D Tofan, W Tremmel…. 0. acdc-project.eu. 0 cites.
  293. De-SAG: On the De-anonymization of Structure-Attribute Graph Data“. S Ji, T Wang, J Chen, W Li, P Mittal…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 0 cites.
  294. Developing an adaptive Risk-based access control model for the Internet of Things“. HF Atlam, A Alenezi, RJ Walters, GB Wills, J Daniel. 2017. researchgate.net . 0 cites.
  295. Development of Secure and Reliable Techniques for Data Communication“. A Mileva, P RM Inácio, S Bouyuklieva, N Stojkovic…. 2017. eprints.ugd.edu.mk . 0 cites.
  296. Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis) Used by Carders on Cryptomarkets“. GJ van Hardeveld, C Webber…. 2017. journals.sagepub.com American Behavioral …. 0 cites.
  297. Digital Currencies: Unlocking the Secrets of Crypto-Currencies“. D Peterson. 2017. books.google.com . 0 cites.
  298. Digital Currency: Risks, Rewards and Investigative Techniques“. P Kraus. 2017. search.proquest.com . 0 cites.
  299. Digital Forensic Implications of Collusion Attacks on the Lightning Network“. D Piatkivskyi, S Axelsson, M Nowostawski. 2017. Springer … on Digital Forensics. 0 cites.
  300. Digital forensics: The smart person’s guide“. D Patterson. 0. tngconsultores.com. 0 cites.
  301. Digital forensics: The smart person’s guide“. D Patterson. 0. tngconsultores.com. 0 cites.
  302. Digital image integrity–a survey of protection and verification techniques“. P Korus. 2017. Elsevier Digital Signal Processing. 0 cites.
  303. Digital Watermarking of Non-media data stream (applications)“. A Soltani Panah. 2017. researchbank.rmit.edu.au . 0 cites.
  304. Digital Witness and Privacy in IoT: Anonymous Witnessing Approach“. A Nieto, R Rios, J Lopez. 2017. ieeexplore.ieee.org Trustcom/BigDataSE/ICESS, 2017 …. 0 cites.
  305. Digitaler Tatort, Sicherung und Verfolgung digitaler Spuren“. D Pawlaszczyk. 2017. Springer Forensik in der digitalen Welt: Moderne Methoden der …. 0 cites.
  306. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things“. M Henze, B Wolters, R Matzutt…. 2017. ieeexplore.ieee.org … /ICESS, 2017 IEEE. 0 cites.
  307. Do vouchers make a difference? A study of vouchers for improving organizational capabilities in firms“. E Magro. 2016. delegia.com EU-SPRI CONFERENCE LUND 2016. 0 cites.
  308. Don’t Dirty Green!“. R Suryaprakash. 2017. qrius.com Science. 0 cites.
  309. ED TECH TRENDS TO WATCH“. HOWABR LED. 0. pdf.101com.com. 0 cites.
  310. Efficient private subset computation“. J Dou, L Gong, S Li, L Ma. 2016. Wiley Online Library Security and Communication …. 0 cites.
  311. Electronic finance–recent developments“. K Dandapani, K Dandapani. 2017. emeraldinsight.com Managerial Finance. 0 cites.
  312. Emergence of Fintech and cybersecurity in a global financial centre: Strategic approach by a regulator“. AW Ng, AW Ng, BKB Kwok…. 2017. emeraldinsight.com Journal of Financial …. 0 cites.
  313. Encyclopedia of Cyber Warfare“. PJ Springer. 2017. books.google.com . 0 cites.
  314. Energy-Efficient Distance-Bounding with Residual Charge Computation“. Y Zhuang, A Yang, GP Hancke…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 0 cites.
  315. Enhancing Breeder Document Long-Term Security Using Blockchain Technology“. N Buchmann, C Rathgeb, H Baier…. 2017. ieeexplore.ieee.org … ), 2017 IEEE 41st …. 0 cites.
  316. Enhancing National Cybersecurity: The Current and Future States of Cybersecurity in the Digital Economy“. T Patterson, E Liebig, R Sapp, B Searcy, D Desai…. 0. nist.gov. 0 cites.
  317. Establishing Governance for Hybrid Cloud and the Internet of Things“. M Wolfe. 2016. books.google.com Handbook of Research on End-to-End Cloud …. 0 cites.
  318. Europe and MENA Cooperation Advances in Information and Communication Technologies“. Á Rocha, M Serrhini, C Felgueiras. 2017. Springer . 0 cites.
  319. Evolution of bitcoin and security risk in bitcoin wallets“. PK Kaushal, A Bagga, R Sobti. 2017. ieeexplore.ieee.org … and Electronics (Comptelix) …. 0 cites.
  320. Examining the forensic artifacts produced by use of bitcoin currency“. LD Jones. 2014. search.proquest.com . 0 cites.
  321. Exploring the Essence of Records Management, Engaging with Experts: Proceedings“. R Barry. 2007. emeraldinsight.com Records Management Journal. 0 cites.
  322. FBI DIRECTOR COMEY NOT QUALIFIED TO DECIDE ON HILLARY EMAILGATE-REWROTE LAW“. U CONFLICT, HISM CLINTON. 0. fbcoverup.com. 0 cites.
  323. FDA News“. PR Newswire. 0. fda.ulitzer.com. 0 cites.
  324. Financial Stability Governance Today: A Job Half Done“. A Large. 0. group30.org. 0 cites.
  325. Forenzní analýza sítě Bitcoin“. PBT DROZDA, V VESELÝ. 2016. itspy.cz . 0 cites.
  326. Four tips for effective software testing“. RF Goldsmith. 0. tngconsultores.com. 0 cites.
  327. From show on blog page“. S Milan, E Treré. 0. data-activism.net. 0 cites.
  328. From SMOG to Fog: A security perspective“. R Rios, R Roman, JA Onieva…. 2017. ieeexplore.ieee.org Fog and Mobile Edge …. 0 cites.
  329. GI-Dagstuhl Seminar 16353 on Aware Machine to Machine Communication“. M Arumaithurai, S Sigg, X Wang. 0. dagstuhl.de. 0 cites.
  330. Governing eMoney: On Bitcoin & Global Governance“. DAL Pope, R Marlin-Bennett. 2016. academia.edu . 0 cites.
  331. Government Activities to Detect, Deter and Disrupt Threats Enumerating from the Dark Web“. NV Denic. 2017. dtic.mil . 0 cites.
  332. Government News“. A This. 0. gov.ulitzer.com. 0 cites.
  333. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. I Molloy, S Chari, U Finkler, M Wiggerman…. 2016. Springer … Conference on Financial …. 0 cites.
  334. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. C Jonker, T Habeck, Y Park, F Jordens…. 0. books.google.com … Cryptography and Data …. 0 cites.
  335. Graph-based forensic investigation of Bitcoin transactions“. C Zhao. 2014. lib.dr.iastate.edu . 0 cites.
  336. Heritage. exe. The current state and future of Norwegian software preservation-mapping the challenges of preserving locally executable digital artifacts and the …“. TB Madsen. 2016. dspace.uib.no . 0 cites.
  337. Himachal Pradesh, growing to prosper“. PS Vyas. 2017. qrius.com Science. 0 cites.
  338. Hitching Healthcare to the Chain: An Introduction to Blockchain Technology in the Healthcare Sector“. MA Engelhardt. 2017. timreview.ca Technology Innovation Management Review. 0 cites.
  339. How Sensitive Is Genetic Data?“. M Sariyar, S Suhr, I Schlünder. 2017. online.liebertpub.com Biopreservation and …. 0 cites.
  340. HPCC-SmartCity-DSS 2016“. X Ling, J Yang, D Wang, J Chen, L Li. 0. ieeexplore.ieee.org. 0 cites.
  341. Human Capital and Assets in the Networked World“. M Russ. 2017. emeraldinsight.com . 0 cites.
  342. ICIOT 2017“. M Hossain, R Hasan. 0. ieeexplore.ieee.org. 0 cites.
  343. Identifying and analyzing digital payment flows regarding illegal purposes on the Internet: I samarbete med CGI och Finanskoalitionen“. C Berggren, J Asplund. 2016. diva-portal.org . 0 cites.
  344. IEEE CCEM 2016 Program Details“. P Chelliah, A Mangalvedkar. 0. ieeexplore.ieee.org. 0 cites.
  345. II. Cyber-OC in the Netherlands“. G Odinot, MA Verhoeven, RLD Pool…. 0. researchgate.net Cyber-OC–Scope and …. 0 cites.
  346. Impact of Technology Innovation: A Study on Cloud Risk Mitigation“. N Suresh, M Gupta. 2017. books.google.com Information Technology Risk Management …. 0 cites.
  347. Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools“. Y Zolotavkin, J García, C Rudolph. 2017. Springer … on Decision and Game Theory for …. 0 cites.
  348. Indian export competitiveness and performance: A long story“. A Kulkarni. 2017. qrius.com Science. 0 cites.
  349. Indiana Journal of Law and Social Equality“. M Selmi. 2014. scholarship.law.gwu.edu . 0 cites.
  350. Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings“. JK Liu, R Steinfeld. 2016. books.google.com . 0 cites.
  351. Infrastructure 2.0 Journal“. M Kim, DS Meliksetian, C Malone. 0. infrastructure20.ulitzer.com. 0 cites.
  352. Intellectual Property in Silicon Valley“. PR Newswire. 0. ip.ulitzer.com. 0 cites.
  353. Internet Voting Using Zcash“. P Tarasov, H Tewari. 0. allquantor.at. 0 cites.
  354. Introduzione Agli Smart Contract (Introduction to Smart Contract)“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com . 0 cites.
  355. Investigation of Cryptocurrency Wallets on iOS and Android Mobile Devices for Potential Forensic Artifacts“. A Montanez. 2014. marshall.edu . 0 cites.
  356. IoT based smart home: Security challenges, security requirements and solutions“. W Ali, G Dustgeer, M Awais…. 2017. ieeexplore.ieee.org … and Computing (ICAC) …. 0 cites.
  357. iPad on Ulitzer“. PR Newswire. 0. ipad.ulitzer.com. 0 cites.
  358. Islamic State of Iraq and Syria Revenue Sources and Countermeasures With a Specific Look at Cryptocurrency Use“. DM Haines. 2017. search.proquest.com . 0 cites.
  359. It’s the Cyber Crime and Its Sponsors (Not My Cyber-Security), Stupid“. D Lawrence, F Townsend, T Murphy, D Garrie…. 2016. HeinOnline JL & Cyber …. 0 cites.
  360. JOnline: Dealing With Computer Fraud“. C Filip Van Hallewijn, A CISM. 0. m.isaca.org. 0 cites.
  361. JOURNAL OF LAW AND CYBER WARFARE“. S Comment. 0. jlcw.org. 0 cites.
  362. Juridische beroepen in de toekomst“. MJ ter Voert, M Beenakkers. 0. researchgate.net. 0 cites.
  363. Komparace právních podmínek užití kryptoměn ve Švýcarsku, Spojených státech amerických a Japonsku“. A Yakimenka. 2017. dspace.cuni.cz . 0 cites.
  364. LAWNEWS“. J Ting-Edwards. 0. c-justice.com. 0 cites.
  365. LE TRAFIC ILLICITE DE TABAC SUR LES CRYPTOMARCHÉS“. D Décary-Hétu, V Mousseau, I Rguioui. 2017. daviddhetu.openum.ca . 0 cites.
  366. Learning Python for Forensics“. P Miller, C Bryce. 2016. books.google.com . 0 cites.
  367. Legal Risks of Owning Cryptocurrencies“. K Low, EGS Teo. 2016. papers.ssrn.com . 0 cites.
  368. LegalTech on the Rise: Technology Changes Legal Work Behaviours, But Does Not Replace Its Profession“. MM Bues, E Matthaei. 2017. Springer Liquid Legal. 0 cites.
  369. Long term data storage using peer-to-peer technology“. PN Meessen, A de Vries. 2017. ru.nl . 0 cites.
  370. Managing electronic records across organizational boundaries: The experience of the Belgian federal government in automating investigation processes“. L Maroye, L Maroye, S van Hooland…. 2017. emeraldinsight.com Records …. 0 cites.
  371. Matrix Accounting Illustrated: Contribution Margin“. M Hughes. 2016. Wiley Online Library Journal of Corporate Accounting & Finance. 0 cites.
  372. MedRec: blockchain for medical data access, permission management and trend analysis“. AC Ekblaw. 2017. dspace.mit.edu . 0 cites.
  373. Memory Forensics and Bitcoin mining malware“. P Dimotikalis. 2016. repository.ihu.edu.gr . 0 cites.
  374. Mentoring in Cyber Education: Capture-the-Flag Exercises to Promote Good Cyber Hygiene in Disadvantaged Populations“. R Thomson. 0. westpoint.edu. 0 cites.
  375. Method and apparatus for protecting digital photos from alteration“. N Powers, TM Fortuna, P Kocsis. 2016. Google Patents US Patent App. 15/260,074. 0 cites.
  376. MMTC Communications-Frontiers“. A Costanzo, V Loscrì, S Costanzo. 0. mmc.committees.comsoc.org. 0 cites.
  377. Mobile security technology“. US Patent App. 14/476,629. 2014. Google Patents. 0 cites.
  378. Mobile security technology“. US Patent App. 14/686,069. 2015. Google Patents. 0 cites.
  379. Money for Nothing and Bits for Free: The Geographies of Bitcoin“. A Pel. 2015. tspace.library.utoronto.ca . 0 cites.
  380. MỘT SỐ GIẢI PHÁP VỀ PHÁT TRIỂN NGUỒN NHÂN LỰC CÔNG NGHỆ THÔNG TIN TẠI VIỆT NAM.“. G Trần Thu. 2017. data.uet.vnu.edu.vn . 0 cites.
  381. Moving One Step Ahead of the 90’s Job Options“. RN Ahsan, A Chatterjee. 2017. qrius.com Science. 0 cites.
  382. Neuerwerbungen im Dezember 2016“. A von Fürstenberg, CP Müller…. 2016. ub.uni-heidelberg.de Ann Arbor: University of …. 0 cites.
  383. NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform“. P Matias, P Barbosa, T Cardoso, D Mariano…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
  384. NUS Hackers“. IHA Git. 0. nushackers.org. 0 cites.
  385. O novo eo atual na Arquivística internacional: a desmaterialização, a interoperabilidade, a organização eo uso da informação em evidência (2011-2016)“. MC Freitas, CG Silva. 2016. bad.pt Actas do Encontro Nacional de Arquivos Municipais. 0 cites.
  386. Online Anonymization Relating to Cyber Attacks“. J Cornwell. 2017. search.proquest.com . 0 cites.
  387. Organised Cybercrime in the Netherlands“. G Odinot, MA Verhoeven, RLD Pool, CJ de Poot. 0. wodc.nl. 0 cites.
  388. OSC Staff Notice 33-748-Annual Summary Report for Dealers, Advisers and Investment Fund Managers“. Ontario Securities Commission. 2017. osc.gov.on.ca Update. 0 cites.
  389. Overview and Comparison of P2P File Synchronization and Storage Solutions“. J Fröhlich, S Ruesch. 2015. csg.uzh.ch Communication Systems VIII. 0 cites.
  390. Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies“. G Brambilla. 2017. dspace-unipr.cineca.it . 0 cites.
  391. Periyar Journal of Research in Business and Development Studies“. S Chhabra, N Gangwar, AB Singhal, F Fatima…. 0. pmccdelhi.com. 0 cites.
  392. Periyar Journal of Research in Business and Development Studies“. S Singh. 0. pmccdelhi.com. 0 cites.
  393. Personal control of privacy and data: Estonian experience“. J Priisalu, R Ottis. 2017. Springer Health and Technology. 0 cites.
  394. Pharmaceutical News on Ulitzer“. PR Newswire. 0. pharmaceuticals.ulitzer.com. 0 cites.
  395. Pluralism and Economics Today: Understanding the ISIPE Rebellion“. A Baksy. 2017. qrius.com Science. 0 cites.
  396. Policing af kryptomarkeder“. J Demant, R Munksgaard. 2017. justitsministeriet.dk . 0 cites.
  397. Predictive Computing and Information Security“. PK Gupta, V Tyagi, SK Singh. 2017. Springer . 0 cites.
  398. Predictive Computing and Information Security: A Technical Review“. PK Gupta, V Tyagi, SK Singh. 2017. Springer Predictive Computing and Information …. 0 cites.
  399. Privacy in the Smart City–Applications, Technologies, Challenges and Solutions“. D Eckhoff, I Wagner. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …. 0 cites.
  400. Privacy Verification Chains for IoT“. N Foukia, D Billard, E Solana. 2017. Springer International Conference on Network and …. 0 cites.
  401. Privacy‐preserving smart data storage for financial industry in cloud computing“. M Qiu, K Gai, H Zhao, M Liu. 0. Wiley Online Library Concurrency and Computation: Practice …. 0 cites.
  402. Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core“. L van der Horst, KKR Choo, NA Le-Khac. 2017. ieeexplore.ieee.org IEEE Access. 0 cites.
  403. Prof J Maiti Head, I&SE“. PP Chakrabarti, IIT Director. 0. iem.iitkgp.ernet.in. 0 cites.
  404. Protecting Data Privacy in the Presence of Data Provenance“. P Kianmajd. 2017. search.proquest.com . 0 cites.
  405. Provenance threat modeling“. O Hambolu, L Yu, J Oakley, RR Brooks…. 2016. ieeexplore.ieee.org Privacy, Security and …. 0 cites.
  406. Public Evidence from Secret Ballots“. J Benaloh, M Bernhard, JA Halderman…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
  407. Quick Start“. MTWT Friday. 2016. wp.df.uba.ar . 0 cites.
  408. Ransomware 7 and cryptocurrency“. GJ Ahn, A Doupe, Z Zhao, K Liao. 2016. books.google.com Cybercrime Through an …. 0 cites.
  409. Rarity trading legacy protection and digital convergence platform“. MM Saigh, X Zhang. 2016. Google Patents US Patent App. 15/072,911. 0 cites.
  410. Rational mining on bitcoin“. S Pachal. 2017. library.isical.ac.in . 0 cites.
  411. Rational Whistle Blower Prototypes Buch 1 Grundlagen, Ergebnisse und Literatur“. G Förster. 2016. integrity-art.de . 0 cites.
  412. Read The Manual“. M Faou, JI Boutin. 2017. welivesecurity.com . 0 cites.
  413. RECALIBRATING LAW ENFORCEMENT TO KEEP PACE WITH NEW TECHNOLOGIES AND FORMS OF CRIME“. MM Oberoi. 0. idsa.in SECURING CYBERSPACE. 0 cites.
  414. Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication …“. F Saeed, N Gazem, S Patnaik, ASS Balaid…. 2017. books.google.com . 0 cites.
  415. Recognition of Traffic Sign Based on Bag-of-Words and Artificial Neural Network“. KT Islam, RG Raj, G Mujtaba. 2017. mdpi.com Symmetry. 0 cites.
  416. Reflections on the REST architectural style and principled design of the modern web architecture (impact paper award)“. RT Fielding, RN Taylor, JR Erenkrantz…. 2017. dl.acm.org Proceedings of the …. 0 cites.
  417. Reflections upon periclitations in privacy: perspectives from Rwanda’s digital transformation“. JP Nsengimana. 2017. Springer Health and Technology. 0 cites.
  418. Regulation based switching system for electronic message routing“. J Crabtree, A Sellers, J Uchiyama. 2017. Google Patents US Patent App. 15/489,716. 0 cites.
  419. Report from GI-Dagstuhl Seminar 16394: Software Performance Engineering in the DevOps World“. A van Hoorn, P Jamshidi, P Leitner, I Weber. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
  420. Report of the second expert group meeting on opportunities and risks associated with the advent of digital currency in the Caribbean“. NU CEPAL. 2015. repositorio.cepal.org . 0 cites.
  421. Requisitos y soluciones de privacidad para la testificacion digital“. A Nieto, R Rios. 0. nics.uma.es. 0 cites.
  422. Research Challenges in Financial Data Modeling and Analysis“. L Alexander, SR Das, Z Ives, HV Jagadish…. 2017. online.liebertpub.com Big …. 0 cites.
  423. Research Specialties“. T MOORE. 2016. tylermoore.ens.utulsa.edu Computing. 0 cites.
  424. Retrofit Device And Method Of Retrofitting A Flow Meter“. D Mackie, S Grefen, CJ Boelter…. 2017. Google Patents US Patent App. 15 …. 0 cites.
  425. REXIT: What It Brings to Light About Term Length“. B Pratap. 2017. qrius.com Science. 0 cites.
  426. Schöne neue Verbraucherwelt?“. C Bala, W Schuldzinski. 0. projekte.meine-verbraucherzentrale …. 0 cites.
  427. Searchain: Blockchain-based private keyword search in decentralized storage“. P Jiang, F Guo, K Liang, J Lai, Q Wen. 2017. Elsevier Future Generation Computer …. 0 cites.
  428. Section 75 and credit cards: misconceived interpretation?“. J Mukwiri. 2005. emeraldinsight.com Journal of Financial Regulation and Compliance. 0 cites.
  429. Secure lightweight context-driven data logging for bodyworn sensing devices“. M Siddiqi, ST All, V Sivaraman. 2017. ieeexplore.ieee.org … Forensic and Security (ISDFS) …. 0 cites.
  430. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions“. J Ni, K Zhang, X Lin, X Shen. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …. 0 cites.
  431. Securing the Assets of Decentralized Applications using Financial Derivatives}}“. G Bissias, BN Levine, N Kapadia, AP Ozisik…. 0. people.cs.umass.edu Elsevier Child Abuse …. 0 cites.
  432. Security Enhancement of Digital Watermarking“. MA Nematollahi, C Vorakulpipat, HG Rosales. 2017. Springer Digital Watermarking. 0 cites.
  433. Security Hands-On-Training–Part 6–Final“. L Rocha, I Handling. 0. countuponsecurity.com. 0 cites.
  434. SEEKING PAPERS ON COMPUTATIONAL SOCIAL SYSTEMS“. SD Computing, S Computing. 0. ieeexplore.ieee.org. 0 cites.
  435. Self-reported Verifiable Reputation with Rater Privacy“. R Bazin, A Schaub, O Hasan, L Brunie. 2017. Springer IFIP International Conference on …. 0 cites.
  436. Share and Share Alike: The challenges from social media for Intellectual Property Rights“. D Collopy. 2017. uhra.herts.ac.uk . 0 cites.
  437. Small scale denial of service attacks“. V Bukač. 0. is.muni.cz. 0 cites.
  438. Smart Contracts: A Preliminary Evaluation“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com . 0 cites.
  439. Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection“. Y Yu, T Tun. 2017. oro.open.ac.uk . 0 cites.
  440. Social, Cultural, and Behavioral Modeling“. D Lee, YR Lin, N Osgood, R Thomson. 0. Springer. 0 cites.
  441. Social, Cultural, and Behavioral Modeling: 10th International Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings“. D Lee, N Osgood, YR Lin, R Thomson. 2017. books.google.com . 0 cites.
  442. Sparse Encoded Matrix based Steganography algorithm“. V Shah. 2017. irjet.net . 0 cites.
  443. Sticky policies approach within cloud computing“. G Spyra, WJ Buchanan, E Ekonomou. 2017. Elsevier Computers & Security. 0 cites.
  444. Students Link Brains to Fire Video Game Cannon“. J DORRIER. 0. losnuevosguerreros.org. 0 cites.
  445. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT)“. L Arief, TA Sundara. 2017. jurnal.iaii.or.id Jurnal RESTI (Rekayasa Sistem dan Teknologi …. 0 cites.
  446. Supporting users to take informed decisions on privacy settings of personal devices“. I Torre, OR Sanchez, F Koceva, G Adorni. 2017. Springer Personal and Ubiquitous …. 0 cites.
  447. Systemic banking crises: completing the enhanced policy responses“. O Frecaut, O Frecaut. 2017. emeraldinsight.com Journal of Financial Regulation and …. 0 cites.
  448. Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance“. M Dawson, JA Cárdenas-Haro. 2017. igi-global.com … and the Internet of Things (IJHIoT). 0 cites.
  449. Tamper-Resistant Mobile Health Using Blockchain Technology“. D Ichikawa, M Kashiyama, T Ueno. 2017. ncbi.nlm.nih.gov JMIR mHealth and uHealth. 0 cites.
  450. TCCN Newsletter“. M Yannuzzi, R Milito, R Serral-Gracià, D Montero…. 0. cn.committees.comsoc.org. 0 cites.
  451. Technologien, Forschungsfragen und Anwendungen“. J Schütte, G Fridgen, W Prinz, T Rose, NU FIT…. 0. aisec.fraunhofer.de. 0 cites.
  452. TERRORIST USE OF VIRTUAL CURRENCIES“. ZK Goldman, E Maruyama, E Rosenberg, E Saravalle…. 2017. caict.ac.cn . 0 cites.
  453. The Bitcoin Guidebook: How to Obtain, Invest, and Spend the World’s First Decentralized Cryptocurrency“. I DeMartino. 2016. books.google.com . 0 cites.
  454. The Cyber Triad“. B Thijssen. 2016. researchgate.net . 0 cites.
  455. The Establishment of Bitcoin“. P Hesch. 2017. dspace.allegheny.edu . 0 cites.
  456. The Evolving Cloud“. J Weinman. 2017. ieeexplore.ieee.org IEEE Cloud Computing. 0 cites.
  457. The global village and it’s back-breaking terrain“. JD Ostry. 2017. qrius.com Science. 0 cites.
  458. The illicit drug trade on the dark net: Analysing the need for a new EU Framework“. Y Hassan. 2017. openaccess.leidenuniv.nl . 0 cites.
  459. The impact of Self-Generated Images in online pornography“. A Monaghan. 2017. eprints.mdx.ac.uk . 0 cites.
  460. The Missing Account of Progressive Corporate Criminal Law“. WS Laufer. 2017. papers.ssrn.com . 0 cites.
  461. The New Bio-Citizen: How the Democratization of Genomics Will Transform Our Lives from Epidemics Management to the Internet of Living Things“. E Pauwels. 0. wilsoncenter.org. 0 cites.
  462. The Nuts and Bolts of Micropayments: A Survey“. ST Ali, D Clarke, P McCorry. 2017. arxiv.org arXiv preprint arXiv:1710.02964. 0 cites.
  463. The Programmable Economy: Envisaging an Entire Planned Economic System as a Single Computer Through Blockchain Networks“. K Hegadekatti, Y SG. 2017. papers.ssrn.com . 0 cites.
  464. The Tor browser: A forensic investigation study“. K Keller. 2016. search.proquest.com . 0 cites.
  465. Threshold Single Password Authentication“. D İşler, A Küpçü. 2017. Springer … Management, Cryptocurrencies and Blockchain …. 0 cites.
  466. Towards a leaner, smarter public-sector workforce.“. A Hitchcock, K Laycock, E Sundorph. 2017. reform.uk . 0 cites.
  467. Towards an accountable software-defined networking architecture“. BE Ujcich, A Miller, A Bates…. 2017. ieeexplore.ieee.org … (NetSoft), 2017 IEEE …. 0 cites.
  468. Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model“. Y Ishihara, T Fujiwara. 2017. books.google.com … Blockchain Technology: ESORICS 2017 …. 0 cites.
  469. Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model“. Y Furuta, N Yanai, M Karasaki, K Eguchi…. 2017. Springer … and Blockchain …. 0 cites.
  470. TOWARDS ENHANCING SECURITY IN CLOUD STORAGE ENVIRONMENTS“. D Wilson. 2016. jscholarship.library.jhu.edu . 0 cites.
  471. Trifling and Gambling with Virtual Money“. JT Holden. 2017. papers.ssrn.com . 0 cites.
  472. Trumpeting in the New Era of a Lean Technology-Driven Financial System“. V Rule. 0. financialintergroup.com. 0 cites.
  473. Trust Management in Fog Computing“. TS Dybedokken. 2017. brage.bibsys.no . 0 cites.
  474. Turkish Riviera, the Turquoise Coast“. PR Newswire. 0. turkishriviera.ulitzer.com. 0 cites.
  475. Typologies in Canadian Securities Fraud: An Impact Assessment on Investor Protection, Money Laundering and the Financing of Terrorism (AML/CFT), and Risk …“. R Ranjan. 2015. papers.ssrn.com . 0 cites.
  476. Understanding Digital Crime, Trust, and Control in Blockchain Technologies“. JB Walton, G Dhillon. 2017. aisel.aisnet.org . 0 cites.
  477. Unlocking Innovations and Competitive Advantage of State Bank of India“. B Jha, A Gulati, S Goyal, S Vig. 2017. strategiesinemergingmarkets.com . 0 cites.
  478. Use of Bitcoin in Online Travel Product Shopping: The European Perspective“. D Leung, A Dickinger. 2017. Springer … and Communication Technologies in Tourism 2017. 0 cites.
  479. Using Blockchain for Research Transparency“. K Opoku-Agyemang. 2017. osf.io . 0 cites.
  480. Using blockchain for scientific transparency“. KA Opoku-Agyemang. 2017. papers.ssrn.com . 0 cites.
  481. Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data“. RR Brooks, L Yu, Y Fu, G Cordone, J Oakley…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
  482. Using the Blockchain to Secure Provenance Meta-Data (A CCoE Webinar Presentation)“. RR Brooks, A Skjellum. 2017. scholarworks.iu.edu . 0 cites.
  483. Using Tor in cybersecurity investigations“. J Flanagan. 2015. search.proquest.com . 0 cites.
  484. Vers la sécurité mobile: caractérisation des attaques et contremesures“. Y Le Traon, JY Marion, F Massacci, S Limet…. 0. tel.archives-ouvertes.fr. 0 cites.
  485. Vers la sécurité mobile: caractérisation des attaques et contremesures“. JF Lalande. 2016. hal-univ-orleans.archives-ouvertes.fr . 0 cites.
  486. Video Integrity through Blockchain Technology“. A Hemlin Billström, F Huss. 2017. diva-portal.org . 0 cites.
  487. Welcome Message“. M Koscina, D Caragata, N Abdoun, S El Assady…. 0. ieeexplore.ieee.org. 0 cites.
  488. What Are They Really Up To? Activist Social Scientists Backpedal on Conspiracy Theory Agenda, Kurtis Hagen“. L Basham. 0. social-epistemology.com. 0 cites.
  489. WHAT MAKES A CURRENCY?–THE BITCOIN PHENOMENON“. EE LEWIS. 0. researchgate.net. 0 cites.
  490. Why Fintech Could Lead to More Financial Crime“. C Harrington. 2017. CFA Institute CFA Institute Magazine. 0 cites.
  491. Will Donald trump Hillary’s Climb to the Top of the Everest?“. A Kulkarni. 2017. qrius.com Science. 0 cites.
  492. Will Organizations Emerge as “Hybrid Intelligences” from the Digital Transformation?“. W Leodolter. 2017. Springer … Transformation Shaping the Subconscious Minds of …. 0 cites.
  493. Words to go: Data center design standards bodies“. W Enterprises. 0. tngconsultores.com. 0 cites.
  494. Zeng Chong, Huang Song, Yang Yongming“. X Yang, D Ogawa, N Dai, TTG Hoang, X Wang, X Zhou…. 0. ieeexplore.ieee.org. 0 cites.
  495. Zwischen Online-Streife und Online-(Raster-) Fahndung–Ein Beitrag zur Verarbeitung öffentlich zugänglicher Daten im Ermittlungsverfahren“. C Rückert. 2017. degruyter.com Zeitschrift für die gesamte Strafrechtswissenschaft. 0 cites.
  496. 比特币与法定数字货币“. 秦波. 2017. jcr.cacrnet.org.cn 密码学报. 0 cites.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.