Most Cited Privacy Articles for Blockchain and Cryptocurrency, zkSnarks, or RingCT Recently Published

Privacy and SecurityPrivacy is an important concept in society as it defines rights for individual information to be withheld or shared among a larger set of people, organizations, or algorithms. For blockchain, there are two main privacy approaches: zkSnarks and RingCT. There are also other considerations, such as IP masking and roles of confidentiality in transactions for supply chains, medical records, and other industries. While the initial Bitcoin ledger has all transactions public there are still approaches to obfuscate records through mixing and additional layers of information.

However, it is important to note privacy is not a gradient: something is either fully private or it is not. With the ease of developing algorithms and heuristics to identify individuals among a larger data-set, privacy implementation will become a priority over time and perhaps even a requirement. While there are only a few dozen projects featuring privacy, a fully fungible and consistently enforced solution has yet to be released and widely used. Within the next two years better solutions are likely to gain wider adoption as more examples for benefits of privacy as well as ease of use dramatically improve.

This is a list of publications from 2017 to 2-18 which mention privacy and one of the main privacy techniques of RingCT or zkSNARKS.

Last updated October 15th, 2018.

    1. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2018. ieeexplore.ieee.org IEEE Transactions on Dependable …. 94 cites.
    2. An overview of blockchain technology: Architecture, consensus, and future trends“. Z Zheng, S Xie, H Dai, X Chen…. 2017. ieeexplore.ieee.org Big Data (BigData …. 88 cites.
    3. Mastering Bitcoin: Programming the open blockchain“. AM Antonopoulos. 2017. books.google.com . 80 cites.
    4. A first look at the usability of bitcoin key management“. S Eskandari, J Clark, D Barrera, E Stobert. 2018. arxiv.org arXiv preprint arXiv …. 53 cites.
    5. Bitcoin: a moeda na era digital“. F Ulrich. 2017. books.google.com . 52 cites.
    6. Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains“. J Kang, R Yu, X Huang, S Maharjan…. 2017. ieeexplore.ieee.org IEEE Transactions …. 50 cites.
    7. An ID-based linearly homomorphic signature scheme and its application in blockchain“. Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang. 2018. ieeexplore.ieee.org IEEE Access. 46 cites.
    8. A survey on security and privacy issues of bitcoin“. M Conti, S Kumar, C Lal, S Ruj. 2018. ieeexplore.ieee.org IEEE Communications Surveys …. 44 cites.
    9. A survey on the security of blockchain systems“. X Li, P Jiang, T Chen, X Luo, Q Wen. 2017. Elsevier Future Generation Computer Systems. 41 cites.
    10. Hijacking bitcoin: Routing attacks on cryptocurrencies“. M Apostolaki, A Zohar…. 2017. ieeexplore.ieee.org … Privacy (SP), 2017 IEEE …. 40 cites.
    11. The blockchain folk theorem“. B Biais, C Bisiere, M Bouvard, C Casamatta. 2018. papers.ssrn.com . 36 cites.
    12. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain“. Q Xia, EB Sifah, KO Asamoah, J Gao, X Du…. 2017. ieeexplore.ieee.org IEEE …. 34 cites.
    13. Untangling blockchain: A data processing view of blockchain systems“. TTA Dinh, R Liu, M Zhang, G Chen…. 2018. ieeexplore.ieee.org IEEE Transactions on …. 33 cites.
    14. Bolt: Anonymous payment channels for decentralized currencies“. M Green, I Miers. 2017. dl.acm.org Proceedings of the 2017 ACM SIGSAC Conference on …. 32 cites.
    15. Blockchains for decentralized optimization of energy resources in microgrid networks“. E Münsing, J Mather, S Moura. 2017. ieeexplore.ieee.org Control Technology and …. 30 cites.
    16. Consensus in the age of blockchains“. S Bano, A Sonnino, M Al-Bassam, S Azouvi…. 2017. arxiv.org arXiv preprint arXiv …. 28 cites.
    17. Scalable bias-resistant distributed randomness“. E Syta, P Jovanovic, EK Kogias, N Gailly…. 2017. ieeexplore.ieee.org Security and Privacy …. 27 cites.
    18. Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge“. F Tramer, F Zhang, H Lin, JP Hubaux…. 2017. ieeexplore.ieee.org … Security and Privacy …. 26 cites.
    19. Catena: Efficient non-equivocation via Bitcoin“. A Tomescu, S Devadas. 2017. computer.org … IEEE Symposium on Security and Privacy  …. 25 cites.
    20. The future of FinTech: Integrating finance and technology in financial services“. B Nicoletti. 2017. books.google.com . 23 cites.
    21. The future of free speech, trolls, anonymity and fake news online“. H Rainie, JQ Anderson, J Albright. 2017. elon.edu . 22 cites.
    22. Scalable, transparent, and post-quantum secure computational integrity“. E Ben-Sasson, I Bentov, Y Horesh…. 2018. monoico.com Cryptol. ePrint Arch …. 21 cites.
    23. An empirical analysis of linkability in the Monero blockchain“. A Miller, M Möser, K Lee, A Narayanan. 2017. maltemoeser.de arXiv preprint. 20 cites.
    24. P2P Mixing and Unlinkable Bitcoin Transactions.“. T Ruffing, P Moreno-Sanchez, A Kate. 2017. wp.internetsociety.org NDSS. 20 cites.
    25. A scalable verification solution for blockchains“. J Teutsch, C Reitwießner. 2017. people.cs.uchicago.edu url: https://people. cs. uchicago …. 20 cites.
    26. Malleability of the blockchain’s entropy“. C Pierrot, B Wesolowski. 2018. Springer Cryptography and Communications. 20 cites.
    27. Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?“. S Foley, J Karlsen, TJ Putniņš. 2018. papers.ssrn.com . 20 cites.
    28. Iron: functional encryption using Intel SGX“. B Fisch, D Vinayagamurthy, D Boneh…. 2017. dl.acm.org Proceedings of the 2017 …. 20 cites.
    29. Redactable blockchain–or–rewriting history in bitcoin and friends“. G Ateniese, B Magri, D Venturi…. 2017. ieeexplore.ieee.org Security and Privacy  …. 19 cites.
    30. Cryptocurrency: A new investment opportunity?“. K Chuen, LEE David, L Guo, Y Wang. 2017. papers.ssrn.com . 19 cites.
    31. A traceability analysis of Monero’s blockchain“. A Kumar, C Fischer, S Tople, P Saxena. 2017. Springer European Symposium on …. 18 cites.
    32. Decentralization in bitcoin and ethereum networks“. AE Gencer, S Basu, I Eyal, R van Renesse…. 2018. arxiv.org arXiv preprint arXiv …. 18 cites.
    33. Beyond bitcoin: an early overview on smart contracts“. P Cuccuru. 2017. academic.oup.com International Journal of Law and Information …. 18 cites.
    34. OmniLedger: A Secure, Scale-Out, Decentralized Ledger.“. E Kokoris-Kogias, P Jovanovic, L Gasser…. 2017. allquantor.at IACR Cryptology …. 18 cites.
    35. The evolution of the bitcoin economy: extracting and analyzing the network of payment relationships“. P Tasca, A Hayes, S Liu. 2018. emeraldinsight.com The Journal of Risk Finance. 18 cites.
    36. Concurrency and privacy with payment-channel networks“. G Malavolta, P Moreno-Sanchez, A Kate…. 2017. dl.acm.org Proceedings of the …. 17 cites.
    37. CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds“. K Nikitin, E Kokoris-Kogias, P Jovanovic…. 2017. usenix.org 26th USENIX Security …. 17 cites.
    38. Secure and anonymous decentralized Bitcoin mixing“. JH Ziegeldorf, R Matzutt, M Henze, F Grossmann…. 2018. Elsevier Future Generation …. 17 cites.
    39. A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK“. S Bowe, A Gabizon, MD Green. 2017. z.cash . 17 cites.
    40. RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero“. SF Sun, MH Au, JK Liu, TH Yuen. 2017. Springer European Symposium on Research in …. 16 cites.
    41. IKP: Turning a PKI around with decentralized automated incentives“. S Matsumoto, RM Reischuk. 2017. ieeexplore.ieee.org … and Privacy (SP), 2017 IEEE …. 16 cites.
    42. Challenging the techno-politics of anonymity: the case of cryptomarket users“. A Bancroft, P Scott Reid. 2017. Taylor & Francis Information, Communication & Society. 16 cites.
    43. Dandelion: Redesigning the bitcoin network for anonymity“. S Bojja Venkatakrishnan, G Fanti…. 2017. dl.acm.org Proceedings of the ACM …. 16 cites.
    44. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies“. S Goldfeder, H Kalodner, D Reisman…. 2018. degruyter.com Proceedings on Privacy …. 15 cites.
    45. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin“. R Matzutt, J Hiller, M Henze, JH Ziegeldorf…. 2018. martinhenze.de Proceedings of the …. 15 cites.
    46. Zero-knowledge contingent payments revisited: Attacks and payments for services“. M Campanelli, R Gennaro, S Goldfeder…. 2017. dl.acm.org Proceedings of the 2017 …. 15 cites.
    47. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities: Emerging Research and …“. S Asharaf, S Adarsh. 2017. books.google.com . 14 cites.
    48. Adding concurrency to smart contracts“. T Dickerson, P Gazzillo, M Herlihy…. 2017. dl.acm.org Proceedings of the ACM …. 13 cites.
    49. A reference model for internet of things middleware“. MAA da Cruz, JJPC Rodrigues…. 2018. ieeexplore.ieee.org IEEE Internet of …. 13 cites.
    50. Providing privacy, safety, and security in iot-based transactive energy systems using distributed ledgers“. A Laszka, A Dubey, M Walker, D Schmidt. 2017. dl.acm.org Proceedings of the Seventh …. 12 cites.
    51. Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions“. D Eckhoff, I Wagner. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …. 12 cites.
    52. Tracking digital footprints: anonymity within the bitcoin system“. P Reynolds, ASM Irwin. 2017. emeraldinsight.com Journal of Money Laundering Control. 12 cites.
    53. Medical systems, devices and methods“. FP Veltz. 2017. Google Patents US Patent App. 15/446,015. 12 cites.
    54. A conceptual secure Blockchain-based electronic voting system“. AB Ayed. 2017. aircconline.com International Journal of Network Security & Its …. 11 cites.
    55. Blockchain for good?“. B Kewell, R Adams, G Parry. 2017. Wiley Online Library Strategic Change. 11 cites.
    56. Solidus: Confidential distributed ledger transactions via PVORM“. E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels…. 2017. dl.acm.org Proceedings of the 2017 …. 11 cites.
    57. FinTech platforms and strategy“. V Dhar, RM Stein. 2017. dl.acm.org Communications of the ACM. 11 cites.
    58. Bulletproofs: Efficient range proofs for confidential transactions“. B Bünz, J Bootle, D Boneh, A Poelstra, P Wuille…. 2017. cryptopapers.info . 11 cites.
    59. OnionDNS: A seizure-resistant top-level domain“. N Scaife, H Carter, L Lidsky, RL Jones…. 2018. Springer International Journal of …. 11 cites.
    60. Bitcoins und andere dezentrale Transaktionssysteme“. E Sixt. 2017. Springer Blockchains als Basis einer Kryptoökonomie …. 11 cites.
    61. Softwarization of internet of things infrastructure for secure and smart healthcare“. MA Salahuddin, A Al-Fuqaha, M Guizani…. 2018. arxiv.org arXiv preprint arXiv …. 10 cites.
    62. Secure attribute-based signature scheme with multiple authorities for Blockchain in electronic health records systems“. R Guo, H Shi, Q Zhao, D Zheng. 2018. ieeexplore.ieee.org IEEE Access. 10 cites.
    63. Block-by-block: leveraging the power of blockchain technology to build trust and promote cyber peace“. SJ Shackelford, S Myers. 2017. HeinOnline Yale JL & Tech.. 10 cites.
    64. Silicon to syringe: Cryptomarkets and disruptive innovation in opioid supply chains“. M Gilbert, N Dasgupta. 2017. Elsevier International Journal of Drug Policy. 10 cites.
    65. Tomorrow’s Inheritance: The Frontiers of Estate Planning Formalism“. D Horton. 2017. HeinOnline BCL Rev.. 10 cites.
    66. A Review on the Use of Blockchain for the Internet of Things“. TM Fernández-Caramés, P Fraga-Lamas. 2018. ieeexplore.ieee.org IEEE Access. 9 cites.
    67. Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes“. S Kethineni, Y Cao, C Dodge. 2018. Springer American Journal of Criminal Justice. 9 cites.
    68. Bulletproofs: Short proofs for confidential transactions and more“. B Bünz, J Bootle, D Boneh, A Poelstra…. 2018. computer.org … : Short Proofs for …. 9 cites.
    69. A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things“. SC Cha, JF Chen, C Su, KH Yeh. 2018. ieeexplore.ieee.org IEEE Access. 8 cites.
    70. On or off the blockchain? Insights on off-chaining computation and data“. J Eberhardt, S Tai. 2017. Springer European Conference on Service-Oriented and Cloud …. 8 cites.
    71. SCRAPE: Scalable randomness attested by public entities“. I Cascudo, B David. 2017. Springer … Conference on Applied Cryptography and Network …. 8 cites.
    72. Decentralized anonymous micropayments“. A Chiesa, M Green, J Liu, P Miao, I Miers…. 2017. Springer … Conference on the …. 8 cites.
    73. Look who’s watching: Surveillance, treachery and trust online“. FO Hampson, E Jardine. 2017. McGill-Queen’s Press-MQUP . 8 cites.
    74. Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues“. K Yeow, A Gani, RW Ahmad, JJPC Rodrigues…. 2018. ieeexplore.ieee.org IEEE Access. 8 cites.
    75. Ontology of Blockchain Technologies. Principles of identification and classification“. P Tasca, T Thanabalasingham, CJ Tessone. 2017. arxiv.org arXiv preprint arXiv …. 8 cites.
    76. Data Strategy: How to Profit from a World of Big Data, Analytics and the Internet of Things“. B Marr. 2017. books.google.com . 8 cites.
    77. Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin.“. T Ruffing, P Moreno-Sanchez. 2017. fc17.ifca.ai IACR Cryptology ePrint Archive. 7 cites.
    78. Cryptography and protocols in hyperledger fabric“. E Androulaki, C Cachin, A De Caro, A Kind…. 2017. cachin.com Real-World …. 7 cites.
    79. Bitcoin and the Blockchain as Possible Corporate Governance Tools: Strengths and Weaknesses“. FS Piazza. 2017. HeinOnline Bocconi Legal Papers. 7 cites.
    80. Certificate transparency with privacy“. S Eskandarian, E Messeri, J Bonneau…. 2017. degruyter.com Proceedings on Privacy …. 7 cites.
    81. Blockchains and data protection in the european union“. M Finck. 2017. papers.ssrn.com . 7 cites.
    82. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution“. R Cheng, F Zhang, J Kos, W He, N Hynes…. 2018. arxiv.org arXiv preprint arXiv …. 7 cites.
    83. The price of anonymity: empirical evidence from a market for Bitcoin anonymization“. M Möser, R Böhme. 2017. academic.oup.com Journal of Cybersecurity. 7 cites.
    84. Silk Road: The market beyond the reach of the state“. R Zajácz. 2017. Taylor & Francis The Information Society. 7 cites.
    85. Fair, Transparent, and Accountable Algorithmic Decision-making Processes“. B Lepri, N Oliver, E Letouzé, A Pentland…. 2017. Springer Philosophy & Technology. 7 cites.
    86. The economics of peer-to-peer online sharing“. T Teubner, F Hawlitschek. 2018. books.google.com The rise of the sharing economy …. 7 cites.
    87. Design of Distributed Voting Systems“. C Meter. 2017. arxiv.org arXiv preprint arXiv:1702.02566. 7 cites.
    88. Conceptualizing Cryptolaw“. CL Reyes. 2017. HeinOnline Neb. L. Rev.. 7 cites.
    89. The Driver in the Driverless Car: How Our Technology Choices Will Create the Future“. V Wadhwa, A Salkever. 2017. books.google.com . 7 cites.
    90. Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You“. V Dhillon, D Metcalf, M Hooper. 2017. Springer . 7 cites.
    91. Умный контейнер, умный порт, BIM, Интернет Вещей и блокчейн в цифровой системе мировой торговли“. ЮВ Куприяновская, ВП Куприяновский…. 2018. cyberleninka.ru … Journal of Open …. 7 cites.
    92. PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing“. MA Walker, A Dubey, A Laszka…. 2017. dl.acm.org Proceedings of the 4th …. 6 cites.
    93. ValueShuffle: Mixing confidential transactions for comprehensive transaction privacy in bitcoin“. T Ruffing, P Moreno-Sanchez. 2017. Springer International Conference on Financial …. 6 cites.
    94. Blockchain technology for social impact: opportunities and challenges ahead“. W Al-Saqaf, N Seidler. 2017. Taylor & Francis Journal of Cyber Policy. 6 cites.
    95. Overview of Blockchain as the Engine of the 4th Industrial Revolution“. K Rabah. 2017. business.mrjournals.org Mara Research Journal of Business & …. 6 cites.
    96. Smarter City: Smart Energy Grid based on Blockchain Technology“. A Pieroni, N Scarpato, L Di Nunzio…. 2018. researchgate.net … Journal on Advanced …. 6 cites.
    97. To Blockchain or Not to Blockchain: That Is the Question“. V Gatteschi, F Lamberti, C Demartini…. 2018. ieeexplore.ieee.org IT …. 6 cites.
    98. Tracking ransomware end-to-end“. DY Huang, MM Aliapoulios, VG Li…. 2018. ieeexplore.ieee.org … Security and Privacy …. 6 cites.
    99. Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning“. P Bailis, A Narayanan, A Miller, S Han. 2017. cs.unibo.it Communications of the ACM. 6 cites.
    100. On the linkability of Zcash transactions“. J Quesnelle. 2017. arxiv.org arXiv preprint arXiv:1712.01210. 6 cites.
    101. Hardening stratum, the bitcoin pool mining protocol“. R Recabarren, B Carbunar. 2017. degruyter.com Proceedings on Privacy Enhancing …. 6 cites.
    102. Möbius: Trustless tumbling for transaction privacy“. S Meiklejohn, R Mercer. 2018. degruyter.com Proceedings on Privacy Enhancing …. 6 cites.
    103. MCMix: Anonymous messaging via secure multiparty computation“. N Alexopoulos, A Kiayias, R Talviste…. 2017. usenix.org USENIX Security …. 6 cites.
    104. High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things“. R Tzezana. 2017. emeraldinsight.com foresight. 6 cites.
    105. Trust-to-trust design of a new Internet“. M Ali. 2017. cs.princeton.edu . 6 cites.
    106. Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?“. J Moubarak, E Filiol, M Chamoun. 2017. ieeexplore.ieee.org Cyber Security in …. 5 cites.
    107. The onions have eyes: A comprehensive structure and privacy analysis of tor hidden services“. I Sanchez-Rola, D Balzarotti, I Santos. 2017. dl.acm.org Proceedings of the 26th …. 5 cites.
    108. Stealth Address and Key Management Techniques in Blockchain Systems.“. NT Courtois, R Mercer. 2017. scitepress.org ICISSP. 5 cites.
    109. An out-of-band authentication scheme for internet of things using blockchain technology“. L Wu, X Du, W Wang, B Lin. 2018. ieeexplore.ieee.org 2018 International Conference on …. 5 cites.
    110. Beyond Bitcoin: A Critical Look at Blockchain-Based Systems“. D Romano, G Schmid. 2017. mdpi.com Cryptography. 5 cites.
    111. An E-voting System based on Blockchain and Ring Signature“. Y Wu. 2017. dgalindo.es Master. University of Birmingham. 5 cites.
    112. Phonion: Practical protection of metadata in telephony networks“. S Heuser, B Reaves, PK Pendyala, H Carter…. 2017. degruyter.com … on Privacy Enhancing …. 5 cites.
    113. Confidential assets“. A Poelstra, A Back, M Friedenbach…. 2017. pdfs.semanticscholar.org Financial …. 5 cites.
    114. Deanonymization in the bitcoin p2p network“. G Fanti, P Viswanath. 2017. papers.nips.cc Advances in Neural Information Processing …. 5 cites.
    115. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware.“. I Bentov, Y Ji, F Zhang, Y Li, X Zhao…. 2017. allquantor.at IACR Cryptology …. 5 cites.
    116. Fast Reed-Solomon interactive oracle proofs of proximity“. E Ben-Sasson, I Bentov, Y Horesh…. 2018. drops.dagstuhl.de LIPIcs-Leibniz …. 5 cites.
    117. Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms“. A Judmayer, N Stifter, K Krombholz…. 2017. morganclaypool.com … Security, Privacy, & …. 5 cites.
    118. Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin“. Y Kwon, D Kim, Y Son, E Vasserman…. 2017. dl.acm.org Proceedings of the 2017 …. 5 cites.
    119. Cryptocurrencies as a Financial Asset: A Systematic Analysis“. S Corbet, BM Lucey, A Urquhart, L Yarovaya. 2018. papers.ssrn.com . 5 cites.
    120. Two-Hop Distance-Bounding Protocols: Keep Your Friends Close“. A Yang, E Pagnin, A Mitrokotsa…. 2018. ieeexplore.ieee.org IEEE Transactions …. 5 cites.
    121. Care-centered clinical documentation in the digital environment: Solutions to alleviate burnout“. AK Ommaya, PF Cipriano, DB Hoyt, KA Horvath…. 2018. nam.edu NAM Perspectives. 5 cites.
    122. The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data“. K Mitnick. 2017. Hachette UK . 5 cites.
    123. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road“. N Bilton. 2017. books.google.com . 5 cites.
    124. On the design of communication and transaction anonymity in blockchain-based transactive microgrids“. J Bergquist, A Laszka, M Sturm, A Dubey. 2017. dl.acm.org Proceedings of the 1st …. 4 cites.
    125. An Empirical Analysis of Traceability in the Monero Blockchain“. M Möser, K Soska, E Heilman, K Lee…. 2018. degruyter.com … on Privacy Enhancing …. 4 cites.
    126. Review of blockchain-based DNS alternatives“. HU Wei-hong, AO Meng, SHI Lin…. 2017. infocomm-journal.com 网络与信息安全 …. 4 cites.
    127. zkLedger: Privacy-Preserving Auditing for Distributed Ledgers“. N Narula, W Vasquez, M Virza. 2018. usenix.org auditing. 4 cites.
    128. Analysis of the bitcoin blockchain: Socio-economic factors behind the adoption“. F Parino, L Gauvin, MG Beiro. 2018. arxiv.org arXiv preprint arXiv:1804.07657. 4 cites.
    129. IoT-forensics meets privacy: towards cooperative digital investigations“. A Nieto, R Rios, J Lopez. 2018. mdpi.com Sensors. 4 cites.
    130. Blockchain for good? Digital ledger technology and sustainable development goals“. R Adams, B Kewell, G Parry. 2018. Springer … of sustainability and social science research. 4 cites.
    131. Sustainable blockchain through proof of exercise“. A Shoker. 2017. ieeexplore.ieee.org Network Computing and Applications (NCA), 2017 …. 4 cites.
    132. Virtualization for Distributed Ledger Technology (vDLT)“. FR Yu, J Liu, Y He, P Si, Y Zhang. 2018. ieeexplore.ieee.org IEEE Access. 4 cites.
    133. Could network information facilitate address clustering in Bitcoin?“. T Neudecker, H Hartenstein. 2017. Springer … on Financial Cryptography and Data Security. 4 cites.
    134. What was Bitcoin, what will it be? The techno-economic imaginaries of a new money technology“. L Swartz. 2018. Taylor & Francis Cultural Studies. 4 cites.
    135. Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger“. E Kokoris-Kogias, EC Alp, SD Siby, N Gailly…. 2018. eprint.iacr.org . 4 cites.
    136. Virtual Currencies, Distributed Ledgers and the Future of Financial Services“. V Brühl. 2017. Springer Intereconomics. 4 cites.
    137. Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core“. L Van Der Horst, KKR Choo, NA Le-Khac. 2017. ieeexplore.ieee.org IEEE Access. 4 cites.
    138. Anonymity properties of the bitcoin p2p network“. G Fanti, P Viswanath. 2017. arxiv.org arXiv preprint arXiv:1703.08761. 4 cites.
    139. Go with the-Bitcoin-flow, with visual analytics“. S Bistarelli, F Santini. 2017. dl.acm.org Proceedings of the 12th International Conference …. 4 cites.
    140. Business model innovation and value-creation: the triadic way“. TW Andreassen, L Lervik-Olsen…. 2018. emeraldinsight.com Journal of Service …. 4 cites.
    141. On a decentralized trustless pseudo-random number generation algorithm“. S Popov. 2017. degruyter.com Journal of Mathematical Cryptology. 4 cites.
    142. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts“. L Breidenbach, IC Cornell Tech, P Daian…. 2018. eprint.iacr.org … ({USENIX} Security 18 …. 4 cites.
    143. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem.“. MH Ibrahim. 2017. works.bepress.com IJ Network Security. 4 cites.
    144. Cryptocurrencies: Economic benefits and risks“. O Nica, K Piotrowska, KR Schenk-Hoppé. 2017. papers.ssrn.com . 4 cites.
    145. Decentralized processing of global naming systems“. ALI Muneeb, S Ryan, J Nelson. 2017. Google Patents US Patent App. 15/433,957. 4 cites.
    146. Fairness in an unfair world: Fair multiparty computation from public bulletin boards“. AR Choudhuri, M Green, A Jain, G Kaptchuk…. 2017. dl.acm.org Proceedings of the 2017 …. 4 cites.
    147. Kryptomarkeder i en dansk og skandinavisk kontekst“. J Demant, R Munksgaard. 2017. curis.ku.dk Copenhagen: Justitsministeriet. 4 cites.
    148. Our Humanity Exposed: Predictive Modelling in a Legal Context“. S Greenstein. 2017. diva-portal.org . 4 cites.
    149. A Survey on Anonymity and Privacy in Bitcoin-like Digital Cash Systems“. MCK Khalilov, A Levi. 2018. ieeexplore.ieee.org IEEE Communications Surveys & …. 3 cites.
    150. An e-voting protocol based on blockchain“. Y Liu, Q Wang. 2017. pdfs.semanticscholar.org IACR Cryptol. ePrint Arch., Santa Barbara …. 3 cites.
    151. Overcoming Limits of Blockchain for IoT Applications“. F Buccafurri, G Lax, S Nicolazzo, A Nocera. 2017. dl.acm.org Proceedings of the 12th …. 3 cites.
    152. BIDaaS: blockchain based ID as a service“. JH Lee. 2018. ieeexplore.ieee.org IEEE Access. 3 cites.
    153. Dl-bac: Distributed ledger based access control for web applications“. L Xu, L Chen, N Shah, Z Gao, Y Lu, W Shi. 2017. dl.acm.org Proceedings of the 26th …. 3 cites.
    154. A petri nets model for blockchain analysis“. A Pinna, R Tonelli, M Orrú, M Marchesi. 2018. academic.oup.com The Computer Journal. 3 cites.
    155. Attack of the 50 foot blockchain: Bitcoin, blockchain, Ethereum & smart contracts“. D Gerard. 2017. books.google.com . 3 cites.
    156. Initial Coin Offering (ICO) Risk, Value and Cost in Blockchain Trustless Crypto Markets“. P Venegas. 2017. papers.ssrn.com . 3 cites.
    157. Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing“. X Zhang, X Chen, J Wang, Z Zhan, J Li. 2018. Springer Soft Computing. 3 cites.
    158. Consensus methods in blockchain systems“. J Debus. 2017. explore-ip.com … Finance & Management, Blockchain Center, Tech. Rep. 3 cites.
    159. Are Cryptocurrencies Criminals Best Friends? Examining the Co-Evolution of Bitcoin and Darknet Markets“. C Janze. 2017. aisel.aisnet.org . 3 cites.
    160. Smartcast: An incentive compatible consensus protocol using smart contracts“. A Kothapalli, A Miller, N Borisov. 2017. Springer International Conference on Financial …. 3 cites.
    161. Distributed Random Process for a Large-Scale Peer-to-Peer Lottery“. S Grumbach, R Riemann. 2017. Springer IFIP International Conference on Distributed …. 3 cites.
    162. On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective“. M Conti, A Gangwal, S Ruj. 2018. arxiv.org arXiv preprint arXiv:1804.01341. 3 cites.
    163. Contratos electronicos autoejecutables (smart contract) y pagos con tecnología blockchain“. M Echebarría Sáenz. 2017. uvadoc.uva.es . 3 cites.
    164. La Révolution Blockchain: Algorithmes ou institutions, à qui donnerez-vous votre confiance?“. P Rodriguez. 2017. Dunod . 3 cites.
    165. Raziel: private and verifiable smart contracts on blockchains“. DC Sánchez. 2018. arxiv.org arXiv preprint arXiv:1807.09484. 3 cites.
    166. Man in the cloud (mitc) defender: Sgx-based user credential protection for synchronization applications in cloud computing platform“. X Liang, S Shetty, L Zhang…. 2017. ieeexplore.ieee.org … (CLOUD), 2017 IEEE …. 3 cites.
    167. Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis) Used by Carders on Cryptomarkets“. GJ van Hardeveld, C Webber…. 2017. journals.sagepub.com American Behavioral …. 3 cites.
    168. Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control.“. G Kaptchuk, I Miers, M Green. 2017. pdfs.semanticscholar.org IACR Cryptology ePrint …. 3 cites.
    169. Coc: A unified distributed ledger based supply chain management system“. Z Gao, L Xu, L Chen, X Zhao, Y Lu, W Shi. 2018. Springer Journal of Computer Science …. 3 cites.
    170. Double-spending Prevention for Bitcoin zero-confirmation transactions.“. C Pérez-Solà, S Delgado-Segura…. 2017. pdfs.semanticscholar.org IACR Cryptology …. 3 cites.
    171. The Next Grand Challenges: Integrating the Internet of Things and Data Science“. R Ranjan, O Rana, S Nepal, M Yousif…. 2018. ieeexplore.ieee.org IEEE Cloud …. 3 cites.
    172. An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks“. J Tobin, C Thorpe, L Murphy. 2017. ieeexplore.ieee.org … Technology Conference (VTC …. 3 cites.
    173. Bitcoin: Drivers and Impediments“. T Ermakova, B Fabian, A Baumann, M Izmailov…. 2017. papers.ssrn.com . 3 cites.
    174. TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing for Disintermediation“. H Ritzdorf, K Wüst, A Gervais, G Felley…. 2017. pdfs.semanticscholar.org IACR ePrint …. 3 cites.
    175. How Money Got Free: Bitcoin and the Fight for the Future of Finance“. BP Eha. 2017. books.google.com . 3 cites.
    176. 区块链技术: 架构及进展“. 邵奇峰, 金澈清, 张召, 钱卫宁, 周傲英. 2018. cjc.ict.ac.cn 计算机学报. 3 cites.
    177. A Large-scale Analysis of Content Modification by Open HTTP Proxies“. G Tsirantonakis, P Ilia, S Ioannidis…. 2018. pdfs.semanticscholar.org Network and …. 3 cites.
    178. Authenticated data redaction with fine-grained control“. J Ma, J Liu, X Huang, Y Xiang…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 3 cites.
    179. Bitcoin regulations and investigations: A proposal for US policies“. JP Fawcett. 2017. infoskirmish.com . 3 cites.
    180. Elastic symbiotic scaling of operators and resources in stream processing systems“. F Lombardi, L Aniello, S Bonomi…. 2018. ieeexplore.ieee.org IEEE Transactions on …. 3 cites.
    181. Cognitive Hyperconnected Digital Transformation: Internet of Things Intelligence Evolution“. O Vermesan, J Bacquet. 2017. books.google.com . 3 cites.
    182. Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures“. M Drijvers, K Edalatnejad, B Ford, G Neven. 2018. eprint.iacr.org . 3 cites.
    183. The European Insurance Industry: A PEST Analysis“. C Barbara, D Cortis, R Perotti, C Sammut…. 2017. mdpi.com International Journal of …. 3 cites.
    184. Encyclopedia of Cyber Warfare“. PJ Springer. 2017. books.google.com . 3 cites.
    185. Privacy-aware and blockchain connected gateways for users to access legacy IoT devices“. SC Cha, TY Tsai, WC Peng…. 2017. ieeexplore.ieee.org … (GCCE), 2017 IEEE …. 2 cites.
    186. A Framework for Blockchain Based Secure Smart Green House Farming“. AS Patil, BA Tama, Y Park, KH Rhee. 2017. Springer Advances in Computer Science and …. 2 cites.
    187. Improving the Anonymity of the IOTA Cryptocurrency“. L Tennant. 2017. pdfs.semanticscholar.org . 2 cites.
    188. Lelantos: A blockchain-based anonymous physical delivery system“. R AlTawy, M ElSheikh, AM Youssef…. 2017. ieeexplore.ieee.org … Conference on Privacy …. 2 cites.
    189. Mapping the Global Legal Landscape of Blockchain and Other Distributed Ledger Technologies“. JA Maupin. 2017. papers.ssrn.com . 2 cites.
    190. Blockchain-based security solutions for iot systems“. G Pulkkis, J Karlsson, M Westerlund. 2018. books.google.com . 2 cites.
    191. Blockchain and cryptocurrencies: Model, techniques, and applications“. Y Yuan, FY Wang. 2018. ieeexplore.ieee.org IEEE Transactions on Systems, Man, and …. 2 cites.
    192. Toward a Philosophy of Blockchain: A Symposium: Introduction“. M Swan, P De Filippi. 2017. Wiley Online Library Metaphilosophy. 2 cites.
    193. A Secure Cryptocurrency Scheme based on Post-Quantum Blockchain“. Y Gao, X Chen, Y Sun, X Niu, Y Yang. 2018. ieeexplore.ieee.org IEEE Access. 2 cites.
    194. Supporting users to take informed decisions on privacy settings of personal devices“. I Torre, OR Sanchez, F Koceva, G Adorni. 2018. dl.acm.org Personal and Ubiquitous …. 2 cites.
    195. Blockchain and the future of money and finance: a qualitative exploratory study of blockchain technology and implications for the monetary and financial system“. R Alvseike, GAG Iversen. 2017. brage.bibsys.no . 2 cites.
    196. Automatic bitcoin address clustering“. D Ermilov, M Panov, Y Yanovich. 2017. ieeexplore.ieee.org Machine Learning and …. 2 cites.
    197. Doubly-efficient zkSNARKs without trusted setup“. RS Wahby, I Tzialla, A Shelat, J Thaler…. 2018. ieeexplore.ieee.org … Security and Privacy …. 2 cites.
    198. Virtual Currencies: Growing Regulatory Framework and Challenges in the Emerging Fintech Ecosystem“. VG Comizio. 2017. HeinOnline NC Banking Inst.. 2 cites.
    199. Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal“. S Goldwasser, S Park. 2017. dl.acm.org … 2017 on Workshop on Privacy in the Electronic …. 2 cites.
    200. The Onion Name System“. J Victors, M Li, X Fu. 2017. degruyter.com Proceedings on Privacy Enhancing …. 2 cites.
    201. Double-Blind Consent-Driven Data Sharing on Blockchain“. K Bhaskaran, P Ilfrich, D Liffman…. 2018. ieeexplore.ieee.org … (IC2E), 2018 IEEE …. 2 cites.
    202. A critical review of Bitcoins usage by cybercriminals“. B Shanmugam, S Azam, KC Yeo, J Jose…. 2017. ieeexplore.ieee.org Computer …. 2 cites.
    203. The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations“. F Massacci, CN Ngo, J Nie, D Venturi…. 2017. Springer … International Workshop on …. 2 cites.
    204. DIZK: A Distributed Zero-Knowledge Proof System“. H Wu, W Zheng, A Chiesa, RA Popa, I Stoica. 2018. eecs.berkeley.edu . 2 cites.
    205. A general framework for Bitcoin analytics“. M Bartoletti, A Bracciali, S Lande…. 2017. arxiv.org arXiv preprint arXiv …. 2 cites.
    206. Datenschutz“. R Petrlic, C Sorge. 2017. Springer . 2 cites.
    207. An Analysis of Bitcoin Laundry Services“. T de Balthasar, J Hernandez-Castro. 2017. Springer Nordic Conference on Secure IT …. 2 cites.
    208. Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions“. J Podolanko, J Ming, M Wright. 2017. ieee-security.org Workshop on Technology and …. 2 cites.
    209. Cryptocurrency Networks: A New P2P Paradigm“. S Delgado-Segura, C Pérez-Solà…. 2018. hindawi.com Mobile Information …. 2 cites.
    210. A Rule of Persons, Not Machines: The Limits of Legal Automation“. FA Pasquale. 2018. papers.ssrn.com . 2 cites.
    211. The State of Affairs in BGP Security: A Survey of Attacks and Defenses“. A Mitseva, A Panchenko, T Engel. 2018. Elsevier Computer Communications. 2 cites.
    212. Ransomware Payments in the Bitcoin Ecosystem“. M Paquet-Clouston, B Haslhofer, B Dupont. 2018. arxiv.org arXiv preprint arXiv …. 2 cites.
    213. Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers“. A Sonnino, M Al-Bassam, S Bano…. 2018. arxiv.org arXiv preprint arXiv …. 2 cites.
    214. Ransomware and the legacy crypto API“. C Le Guernic, A Legay. 2017. books.google.com Risks and Security of Internet and …. 2 cites.
    215. Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions“. E Politou, E Alepis, C Patsakis. 2018. academic.oup.com Journal of Cybersecurity. 2 cites.
    216. ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks“. L Zhu, M Li, Z Zhang, Z Qin. 2018. ieeexplore.ieee.org IEEE Transactions on Dependable …. 2 cites.
    217. Data mining for detecting Bitcoin Ponzi schemes“. M Bartoletti, B Pes, S Serusi. 2018. arxiv.org arXiv preprint arXiv:1803.00646. 2 cites.
    218. Holt-Winters Traffic Prediction on Aggregated Flow Data“. H Brügner. 2017. net.in.tum.de Future Internet (FI) and Innovative Internet …. 2 cites.
    219. Ancillary Services 4.0: A Top-to-Bottom Control-Based Approach for Solving Ancillary Service Problems in Smart Grids“. G De Zotti, SA Pourmousavi, H Madsen, NK Poulsen. 2018. core.ac.uk Ieee Access. 2 cites.
    220. Preserving transaction privacy in bitcoin“. Q Wang, B Qin, J Hu, F Xiao. 2017. Elsevier Future Generation Computer Systems. 2 cites.
    221. Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction“. O Uzunkol, O Kalkar, I Sertkaya. . researchgate.net. 2 cites.
    222. Crypto-Currencies: The 21st Century’s Money Laundering and Tax Havens“. EG Sánchez. 2017. HeinOnline U. Fla. JL & Pub. Pol’y. 2 cites.
    223. Deciphering Cryptocurrency: Shining a Light on the Deep Dark Web“. C DiPiero. 2017. HeinOnline U. Ill. L. Rev.. 2 cites.
    224. Lavinia: An audit-payment protocol for censorship-resistant storage“. C Bocovich, JA Doucette, I Goldberg. 2017. Springer International Conference on …. 2 cites.
    225. Erays: Reverse engineering ethereum’s opaque smart contracts“. Y Zhou, D Kumar, S Bakshi, J Mason, A Miller…. 2018. usenix.org Proceedings of the 27th …. 2 cites.
    226. NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform“. P Matias, P Barbosa, T Cardoso, D Mariano…. 2017. arxiv.org arXiv preprint arXiv …. 2 cites.
    227. Taxonomy of Blockchain Technologies. Principles of Identification and Classification“. P Tasca, C Tessone. 2018. papers.ssrn.com . 2 cites.
    228. Datenschutz: Einführung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie“. R Petrlic, C Sorge. 2017. books.google.com . 2 cites.
    229. Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles“. YY Shin, JK Lee, M Kim. 2018. aisel.aisnet.org Journal of the Association for Information …. 2 cites.
    230. Inventing the Cloud Century“. M Oppitz, P Tomsu. . Springer. 2 cites.
    231. Categorical anarchy in the UK? The British media’s classification of bitcoin and the limits of categorization“. JP Vergne, G Swain. 2017. emeraldinsight.com From Categories to Categorization …. 2 cites.
    232. Bobbies on the net: a police workforce for the digital age“. A Hitchcock, R Holmes, E Sundorph. 2017. reform.uk . 2 cites.
    233. A Social-Network-Based Cryptocurrency Wallet-Management Scheme“. S He, Q Wu, X Luo, Z Liang, D Li, H Feng…. 2018. ieeexplore.ieee.org IEEE …. 2 cites.
    234. Solution to Detect, Classify, and Report Illicit Online Marketing and Sales of Controlled Substances via Twitter: Using Machine Learning and Web Forensics to …“. T Mackey, J Kalyanam, J Klugman…. 2018. ncbi.nlm.nih.gov Journal of medical …. 2 cites.
    235. Software independence revisited“. RL Rivest, M Virza. 2017. people.csail.mit.edu … and Deployment. CRC Press, Boca Raton. 2 cites.
    236. Inventing the Cloud Century: How Cloudiness Keeps Changing Our Life, Economy and Technology“. M Oppitz, P Tomsu. 2017. books.google.com . 2 cites.
    237. BITCOIN: As inconsistências do Modelo“. GC Correia. 2017. comum.rcaap.pt . 2 cites.
    238. Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic“. I Nevat, DM Divakaran, SG Nagarajan…. 2018. dl.acm.org IEEE/ACM Transactions …. 2 cites.
    239. Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1. 0)“. WAA Torres, R Steinfeld, A Sakzad, JK Liu…. 2018. Springer … Security and Privacy. 1 cites.
    240. An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain.“. S Ma, Y Deng, D He, J Zhang, X Xie. 2017. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
    241. Auditable Zerocoin“. K Naganuma, M Yoshino, H Sato…. 2017. ieeexplore.ieee.org Security and Privacy …. 1 cites.
    242. ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain“. Y Lu, Q Tang, G Wang. 2018. arxiv.org arXiv preprint arXiv:1803.01256. 1 cites.
    243. When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis“. HA Jawaheri, MA Sabah, Y Boshmaf…. 2018. arxiv.org arXiv preprint arXiv …. 1 cites.
    244. Deanonymizing tor hidden service users through bitcoin transactions analysis“. HB Al Jawaheri. 2017. qspace.qu.edu.qa . 1 cites.
    245. Smart decentralization? The radical anti-establishment worldview of blockchain initiatives“. S Gabor. 2018. ceeol.com Smart Cities and Regional Development (SCRD) …. 1 cites.
    246. The Keep Network: A Privacy Layer for Public Blockchains“. M Luongo, C Pon. . miyapeeeeico.com. 1 cites.
    247. Multi-Agent Systems and Blockchain: Results from a Systematic Literature Review“. D Calvaresi, A Dubovitskaya, JP Calbimonte…. 2018. Springer … Conference on Practical …. 1 cites.
    248. Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning“. MA Harlev, H Sun Yin…. 2018. scholarspace.manoa.hawaii.edu … of the 51st …. 1 cites.
    249. Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin“. Y Liu, X Liu, C Tang, J Wang, L Zhang. 2018. ieeexplore.ieee.org IEEE Access. 1 cites.
    250. EPBC: Efficient Public Blockchain Client for lightweight users“. L Xu, L Chen, Z Gao, S Xu, W Shi. 2017. dl.acm.org Proceedings of the 1st Workshop on …. 1 cites.
    251. The Blockchain for Domain Based Static Sharding“. HK Yoo, J Yim, S Kim. 2018. ieeexplore.ieee.org … On Trust, Security And Privacy In …. 1 cites.
    252. Darknet Forensics“. D Rathod. 2017. academia.edu future. 1 cites.
    253. Blockchain Technologies from the Consumers’ Perspective: What Is There and Why Should Who Care?“. M Schlegel, L Zavolokina…. 2018. scholarspace.manoa.hawaii.edu … of the 51st …. 1 cites.
    254. Finding a healthier approach to managing medical data“. S Greengard. 2018. dl.acm.org Communications of the ACM. 1 cites.
    255. Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services“. L Zhou, G Wang, T Cui, X Xing. 2017. ieeexplore.ieee.org Ubiquitous Computing and …. 1 cites.
    256. A Secure Charging Scheme for Electric Vehicles with Smart Communities in Energy Blockchain“. Z Su, Y Wang, Q Xu, M Fei, YC Tian…. 2018. ieeexplore.ieee.org IEEE Internet of Things …. 1 cites.
    257. User behavior profile in a blockchain“. RA Ford, BL Swafford, CB Shirey…. 2018. Google Patents US Patent …. 1 cites.
    258. BlockONet: Blockchain-based Trusted Cloud Radio over Optical Fiber Network for 5G Fronthaul“. H Yang, Y Wu, J Zhang, H Zheng, Y Ji…. 2018. osapublishing.org Optical Fiber …. 1 cites.
    259. Blockchain-based trusted authentication in cloud radio over fiber network for 5g“. H Yang, H Zheng, J Zhang, Y Wu…. 2017. ieeexplore.ieee.org … and Networks (ICOCN) …. 1 cites.
    260. Machine learning for money laundering detection in the block chain financial transaction system“. S Jovicic, Q Tan. 2018. ajol.info Journal of Fundamental and Applied Sciences. 1 cites.
    261. Let us not forget: Crypto means secret. Cryptocurrencies as enabler of unethical and illegal business and the question of regulation“. P Seele. 2018. Springer Humanistic Management Journal. 1 cites.
    262. Identity Aging: Efficient Blockchain Consensus“. M Ahmed, K Kostiainen. 2018. arxiv.org arXiv preprint arXiv:1804.07391. 1 cites.
    263. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks“. P Moreno-Sanchez, A Kate, M Maffei. 2017. researchgate.net . 1 cites.
    264. On cryptocurrencies, digital assets and private money“. A Sehra, R Cohen…. 2018. ingentaconnect.com Journal of Payments …. 1 cites.
    265. Bitcoin transactions: a digital discovery of illicit activity on the blockchain“. A Turner, ASM Irwin. 2018. emeraldinsight.com Journal of Financial Crime. 1 cites.
    266. Regulation of Cryptocurrencies and Blockchain Technologies: National and International Perspectives“. R Girasa. 2018. Springer . 1 cites.
    267. Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance“. M Dawson, JA Cárdenas-Haro. 2017. igi-global.com … and the Internet of Things (IJHIoT). 1 cites.
    268. Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution“. O Leiba, Y Yitzchak, R Bitton, A Nadler…. 2018. arxiv.org arXiv preprint arXiv …. 1 cites.
    269. Privacy Preserving Verifiable Key Directories.“. M Chase, A Deshpande, E Ghosh. 2018. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
    270. Blockchain futures: With or without Bitcoin?“. B Kewell, P Michael Ward. 2017. Wiley Online Library Strategic Change. 1 cites.
    271. Analysis of Scalable Blockchain Technology in the Capital Market“. C Jonéus. 2017. diva-portal.org . 1 cites.
    272. Secure and Reliable Internet of Things Systems for Healthcare“. G Pulkkis, J Karlsson, M Westerlund…. 2017. computer.org 2017 IEEE 5th …. 1 cites.
    273. Network Publicy Governance: On Privacy and the Informational Self“. A Belliger, DJ Krieger. 2018. books.google.com . 1 cites.
    274. Shared Ledger Accounting-Implementing the Economic Exchange Pattern in DL Technology“. H Weigand, I Blums, J de Kruijff. 2018. Springer International Conference on Advanced …. 1 cites.
    275. A Bit Like Cash: Understanding Cash-for-Bitcoin Transactions Through Individual Vendors“. SJ Robberson. 2017. search.proquest.com . 1 cites.
    276. An Opinion on the” Report on Securing and Growing the Digital Economy”“. N Kshetri. 2017. ieeexplore.ieee.org IEEE Security & Privacy. 1 cites.
    277. Government 3.0–Next Generation Government Technology Infrastructure and Services: Roadmaps, Enabling Technologies & Challenges“. A Ojo, J Millard. 2017. books.google.com . 1 cites.
    278. Uso de blockchain para privacidade e segurança em internet das coisas“. VR Chicarino, EF Jesus…. 2017. researchgate.net Livro de Minicursos …. 1 cites.
    279. Digital rights management: blockchain and digital music content management“. M Martén. 2017. jyx.jyu.fi . 1 cites.
    280. Z-channel: Scalable and efficient scheme in Zerocash“. Y Zhang, Y Long, Z Liu, Z Liu, D Gu. 2018. Springer … on Information Security and Privacy. 1 cites.
    281. DataBright: Towards a Global Exchange for Decentralized Data Ownership and Trusted Computation“. D Dao, D Alistarh, C Musat, C Zhang. 2018. arxiv.org arXiv preprint arXiv:1802.04780. 1 cites.
    282. Security Issues in Named Data Networks“. T Chatterjee, S Ruj, SD Bit. 2018. ieeexplore.ieee.org Computer. 1 cites.
    283. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning“. HS Yin, R Vatrapu. 2017. ieeexplore.ieee.org Big Data (Big Data), 2017 IEEE …. 1 cites.
    284. The blockchain technology and its applications in the financial sector“. L Jutila. 2017. aaltodoc.aalto.fi . 1 cites.
    285. Contratos electronicos autoejecutables (smart contract) y pagos con tecnología blockchain“. ME Sáenz. 2017. dialnet.unirioja.es Revista de estudios europeos. 1 cites.
    286. A new approach to deanonymization of unreachable bitcoin nodes“. ID Mastan, S Paul. 2018. eprint.iacr.org . 1 cites.
    287. Trusted 5G Vehicular Networks: Blockchains and Content-Centric Networking“. V Ortega, F Bouchmal…. 2018. ieeexplore.ieee.org IEEE Vehicular …. 1 cites.
    288. Obscuro: A Bitcoin Mixer using Trusted Execution Environments.“. M Tran, L Luu, MS Kang, I Bentov…. 2017. allquantor.at IACR Cryptology ePrint …. 1 cites.
    289. Shadow markets and hierarchies: comparing and modeling networks in the Dark Net“. JR NORGAARD, HJ WALBERT…. 2018. cambridge.org Journal of Institutional …. 1 cites.
    290. A Simpler Bitcoin Voting Protocol“. H Tian, L Fu, J He. 2017. Springer International Conference on Information Security and …. 1 cites.
    291. Modern Methods of Financing Terrorism in a Global and Intercultural Society: Crypto-Currency“. C Carata. 2017. ceeol.com Internal Conference RCIC. 1 cites.
    292. FuturesMEX: Secure, Distributed Futures Market Exchange“. F Massacci, CN Ngo, J Nie, D Venturi…. 2018. ieeexplore.ieee.org … Security and Privacy  …. 1 cites.
    293. Non-Interactive Zero-Knowledge Proofs for Composite Statements“. S Agrawal, C Ganesh, P Mohassel. 2018. Springer Annual International Cryptology …. 1 cites.
    294. Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model“. P Papadopoulos, P Ilia, EP Markatos. 2018. arxiv.org arXiv preprint arXiv:1806.01994. 1 cites.
    295. Solomon W. Golomb—Mathematician, Engineer, and Pioneer“. G Gong, T Helleseth, PV Kumar. 2018. ieeexplore.ieee.org IEEE Transactions on …. 1 cites.
    296. Guru: Universal Reputation Module for Distributed Consensus Protocols“. A Biryukov, D Feher, D Khovratovich. 2017. publications.uni.lu . 1 cites.
    297. The disenchantment of Bitcoin: unveiling the myth of a digital currency“. F Corradi, P Höfner. 2018. Taylor & Francis International Review of Sociology. 1 cites.
    298. A Bit (Coin) of a Problem for the EU AML Framework“. M Egan. 2018. Springer The Palgrave Handbook of Criminal and Terrorism …. 1 cites.
    299. Managing Software Crisis: A Smart Way to Enterprise Agility“. SV Zykov. 2018. Springer . 1 cites.
    300. Securing the Integrity of Workflows in IoT“. P Kasinathan, J Cuellar. . researchgate.net. 1 cites.
    301. Trust and verifiable computation for smart contracts in permissionless blockchains“. D Harz. 2017. diva-portal.org . 1 cites.
    302. Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques“. I Nadir, T Bakhshi. 2018. ieeexplore.ieee.org Computing, Mathematics and Engineering …. 1 cites.
    303. ZombieCoin 2.0: managing next-generation botnets using Bitcoin“. ST Ali, P McCorry, PHJ Lee, F Hao. 2018. Springer International Journal of Information …. 1 cites.
    304. Proving the correct execution of concurrent services in zero-knowledge (extended version)“. S Setty, S Angel, T Gupta, J Lee. 2018. eprint.iacr.org . 1 cites.
    305. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense“. RK Konoth, E Vineti, V Moonsamy…. 2018. veelasha.org Proceedings of the …. 1 cites.
    306. Complying with Data Handling Requirements in Cloud Storage Systems“. M Henze, R Matzutt, J Hiller, E Mühmer…. 2018. arxiv.org arXiv preprint arXiv …. 1 cites.
    307. Information security model of block chain based on intrusion sensing in the IoT environment“. D Li, Z Cai, L Deng, X Yao, HH Wang. 2018. Springer Cluster Computing. 1 cites.
    308. Economics of Illicit Behaviors: Exchange in the Internet Wild West“. JR Norgaard. 2017. search.proquest.com . 1 cites.
    309. Nucypher KMS: decentralized key management system“. M Egorov, ML Wilkison, D Nuñez. 2017. arxiv.org arXiv preprint arXiv:1707.06140. 1 cites.
    310. Internet Voting Using Zcash“. P Tarasov, H Tewari. 2017. scss.tcd.ie . 1 cites.
    311. Digital Economy and Sustainability“. C Rappitsch. 2017. oikos-international.org Associate report, oikos. 1 cites.
    312. Anonymous Post-Quantum Cryptocash⋆(Full Version)“. H Zhang, F Zhang, H Tian, MH Au. 2017. eprint.iacr.org . 1 cites.
    313. DelegaTEE: Brokered Delegation Using Trusted Execution Environments“. S Matetic, M Schneider, A Miller, A Juels…. 2018. eprint.iacr.org 27th {USENIX} Security …. 1 cites.
    314. In digital we trust: Bitcoin discourse, digital currencies, and decentralized network fetishism“. J Baldwin. 2018. nature.com Palgrave Communications. 1 cites.
    315. Bitcoin redux“. R Anderson, I Shumailov, M Ahmed, A Rietmann. 2018. cl.cam.ac.uk . 1 cites.
    316. On Enforcing the Digital Immunity of a Large Humanitarian Organization“. S Le Blond, A Cuevas…. 2018. computer.org On Enforcing the …. 1 cites.
    317. Algorithmic Sovereignty“. D Roio. 2018. pearl.plymouth.ac.uk . 1 cites.
    318. The Wisdom of Crowds and Information Cascades in Fintech: Evidence from Initial Coin Offerings“. J Lee, T Li, D Shin. 2018. papers.ssrn.com . 1 cites.
    319. An anatomy of trust in public key infrastructure“. J Huang, DM Nicol. 2017. researchgate.net International Journal of Critical …. 1 cites.
    320. Where iS the information on uSD/Bitcoin hourly priceS?“. H Sebastião, AP Duarte, G Guerreiro. 2018. books.google.com Notas Económicas n. º 45. 1 cites.
    321. Towards Trustworthy Online Voting: Distributed Aggregation of Confidential Data“. R Riemann. 2017. tel.archives-ouvertes.fr . 1 cites.
    322. The computing profession“. PJ Denning. 2018. dl.acm.org Communications of the ACM. 1 cites.
    323. Towards an accountable software-defined networking architecture“. BE Ujcich, A Miller, A Bates…. 2017. ieeexplore.ieee.org … (NetSoft), 2017 IEEE …. 1 cites.
    324. SingularityNET: A decentralized, open market and inter-network for AIs“. B Goertzel, S Giacomelli, D Hanson, C Pennachin…. 2017. icotokn.com . 1 cites.
    325. Cryptocurrencies: Concept and Current Market Structure“. O Nica, K Piotrowska, KR Schenk-Hoppé. 2017. papers.ssrn.com . 1 cites.
    326. The People Vs Tech: How the internet is killing democracy (and how we save it)“. J Bartlett. 2018. Random House . 1 cites.
    327. Cryptography“. WJ Buchanan. 2017. books.google.com . 1 cites.
    328. A Computational Perspective of Adaptive Instructional Systems for Standards Design“. V Rus, AC Graesser, X Hu, JL Cockroft. 2018. gifttutoring.org Artificial Intelligence in …. 1 cites.
    329. A decentralised energy trading architecture for future smart grid load balancing“. S Hijgenaar, Z Erkin, T Keviczky…. 2017. ieeexplore.ieee.org Smart Grid …. 1 cites.
    330. The 4th Industrial Revolution: Responding to the Impact of Artificial Intelligence on Business“. M Skilton, F Hovsepian. 2017. books.google.com . 1 cites.
    331. Cascading Losses in Reinsurance Networks“. A Klages-Mundt, A Minca. 2018. arxiv.org arXiv preprint arXiv:1805.12222. 1 cites.
    332. Risk culture and banking supervision“. A Carretta, V Farina, P Schwizer. 2017. emeraldinsight.com Journal of Financial …. 1 cites.
    333. Transport and Communications Architecture 2030 and 2050. Final report by rapporteurs“. E Aho, L Lyly, I Mero. 2017. julkaisut.valtioneuvosto.fi . 1 cites.
    334. Uma agenda para o direito ao esquecimento no Brasil“. B de Lima Acioli, MAAE Júnior. 2018. publicacoesacademicas.uniceub.br Revista …. 1 cites.
    335. Real Trends: The Future of Real Estate in the United States“. A Saiz, A Salazar. 2017. papers.ssrn.com . 1 cites.
    336. Internet delle cose: Dati, sicurezza e reputazione“. I Corradini. 2017. FrancoAngeli . 1 cites.
    337. The 2017 Brookings Financial and Digital Inclusion Project Report“. RJ Lewis, JD Villaseñor, DM West. 2017. brookings.edu Brookings Institution. 1 cites.
    338. Blockchain Access Privacy: Challenges and Directions“. R Henry, A Herzberg, A Kate. 2018. ieeexplore.ieee.org IEEE Security & Privacy. 0 cites.
    339. Security and Privacy in Blockchain Environments“. M Attacks. . researchgate.net. 0 cites.
    340. The Fog Token And Protocol Architecture“. N Burns. . fog.cx. 0 cites.
    341. A Flexible Network Approach to Privacy of Blockchain Transactions“. D Mödinger, H Kopp, F Kargl…. 2018. ieeexplore.ieee.org 2018 IEEE 38th …. 0 cites.
    342. Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1. 0)“. J Cheng. . Springer Information Security and Privacy. 0 cites.
    343. BlockTag: Design and applications of a tagging system for blockchain analysis“. Y Boshmaf, HA Jawaheri, MA Sabah. 2018. arxiv.org arXiv preprint arXiv:1809.06044. 0 cites.
    344. The Evolution of Embedding Metadata in Blockchain Transactions“. T Faisal, N Courtois, A Serguieva. 2018. arxiv.org arXiv preprint arXiv:1806.06738. 0 cites.
    345. A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain“. H Zhou, Y Niu, J Liu, C Zhang, L Wei…. 2018. Springer … Conference on Wireless …. 0 cites.
    346. Blockchain: Anonymisation Techniques within Distributed Ledgers“. U Anwar. . researchgate.net. 0 cites.
    347. Blockchain Technology and Smart Contracts: Privacy-preserving Tools“. J Bergquist. 2017. diva-portal.org . 0 cites.
    348. Privacy in Blockchain Systems“. J Wahab. 2018. arxiv.org arXiv preprint arXiv:1809.10642. 0 cites.
    349. BDUA: Blockchain-Based Data Usage Auditing“. N Kaaniche, M Laurent. 2018. computer.org 2018 IEEE 11th International Conference on …. 0 cites.
    350. Blockchain: The perfect data protection tool“. A Nayak, K Dutta. 2017. ieeexplore.ieee.org Intelligent Computing and Control (I2C2) …. 0 cites.
    351. ZoKrates-Scalable Privacy-Preserving Off-Chain Computations“. J Eberhardt, S Tai. . ise.tu-berlin.de. 0 cites.
    352. On blockchain security and relevant attacks“. J Moubarak, E Filiol, M Chamoun. 2018. ieeexplore.ieee.org … (MENACOMM), IEEE Middle …. 0 cites.
    353. Special issue on recent trends in cryptography“. T Helleseth, B Preneel. 2018. Springer Cryptography and Communications. 0 cites.
    354. The Dusk Network And Blockchain Architecture“. E Francioni, F Venturelli. 2018. icosbull.com . 0 cites.
    355. EuroSPW 2017“. H Halpin, M Piekarska. . ieeexplore.ieee.org. 0 cites.
    356. Money Laundering and Terrorist Financing through the Onion Routing (on the Example of TOR Browser)“. SD Laishevskii, AV Politova…. 2018. knepublishing.com KnE Social Sciences. 0 cites.
    357. Poster: Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin⇤“. T Ruffing, P Moreno-Sanchez. . pdfs.semanticscholar.org. 0 cites.
    358. A Novel Blockchain-Based Authenticated Key Exchange Protocol and Its Applications“. H Yao, C Wang. 2018. ieeexplore.ieee.org 2018 IEEE Third International Conference on …. 0 cites.
    359. Tamper-Proof Privacy Auditing for Artificial Intelligence Systems.“. A Sutton, R Samavi. 2018. ijcai.org IJCAI. 0 cites.
    360. THE FUTURE OF PRIVACY AND CYBERSECURITY“. J ZENG. 2018. cloudfront.escholarship.org Berkeley Scientific Journal. 0 cites.
    361. Crave Financial Privacy“. CC Team. 2018. crave.cc . 0 cites.
    362. Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems“. TP Keenan. 2017. ieeexplore.ieee.org … Annual Conference on Privacy, Security and Trust …. 0 cites.
    363. A Cloud Data Movement Policy Architecture Based on Smart Contracts and the Ethereum Blockchain“. S Kirkman, R Newman. 2018. ieeexplore.ieee.org Cloud Engineering (IC2E), 2018 IEEE …. 0 cites.
    364. Designing Privacy-Preserving Blockchain Based Accounting Information Systems“. Y Wang, A Kogan. 2017. papers.ssrn.com . 0 cites.
    365. The Internet of Things ecosystem: the blockchain and data protection issues“. N Fabiano. . astesj.com. 0 cites.
    366. Authenticated Data Structures for Privacy-Preserving Monero Light Clients“. K Lee, A Miller. 2018. ieeexplore.ieee.org … European Symposium on Security and Privacy …. 0 cites.
    367. Privacy in decentralized cryptocurrencies“. D Genkin, D Papadopoulos…. 2018. dl.acm.org Communications of the …. 0 cites.
    368. Adoption of Security and Privacy Measures in Bitcoin–Stated and Actual Behavior“. B Fabian, T Ermakova, N Ahrary. 2018. researchgate.net … (Barber et al. 2012, Brito and …. 0 cites.
    369. DPS-Discuss: Demonstrating Decentralized, Pseudonymous, Sybil-resistant Communication“. S Friebe, M Florian. 2017. dl.acm.org Proceedings of the SIGCOMM Posters and Demos. 0 cites.
    370. A Flow-Level Architecture for Balancing Accountability and Privacy“. Y Ma, Y Wu, J Ge, J Li. 2018. ieeexplore.ieee.org … On Trust, Security And Privacy In …. 0 cites.
    371. DeSyPs: a decentralized, sybil-resistant, pseudonymous online discussion platform“. S Friebe, M Florian. 2017. ieeexplore.ieee.org Networked Systems (NetSys), 2017 …. 0 cites.
    372. The Future of Privacy“. C Berg. 2018. Springer The Classical Liberal Case for Privacy in a World of …. 0 cites.
    373. THE JPEG-BLOCKCHAIN FRAMEWORK FOR GLAM SERVICES“. D Bhowmik, A Natu, T Ishikawa, T Feng…. 2018. dspace.stir.ac.uk . 0 cites.
    374. USB Side-channel Attack on Tor“. Q Yang, P Gasti, K Balagani, Y Li, G Zhou. 2018. Elsevier Computer Networks. 0 cites.
    375. NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging“. H Halpin. 2017. dl.acm.org Proceedings of the 12th International Conference on …. 0 cites.
    376. USH for Anonymous and Unlinkable Coin Spending for BFDChain“. D Pu. . befund.io. 0 cites.
    377. BroncoVote: Secure Voting System using Ethereum’s Blockchain“. GG Dagher, PB Marella, M Milojkovic, J Mohler. 2018. scitepress.org . 0 cites.
    378. A decentralized, sybil-resistant, pseudonymous online discussion platform“. S Friebe, M Florian. . researchgate.net. 0 cites.
    379. Anonymization Technologies of Cryptocurrency Transactions as Money Laundering Instrument“. A Goriacheva, N Jakubenko, O Pogodina…. 2018. knepublishing.com KnE Social …. 0 cites.
    380. Blockchain Based Resource Management System“. K Dutta. 2017. papers.ssrn.com . 0 cites.
    381. SPB: A Secure Private Blockchain-based Solution for Energy Trading“. A Dorri, F Luo, SS Kanhere, R Jurdak…. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    382. Personal data vault management system and secured data access to service provider using blockchain technology“. R Girase. 2018. search.proquest.com . 0 cites.
    383. A Data Movement Policy Framework for Improving Trust in the Cloud Using Smart Contracts and Blockchains“. S Kirkman. 2018. ieeexplore.ieee.org Cloud Engineering (IC2E), 2018 IEEE International …. 0 cites.
    384. BitCoin Privacy“. TV Carstens. 2017. courses.cs.ut.ee . 0 cites.
    385. Privacy in Internet of Things: from Principles to Technologies“. C Li, B Palanisamy. 2018. ieeexplore.ieee.org IEEE Internet of Things Journal. 0 cites.
    386. Z Notation Formalization of Blockchain Healthcare Document Sharing Based on CRBAC“. T Ali. 2018. nicerjcs.com … APPLICATIONS (JICTRA).(Formally known as NICE …. 0 cites.
    387. Applications of Privacy and Security Research in the Upcoming Battlefield of Things“. L Fritsch, S Fischer-Hübner. 2018. books.google.com ECCWS 2018 17th European …. 0 cites.
    388. Unifying Lightweight Blockchain Client Implementations“. D Gruber, W Li, G Karame. . ndss-symposium.org. 0 cites.
    389. Efficient Power Markets: Reimagining the Global Market with Ethereum“. A Richard, R Hitchens. 2018. Elsevier … Climate Finance and Green Investment with …. 0 cites.
    390. Decentralized, Real-time Credit, Debit, and Crypto Payment Processing Network“. S Gomzin, D Itkis. 2017. icobazaar.com . 0 cites.
    391. Loamit: A Blockchain-based Residual Loanable-limit Query System“. L Zhoua, L Wanga, Y Suna, P Lva. . allquantor.at. 0 cites.
    392. Building the Decentralized Web: A Survey of Blockchain Projects Working to Construct Web 3.0“. I Lapham. . ianlapham.com. 0 cites.
    393. Verify-Your-Vote: A Verifiable Blockchain-based Online Voting Protocol“. M Chaieb, S Yousfi, P Lafourcade…. 2018. hal.archives-ouvertes.fr … and Middle Eastern …. 0 cites.
    394. Blockchain-based TLS Notary Service“. P Szalachowski. 2018. arxiv.org arXiv preprint arXiv:1804.00875. 0 cites.
    395. A Decision Support System for Blockchain Platform Selection“. JRQ Verkleij. 2018. dspace.library.uu.nl . 0 cites.
    396. Blockchain and individuals’ control over personal data in European data protection law“. L Moerel, E Bayamlıoğlu. 2017. . 0 cites.
    397. Coloured Ring Confidential Transactions“. F Engelmann, F Kargl, C Bösch. 2018. Springer … , Cryptocurrencies and Blockchain …. 0 cites.
    398. An Anonymous and Accountable Authentication Scheme for Wi-Fi Hotspot Access with the Bitcoin Blockchain“. Y Niu, L Wei, C Zhang, J Liu, Y Fang. . ieeexplore.ieee.org. 0 cites.
    399. Recent Developments in Blockchain“. V Dhillon, D Metcalf, M Hooper. 2017. Springer Blockchain Enabled Applications. 0 cites.
    400. Blockchain as a Service (BaaS): Providers and Trust“. J Singh, JD Michels. 2018. ieeexplore.ieee.org … Symposium on Security and Privacy …. 0 cites.
    401. Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network“. K Alachkar, D Gaastra. 2018. delaat.net . 0 cites.
    402. Applications of the Blockchain using Cryptography“. P McCorry. 2018. cs.ucl.ac.uk . 0 cites.
    403. Protecting Data Privacy in the Presence of Data Provenance“. P Kianmajd. 2017. search.proquest.com . 0 cites.
    404. Content Analysis of Dark Net Academic Journals from 2010-2017 Using KH Coder“. P Nattuthurai, A Aryal. . acet.ecs.baylor.edu. 0 cites.
    405. Smart Contract Applications within Blockchain Technology: A Systematic Mapping Study“. D Macrinici, C Cartofeanu, S Gao. 2018. Elsevier Telematics and Informatics. 0 cites.
    406. Private Smart Contracts“. S Goldfeder, A Narayanan. . petsymposium.org. 0 cites.
    407. A Pa ern Collection for Blockchain-based Applications“. X XU, C PAUTASSO, L ZHU, Q LU, I WEBER. 2018. researchgate.net network. 0 cites.
    408. A Decentralized Private Marketplace: DRAFT 0.1“. I Kaiser. . icotokn.com. 0 cites.
    409. Αccountable and privacy preserving data processing via distributed ledgers“. CS Nasikas. 2018. researchgate.net . 0 cites.
    410. Proposal for Protocol on a Quorum Blockchain with Zero Knowledge“. T Espel, L Katz, G Robin. 2017. eprint.iacr.org . 0 cites.
    411. Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid“. A Abidin, A Aly, S Cleemput, MA Mustafa. 2018. arxiv.org arXiv preprint arXiv:1801.08354. 0 cites.
    412. Blockchains and consensus protocols“. C Cachin, SS Osborne, A Sorniotti, M Vukolic. 2017. cachin.com . 0 cites.
    413. Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017 …“. X Lin, A Ghorbani, K Ren, S Zhu, A Zhang. 2018. books.google.com . 0 cites.
    414. GEEC: Scalable, Efficient, and Consistent Consensus for Blockchains“. X Chen, S Zhao, C Wang, S Zhang, H Cui. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    415. Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles“. C Huang, R Lu, X Lin, X Shen. 2018. ieeexplore.ieee.org IEEE Transactions on Vehicular …. 0 cites.
    416. Blockchain and the European Union’s General Data Protection Regulation: A Chance to Harmonize International Data Flows“. S Sater. 2017. papers.ssrn.com . 0 cites.
    417. Consortium Blockchain-based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network“. X Feng, J Ma, T Feng, Y Miao, X Liu. 2018. ieeexplore.ieee.org IEEE Access. 0 cites.
    418. Personal Internet Privacy and Surveillance: Implementation and evasion of user tracking“. J Jokinen. 2018. theseus.fi . 0 cites.
    419. Designing a cryptocurrency and a detailed analysis on anonymous schemes“. T Petri. . wwz.unibas.ch. 0 cites.
    420. Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain“. X Liang, S Shetty, D Tosh, Y Ji, D Li. . researchgate.net. 0 cites.
    421. Blockchain As a Service: Providers and Trust“. J Singh, JD Michels. 2017. papers.ssrn.com . 0 cites.
    422. Monero Ring Attack: Recreating Zero Mixin Transaction Effect“. DA Wijaya, J Liu, R Steinfeld…. 2018. ieeexplore.ieee.org … Trust, Security And Privacy …. 0 cites.
    423. Blockchain: Foundational Technology to Change the World“. E Khudnev. 2017. theseus.fi . 0 cites.
    424. Security and Privacy in Smart Cities: Challenges and Opportunities“. L Cui, G Xie, Y Qu, L Gao, Y Yang. 2018. ieeexplore.ieee.org IEEE Access. 0 cites.
    425. User behavior profile in a blockchain“. RA Ford, BL Swafford, CB Shirey…. 2018. freepatentsonline.com US Patent App. 15 …. 0 cites.
    426. UNBLOCKING THE BLOCKCHAIN: REGULATING DISTRIBUTED LEDGER TECHNOLOGY“. CG Bahlke, M Pecar. . stroock.com. 0 cites.
    427. PRCash: Centrally-Issued Digital Currency with Privacy and Regulation“. K Wüst, K Kostiainen, V Čapkun, S Čapkun. . eprint.iacr.org. 0 cites.
    428. {\em Crypto-Battleships} or How to play Battleships game over the Blockchain?“. G Barshap. 2018. arxiv.org arXiv preprint arXiv:1807.08142. 0 cites.
    429. The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?“. R Chalmers, GP Economy. 2018. openaccess.leidenuniv.nl . 0 cites.
    430. Distributed ledger technology in the capital market: Shared versus private information in a permissioned blockchain“. A Piccolo. 2017. diva-portal.org . 0 cites.
    431. Using the blockchain to add automated financial incentives to the Public Key Infrastructure“. J Fries. 2017. net.in.tum.de Network. 0 cites.
    432. CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments“. T Le, MW Mutka. 2018. ieeexplore.ieee.org 2018 IEEE International Conference on …. 0 cites.
    433. M-Tech in Cryptology and Security: Course Structure and Syllabus“. A Pool, B Pool. . isical.ac.in. 0 cites.
    434. The role of blockchain in revolutionizing and re-organizing security. Evidence and policy recommendations.“. GSAC MAGRASSI, F GUASTAMACCHIA…. . tesi.luiss.it. 0 cites.
    435. Privacy and Data Protection in the Domain Name System“. K Kelpen, H Simo. 2018. Springer Privatheit und selbstbestimmtes Leben in der digitalen …. 0 cites.
    436. M-Tech in Cryptology and Security: Tentative Course Structure and Syllabus“. A Pool, B Pool. . isical.ac.in. 0 cites.
    437. THE FUTURE OF E-VOTING.“. P Tarasov, H Tewari. 2017. researchgate.net … Journal on Computer Science & Information …. 0 cites.
    438. Blockchain to Improve Security and Knowledge in Inter-Agent Communication and Collaboration over a Restrict Domains of the Internet Infrastructure“. J Braga, JN Silva, PT Endo, J Ribas, N Omar. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    439. Digital Colonialism: US Empire and the New Imperialism in the Global South“. M Kwet. 2018. papers.ssrn.com . 0 cites.
    440. Applying privacy-enhancing technologies“. D Bosk, G Rodríguez-Cano…. 2018. books.google.com Protests in the …. 0 cites.
    441. Blockchain technology as infrastructure in public sector: an analytical framework“. S Ølnes, A Jansen. 2018. dl.acm.org Proceedings of the 19th Annual International …. 0 cites.
    442. Blockchain: the future?“. J Ahire. 2018. books.google.com . 0 cites.
    443. Direct Democracy on the Blockchain: The Extension of Popular Sovereignty by Technological Means“. G Tasner. 2018. openaccess.leidenuniv.nl . 0 cites.
    444. zk-SNARKs“. P Grontas. . corelab.ece.ntua.gr. 0 cites.
    445. A public blockchain solution permitting secure storage and deletion of private data—Draft“. B Stein, K Kuznecov, S Lee, J Müller. 2018. lition.io . 0 cites.
    446. Private transactions, decentralised communication.“. K Jefferys, S Harman, J Ross, P McLean. 2018. loki.network . 0 cites.
    447. PikcioChain: a new eco-system for personal data“. J Lartigau, F Bucamp, DC de Casaubon. . pikciochain.com. 0 cites.
    448. Towards a Decentralized Process for Scientific Publication and Peer Review using Blockchain and IPFS“. A Tenorio-Fornés, V Jacynycz, D Llop…. . atenor.io. 0 cites.
    449. Self-reported verifiable reputation with rater privacy“. R Bazin, A Schaub, O Hasan, L Brunie. 2017. Springer IFIP International Conference on …. 0 cites.
    450. Blockchain as a Tool for Contract Creation“. R Kuijpers. 2018. robkuijpers.eu . 0 cites.
    451. Monitoring Product Sales in Darknet Shops“. Y Yannikos, A Schäfer, M Steinebach. 2018. dl.acm.org Proceedings of the 13th …. 0 cites.
    452. Tandem: Securing Keys by Using a Central Server While Preserving Privacy“. W Lueks, B Hampiholi, G Alpár, C Troncoso. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    453. Blockchain Standard: Can We Reach Consensus?“. V Gramoli, M Staples. . gramoli.redbellyblockchain.io. 0 cites.
    454. Public Blockchain 기반의 익명성 전자투표 블록체인 플랫폼 모델“. 하현수, 이선준, 정구익, 신용구, 김명호…. 2017. dbpia.co.kr 한국정보과학회 학술발표 …. 0 cites.
    455. 11.(Shadow) banking on the blockchain: permissioned ledgers, interoperability and common standards“. AP Donovan. . books.google.com Research Handbook on Shadow Banking: Legal and …. 0 cites.
    456. Rapido: A Layer2 Payment System for Decentralized Currencies“. C Lin, M Ma, X Wang, Z Liu, J Chen, S Ji. 2018. arxiv.org arXiv preprint arXiv:1808.01561. 0 cites.
    457. Blockchain for peer-to-peer energy exchanges: Probabilistic approach of Proof of Stake“. D Vangulick, B Cornélusse, D Ernst. 2018. orbi.uliege.be CIRED WORKSHOP 2018. 0 cites.
    458. A BUSINESS MODEL FOR VEHICLE INSURANCE BASED ON BLOCKCHAIN SMART-CONTRACTS“. AF Carbone, LR Cavalcanti. . webthesis.biblio.polito.it. 0 cites.
    459. BLOCKCHAIN, LEADERSHIP AND MANAGEMENT: BUSINESS AS USUAL OR RADICAL DISRUPTION?“. TC Chartier-Rueg, TD Zweifel. 2017. eu-jr.eu EUREKA: Social and Humanities. 0 cites.
    460. Is Blockchain the Death of Antitrust Law? The Blockchain Antitrust Paradox“. T Schrepel. 2018. papers.ssrn.com . 0 cites.
    461. Numerical Comparison and Feasibility Evaluation of Several Privacy Bounds“. D Fischmann. 2018. research-collection.ethz.ch . 0 cites.
    462. Ethereum blockchain as a decentralized and autonomous key server: storing and extracting public keys through smart contracts“. PF Costa. . amslaurea.unibo.it. 0 cites.
    463. Technical Analysis of Established Blockchain Systems“. F Haffke. . wwwmatthes.in.tum.de. 0 cites.
    464. Decentralized Transactions in a Centralized Environment: A Blockchain Study Within the Transport Industry“. M Löf. 2017. diva-portal.org . 0 cites.
    465. Blockchain inefficiency in the Bitcoin peers network“. G Pappalardo, T Di Matteo, G Caldarelli, T Aste. 2018. Springer EPJ Data Science. 0 cites.
    466. Citowise–blockchain payment gateway“. ADD COIN. . citowise.com. 0 cites.
    467. HARNESSING THE POWERS OF BLOCKCHAIN AND ITS ASSISTIVE TECHNOLOGIES“. W BENDELLA, AF RUTKOWSKI, A RICARD. 2017. . 0 cites.
    468. Updatable and universal common reference strings with applications to zk-SNARKS“. J Groth, M Kohlweiss, M Maller, S Meiklejohn…. 2018. Springer Annual International …. 0 cites.
    469. Trusted Registration, Negotiation, and Service Evaluation in Multi-Agent Systems throughout the Blockchain Technology“. D Calvaresi, A Dubovitskaya, D Retaggi, AF Dragoni…. . researchgate.net. 0 cites.
    470. Efficient Zero-Knowledge Range Proofs in Ethereum“. T Koens, C Ramaekers, C van Wijk. . ingwb.com. 0 cites.
    471. Blockchain consensus and transaction layer adaptation for inter-domain security applications“. E Cesari. 2018. upcommons.upc.edu . 0 cites.
    472. Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace“. S Myers. . yjolt.org. 0 cites.
    473. 국제표준화기구 블록체인 및 분산원장기술 표준화 현황“. 박예슬, 오구영. 2017. dbpia.co.kr 한국통신학회 학술대회논문집. 0 cites.
    474. EU General Data Protection Regulation and Distributed Ledgers (Blockchain)“. M Walther. . researchgate.net. 0 cites.
    475. Blockchain in Telecom Sector: An Analysis of Potential Use Cases“. R Darmwal. 2017. search.proquest.com Telecom Business Review. 0 cites.
    476. Security-related experiences with Smart Contracts over the Ethereum Blockchain“. F Maughelli. . amslaurea.unibo.it. 0 cites.
    477. What Blockchain Can and Can’t Do for Copyright“. A Tresise, J Goldenfein, D Hunter. 2018. papers.ssrn.com . 0 cites.
    478. Inclusive FinTech: Blockchain, Cryptocurrency and ICO“. LDK Chuen, L Linda. 2018. books.google.com . 0 cites.
    479. Security and Privacy Preservation in Mobile Crowdsensing“. J Ni. 2018. uwspace.uwaterloo.ca . 0 cites.
    480. Toward a Political Sociology of Blockchain“. K Jones. 2018. qspace.library.queensu.ca . 0 cites.
    481. Developing a K-ary malware using Blockchain“. J Moubarak, E Filiol, M Chamoun. 2018. arxiv.org arXiv preprint arXiv:1804.01488. 0 cites.
    482. Creating a tokenized fund in the Ethereum blockchain“. L Gomez Quintana. 2017. theseus.fi . 0 cites.
    483. Blockchain enabled asset management in the case of X-Decks: Cooperation enhanced by decentralization in the building industry“. B Weihs. 2018. repository.tudelft.nl . 0 cites.
    484. DonorCoin: A Semi-Centralized Cryptocurrency for Donations“. S Radhakrishnan, S Balaji, D Polat. 2018. users.cs.duke.edu . 0 cites.
    485. Autonomous Collaborative Decentralized-Community Networks for Security-and Privacy-Critical Domains“. H Banerjee, V Ganapathy, S Murugaanandam. . . 0 cites.
    486. Deanonymization of Hidden Transactions in Zcash“. A Biryukov, D Feher. 2018. cryptolux.org . 0 cites.
    487. MedRec Meng Thesis“. N Nchinda. 2017. viral.media.mit.edu Viral Communications. 0 cites.
    488. 78 COMMUNICATIONS OF THE ACM| JUNE 2018| VOL. 61| NO. 6“. B GE, YA BOR, A YS, T OCK. 2018. dl.acm.org John Hennessy and David Patterson. 0 cites.
    489. On Scalability of Blockchain Technologies“. AE Gencer. 2017. search.proquest.com . 0 cites.
    490. Mixing Coins of Different Quality: A Game-Theoretic Approach“. S Abramova, P Schöttle, R Böhme. 2017. Springer International Conference on Financial …. 0 cites.
    491. Data Privacy-Preserving Automation Architecture for Industrial Data Exchange in Smart Cities“. Z Xiao, X Fu, RSM Goh. 2018. ieeexplore.ieee.org IEEE Transactions on Industrial …. 0 cites.
    492. Bring the Missing Jigsaw Back: TrustedClock for SGX Enclaves“. H Liang, M Li. 2018. dl.acm.org Proceedings of the 11th European Workshop on …. 0 cites.
    493. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage“. A Yang, J Xu, J Weng, J Zhou…. 2018. ieeexplore.ieee.org IEEE Transactions on …. 0 cites.
    494. Transaction processing for consortium blockchain network“. M Russinovich, M Costa, M Kerner…. 2018. Google Patents US Patent App. 15 …. 0 cites.
    495. Blockchain for Women Next Generation for Sustainable Development Goal 5.“. R Kamath. 2018. search.ebscohost.com Journal of Poverty Alleviation & International …. 0 cites.
    496. Barlaeus Dinner on Trust in Decentralized Data Infrastructures“. B Bodó, J Quintais, A Giannopoulou…. 2018. papers.ssrn.com Blockchain & Society …. 0 cites.
    497. Compact Ring Signature in the Standard Model for Blockchain“. H Ren, P Zhang, Q Shentu, JK Liu, TH Yuen. 2018. Springer International Conference on …. 0 cites.
    498. Robotics, artificial intelligence and distributed ledgers in surgery: data is key!“. M Chand, N Ramachandran, D Stoyanov, L Lovat. 2018. Springer . 0 cites.
    499. Establishment of consortium blockchain network“. M Russinovich, M Costa, M Kerner…. 2018. Google Patents US Patent App. 15 …. 0 cites.
    500. Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services“. Z Liu, Y Cao, M Zhu, W Ge. 2018. ieeexplore.ieee.org IEEE Transactions on Information …. 0 cites.
    501. Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Internet of Things Using Resource-efficient Cryptographic Schemes“. M Hossain. 2018. search.proquest.com . 0 cites.
    502. Consortium blockchain network with verified blockchain and consensus protocols“. M Russinovich, M Costa, M Kerner…. 2018. Google Patents US Patent App. 15 …. 0 cites.
    503. Blockchain Technology: Bitcoin as a case“. M Huhmo. 2018. theseus.fi . 0 cites.
    504. US Regulation of Blockchain Currencies: A Policy Overview“. A Brookes. 2018. HeinOnline Am. U. Intell. Prop. Brief. 0 cites.
    505. Investcoin: A System for Privacy-Preserving Investments“. F Valovich. 2017. arxiv.org arXiv preprint arXiv:1703.01284. 0 cites.
    506. PrivPy: Enabling Scalable and General Privacy-Preserving Computation“. Y Li, Y Duan, W Xu. 2018. arxiv.org arXiv preprint arXiv:1801.10117. 0 cites.
    507. Formal Proofs of Security for Privacy-Preserving Blockchains and other Cryptographic Protocols“. R Longo. 2018. eprints-phd.biblio.unitn.it . 0 cites.
    508. 개인정보보호를 고려한 블록체인 데이터 설계 방안 연구“. 이수현, 김혜리, 홍승필. 2018. dbpia.co.kr 한국통신학회 학술대회논문집. 0 cites.
    509. Blockchain Resource Pricing“. V Buterin. 2018. ethresear.ch . 0 cites.
    510. Blockchain Technology and its Applications A Promise Theory view-V0. 11“. JA Bergstra, M Burgess. 2018. markburgess.org . 0 cites.
    511. Born Global Market Dominators and Implications for the Blockchain Avantgarde“. S Wurster, M Böhmecke-Schwafert…. 2018. igi-global.com Corporate and Global …. 0 cites.
    512. Deployment of a Blockchain-Based Self-Sovereign Identity“. Q Stokkink, J Pouwelse. 2018. arxiv.org arXiv preprint arXiv:1806.01926. 0 cites.
    513. Identity plug-ins: Towards post-human theory of informational privacy“. M Tremčinský. 2017. dspace.cuni.cz . 0 cites.
    514. Betting on Blockchain Consensus with Fantomette“. S Azouvi, P McCorry, S Meiklejohn. 2018. arxiv.org arXiv preprint arXiv:1805.06786. 0 cites.
    515. Monero’s Building Blocks Part 10 of 10–Stealth addresses“. BEK Seguias. 2018. delfr.com . 0 cites.
    516. MEDCO: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data“. JL Raisaro, J Troncoso-Pastoriza…. 2018. ieeexplore.ieee.org … ACM transactions on …. 0 cites.
    517. Verge Trading Strategy–Amazing 2-Period RSI Day Trading System“. TS Guides. 2018. tradingstrategyguides.com . 0 cites.
    518. Privacy Dashcam–Towards Lawful Use of Dashcams Through Enforcement of External Anonymization“. J Beyerer. 2017. books.google.com … Management, Cryptocurrencies and Blockchain …. 0 cites.
    519. 프라이빗 블록체인 기반 전자투표시스템 구현“. 권용석, 김수형, 정치영, 주민건, 김태성…. 2018. dbpia.co.kr 한국통신학회 학술대회 …. 0 cites.
    520. A Domain Name Model of Anonymous Network Hidden Service“. Y Meng, J Fei, Y Chen, Y Zhu. 2018. Springer International Conference on Cloud …. 0 cites.
    521. Using Blockchain Technology in Distributed Storage Systems“. B Produit. 2018. courses.cs.ut.ee . 0 cites.
    522. A Practical De-mixing Algorithm for Bitcoin Mixing Services“. Y Hong, H Kwon, J Lee, J Hur. 2018. dl.acm.org Proceedings of the 2nd ACM Workshop …. 0 cites.
    523. IOTA Feasibility and Perspectives for Enabling Vehicular Applications“. PC Bartolomeu, E Vieira, J Ferreira. 2018. arxiv.org arXiv preprint arXiv:1808.10069. 0 cites.
    524. Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security“. R Chesney, DK Citron. 2018. papers.ssrn.com . 0 cites.
    525. Designing continuous audit analytics and fraud prevention systems using emerging technologies“. Y Wang. 2018. rucore.libraries.rutgers.edu . 0 cites.
    526. Verus Coin“. MJ Toutonghi, MF Toutonghi, AR English. 2018. veruscoin.io . 0 cites.
    527. 17th European Conference on Cyber Warfare and Security ECCWS 2018“. A Jøsang. . researchgate.net. 0 cites.
    528. On Blockchains and the General Data Protection Regulation“. LD Ibanez, K O’Hara, E Simperl. 2018. eprints.soton.ac.uk . 0 cites.
    529. Virtual currency and its pseudonymous users: A decentralised system beyond the control of authorities?“. EA Hegerstrøm. 2017. duo.uio.no . 0 cites.
    530. The dark web as a phenomenon: a review and research agenda“. A Gupta. 2018. minerva-access.unimelb.edu.au . 0 cites.
    531. Bitcoin Transaction Tracing and Purchasing Behavior Characterization of Online Anonymous Marketplaces Using Side Channels“. ELR Garcia. 2017. search.proquest.com Ann Arbor. 0 cites.
    532. Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations“. E Erdin, M Cebe, K Akkaya, S Solak, E Bulut…. . people.vcu.edu. 0 cites.
    533. Towards Creating a Thin Client for Monero“. K Lee. 2017. ideals.illinois.edu . 0 cites.
    534. BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows Sofiane Lagraa (Inria, France) Jérôme François (INRIA Nancy Grand Est, France) …“. C Hammerschmidt, IJ Sanz, MEA Lopez, D Mattos…. . ieeexplore.ieee.org. 0 cites.
    535. “Satoshi is Dead. Long Live Satoshi”: The Curious Case of Bitcoin’s Creator“. M Humayun, RW Belk. 2018. emeraldinsight.com Consumer Culture Theory. 0 cites.
    536. Bitcoin and Ethereum: Empirical Evidence on Node Distribution“. K Brown. 2018. scholar.colorado.edu . 0 cites.
    537. Incentives in Security Protocols“. S Azouvi, A Hicks, SJ Murdoch. . alexanderlhicks.com. 0 cites.
    538. Coconut E-Petition Implementation“. J Wahab. 2018. arxiv.org arXiv preprint arXiv:1809.10956. 0 cites.
    539. Waking up and cracking down“. A Labbé, J Crabb, K Lai. 2018. search.proquest.com International Financial Law Review. 0 cites.
    540. Adegboyega Ojo“. J Millard. . Springer. 0 cites.
    541. The identity, fungibility, and anonymity of money“. A Berg. 2018. papers.ssrn.com . 0 cites.
    542. Nachvollziehbarkeit“. R Clemens. 2018. Springer Digitale Welt. 0 cites.
    543. Distributed Ledger Technologies e sistemi di Blockchain: Digital Currency, Smart Contract e altre applicazioni“. ML Perugini. 2018. books.google.com . 0 cites.
    544. Practical Range Proof for Cryptocurrency Monero with Provable Security“. K Li, R Yang, MH Au, Q Xu. 2017. Springer International Conference on Information and …. 0 cites.
    545. FinTech in China’s Capital Market“. X WANG, RUI HUANG. . nomurafoundation.or.jp. 0 cites.
    546. A Robust Protocol for Circumventing Censoring Firewalls“. J Chen, UT Nguyen. . cse.stfx.ca. 0 cites.
    547. FiCloud 2018“. M Nardelli, V Cardellini, G Di Modica, O Tomarchio…. . computer.org. 0 cites.
    548. HushList Protocol Specification“. D Mercer, D Leto. 2018. raw.githubusercontent.com . 0 cites.
    549. Bubble detection methods: a Bitcoins application“. L Bin. 2018. dspace.unive.it . 0 cites.
    550. Graph Theoretic Properties of the Darkweb“. V Griffith, Y Xu, C Ratti. 2017. arxiv.org arXiv preprint arXiv:1704.07525. 0 cites.
    551. Cryptocurrency: Trends, Perspectives and Challenges“. EPE Deepika, ER Kaur. . ijtrd.com. 0 cites.
    552. Understanding the Topological Structure and Semantic Content of Darknet Communities“. LG Geddam, C Doerr, G Janssen, J van der Lubbe. 2017. repository.tudelft.nl . 0 cites.
    553. Blockchain and IoT: Mind the Gap“. A Sedrati, MA Abdelraheem, S Raza. 2017. Springer Interoperability, Safety and Security …. 0 cites.
    554. Bitcoins within Georgia’s Money Laundering Scheme“. A Mikeladze. 2017. journals.euser.org European Journal of Economics and Business …. 0 cites.
    555. Red de anonimización TOR y cibermercados negros“. I González Muñoz. . openaccess.uoc.edu. 0 cites.
    556. La blockchain tra anonimato e fama.“. G Pedullà. . amslaurea.unibo.it. 0 cites.
    557. Computer Performance Engineering: 14th European Workshop, EPEW 2017, Berlin, Germany, September 7-8, 2017, Proceedings“. P Reinecke, A Di Marco. 2017. books.google.com . 0 cites.
    558. WEBCAST HERE“. S Nov. 2017. aaronswartzday.org . 0 cites.
    559. MARS: Monetized Ad-hoc Routing System (A Position Paper)“. B David, R Dowsley, M Larangeira. 2018. dl.acm.org Proceedings of the 1st Workshop …. 0 cites.
    560. Impact of AnonStalk (Anonymous Stalking) on users of Social Media: a Case Study“. V Kanakaris, K Tzovelekis, DV Bandekas. 2018. jestr.org Journal of Engineering Science …. 0 cites.
    561. Coda: Decentralized cryptocurrency at scale“. I Meckler, E Shapiro. 2018. icorating.com . 0 cites.
    562. (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work“. P Daian, I Eyal, A Juels, EG Sirer. 2017. Springer International Conference on Financial …. 0 cites.
    563. Crippling Crypto-Ransomware“. J Graham. 2018. arxiv.org arXiv preprint arXiv:1809.10119. 0 cites.
    564. A Cryptographically Secure Voting System for the MIT Community“. F Trujano. . fernandotrujano.com. 0 cites.
    565. Performance Engineering“. P Reinecke, A Di Marco. . Springer. 0 cites.
    566. Crypto-Market Enforcement-New Strategy and Tactics1“. A Afilipoaie, P Shortis. 2018. swansea.ac.uk Policy. 0 cites.
    567. Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive“. E Weippl. 2018. books.google.com … Management, Cryptocurrencies and Blockchain …. 0 cites.
    568. Aurora: Providing Trusted System Services for Enclaves On an Untrusted System“. H Liang, M Li, Q Zhang, Y Yu, L Jiang…. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    569. LA RÉVOLUTION DIGITAL DE LA CRYPTO-MONNAIE: QUEL AVENIR POUR LE BITCOIN ET LA BLOCKCHAIN?“. LL ALAOUI, MY SAGHRANE. . revues.imist.ma PUBLIC & NONPROFIT MANAGEMENT …. 0 cites.
    570. An Analysis of Anonymity in the Zcash Cryptocurrency“. J Quesnelle. 2018. deepblue.lib.umich.edu . 0 cites.
    571. Blockchain-Ökosysteme“. S Stommel. 2017. Springer Datenschutz und Datensicherheit-DuD. 0 cites.
    572. Private, secure, and censorship resistant document sharing: for individuals and groups based on distributed ledger technology“. J Röwekamp. 2018. diva-portal.org . 0 cites.
    573. Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling“. K Porter. 2018. Elsevier Digital Investigation. 0 cites.
    574. Tech Potpourri“. RM Weber. 2018. ingentaconnect.com Journal of Financial Service Professionals. 0 cites.
    575. “I want my money back!” Limiting Online Password-Guessing Financially“. M Golla, DV Bailey, M Dürmuth. 2017. usenix.org Symposium on Usable Privacy and …. 0 cites.
    576. The blockchain as a financial market infrastructure“. A SAGLIMBENI. 2017. politesi.polimi.it . 0 cites.
    577. Maintaining a bitcoin address repository through focused web crawling“. CW Macharia. 2017. su-plus.strathmore.edu . 0 cites.
    578. How blockchains can improve measuring instruments regulation and control“. W Melo, LFRC Carmo, A Bessani…. 2018. ieeexplore.ieee.org 2018 IEEE …. 0 cites.
    579. Deanonymisation in Ethereum Using Existing Methods for Bitcoin“. R Klusman, T Dijkhuizen. 2018. delaat.net . 0 cites.
    580. THE INFOSYS TIMES“. S Lisbon. 2018. repository.stcloudstate.edu . 0 cites.
    581. Privacy e scatole nere: comunicare i processi opachi prodotti dalla tecnologia digitale“. M Invernizzi. 2017. politesi.polimi.it . 0 cites.
    582. Fair Electronic Voting via Bitcoin Deposits“. X Wu, B Wei, H Tian, Y Du, X Ma. 2017. Springer International Conference on Geo-Spatial …. 0 cites.
    583. Ethan Cecchetti“. A Kosba, A Juels, E Shi. 2017. acmccs.github.io . 0 cites.
    584. An Update on Bitcoin as a Digital Currency“. CG Manrique, GG Manrique. 2018. igi-global.com Encyclopedia of Information Science …. 0 cites.
    585. Blockchain ea Revolução do Consenso sob Demanda“. F Greve, L Sampaio, J Abijaude, A Coutinho, Í Valcy…. . sbrc2018.ufscar.br. 0 cites.
    586. A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability“. M Fukumitsu, S Hasegawa, S Isobe…. 2017. ieeexplore.ieee.org Computing and …. 0 cites.
    587. Bitcoin forensics: a tutorial“. D Neilson, S Hara, I Mitchell. 2017. Springer … Conference on Global Security, Safety, and …. 0 cites.
    588. Towards Better Understanding of Bitcoin Unreachable Peers“. L Wang, I Pustogarov. 2017. arxiv.org arXiv preprint arXiv:1709.06837. 0 cites.
    589. Detecting Spies in IoT Systems using Cyber-Physical Correlation“. B Lagesse, K Wu, J Shorb, Z Zhu. . faculty.washington.edu. 0 cites.
    590. The Core of Cartesi“. A Teixeira, D Nehab. . cartesi.io. 0 cites.
    591. Zen White Paper“. R Viglione, R Versluis, J Lippencott. 2017. media.abnnewswire.net . 0 cites.
    592. BITCONCH CHAIN“. BIO TEAM. . bitconch.io. 0 cites.
    593. The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns“. J Rauchberger, S Schrittwieser, T Dam, R Luh…. 2018. dl.acm.org Proceedings of the 13th …. 0 cites.
    594. The Dark Side of the China: The Government, Society and the Great Cannon“. A Sari, ZA Qayyum, O Onursal. 2017. Transactions on Networks and Communications. 0 cites.
    595. Bitcoin und Blockchain: Vom Scheitern einer Ideologie und dem Erfolg einer revolutionären Technik“. P Rosenberger. 2018. books.google.com . 0 cites.
    596. HYPHAE: Social Secret Sharing“. IA Lovecruft, H de Valence. . patternsinthevoid.net. 0 cites.
    597. OnionCoin: peer-to-peer anonymous messaging with incentive system“. T Gu. 2018. open.library.ubc.ca . 0 cites.
    598. Darknet market analysis and user de-anonymization“. T Šíma. . is.muni.cz. 0 cites.
    599. On M2M Micropayments: A Case Study of Electric Autonomous Vehicles“. D Strugar, R Hussain, M Mazzara, V Rivera…. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    600. Arbitrum: scalable, private smart contracts“. H Kalodner, S Goldfeder, X Chen…. 2018. usenix.org Proceedings of the 27th …. 0 cites.
    601. An eco-friendly Ecash with recycled banknotes“. AM Kane. 2018. arxiv.org arXiv preprint arXiv:1806.05711. 0 cites.
    602. Désintermédiation des données critiques et décentralisation des organisations. Le cas de la blockchain.“. J Delva. 2017. matheo.uliege.be . 0 cites.
    603. BitCoin exclusively informational money: a valuable review from 2010 to 2017“. JM Chatterjee, S Ghatak, R Kumar, M Khari. 2018. Springer Quality & Quantity. 0 cites.
    604. Why do we need/want cryptocurrency“. T Nijholt, L Batina, P Meessen. 2018. cs.ru.nl . 0 cites.
    605. Bitcoin, an SWOT analysis“. S Mirzayi, M Mehrzad. 2017. ieeexplore.ieee.org Computer and Knowledge Engineering …. 0 cites.
    606. Illicit Bitcoin transactions: challenges in getting to the who, what, when and where“. ASM Irwin, AB Turner. 2018. emeraldinsight.com Journal of Money Laundering Control. 0 cites.
    607. Points of Failure in the Ransomware Electronic Business Model“. B Cusack, G Ward. 2018. aisel.aisnet.org . 0 cites.
    608. Criminal Prosecutions and Civil Litigation Concerning Virtual Currencies“. R Girasa. 2018. Springer Regulation of Cryptocurrencies and Blockchain …. 0 cites.
    609. The utilisation of the deep web for military counter terrorist operations“. M Aschmann, L Leenen…. 2017. books.google.com ICMLG2017 5th …. 0 cites.
    610. Economic Exchange in a Regulated Shared Ledger“. I Blums, H Weigand. . vmbo2018.e3value.com. 0 cites.
    611. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol“. S Avizheh, R Safavi-Naini…. 2018. eprints.whiterose.ac.uk … and Data Security …. 0 cites.
    612. КРИПТОГРАФИЧЕСКИЕ МЕТОДЫ ОБЕСПЕЧЕНИЯ КОНФИДЕНЦИАЛЬНОСТИ ЭЛЕКТРОННЫХ ВЫБОРОВ“. ЕН Сергиенко, АС Чурилов, СВ Черников. . probinf.ru. 0 cites.
    613. Complications of Cryptocurrency: Financial and Cybersecurity Risk in the Age of Bitcoin“. J Kubicek. 2018. search.proquest.com . 0 cites.
    614. Burning Zerocoins for Fun and for Profit“. T Ruffing, SA Thyagarajan, V Ronge, D Schröder. . chaac.tf.fau.de. 0 cites.
    615. Monthly Archives: October 2017“. T Nasr. 2017. aaronswartzday.org . 0 cites.
    616. An introduction to Public and Private Distributed Ledgers“. JF Hoops. 2017. net.in.tum.de Network. 0 cites.
    617. SABRE: Protecting Bitcoin against Routing Attacks“. M Apostolaki, G Marti, J Müller, L Vanbever. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    618. How the Changes in Technology Are Shaping the Law and the Legal Profession in America“. R Humphreys. 2017. HeinOnline Regent UL Rev.. 0 cites.
    619. Online Anonymity“. NA Hassan, R Hijazi. 2017. Springer Digital Privacy and Security Using Windows. 0 cites.
    620. GNUGGIES: A PROPOSAL FOR HOSTING RESILIENT STATELESS SERVICES USING UNTRUSTED NODES“. H AGARWAL. 2018. dprg.cs.uiuc.edu . 0 cites.
    621. MULTI-BIOMETRIC FUSION AUTHENTICATION IN WIRELESS MULTIMEDIA ENVIRONMENT USING DYNAMIC BAYESIAN METHOD“. Z WU, J YANG, J ZHANG, H YUE. . downloads.hindawi.com. 0 cites.
    622. Does Bitcoin Need Regulation?: An Analysis of Bitcoin’s Decentralized Nature as a Security and Regulatory Concern for Governments“. H Rasul. 2018. scholarship.shu.edu Political Analysis. 0 cites.
    623. SRS-LM: differentially private publication for infinite streaming data“. H Wang, K Li. 2018. Springer Journal of Ambient Intelligence and Humanized …. 0 cites.
    624. Enhancing the Onion Name System for Darknet“. GAA Maduranga. 2017. documents.ucsc.lk . 0 cites.
    625. CRYPTOCURRENCY AND PERSUASIVE NETWORK LOGICS“. G Jackson. 2018. books.google.com Circulation, Writing, and Rhetoric. 0 cites.
    626. Academic Publishing and its Digital Binds: Beyond the Paywall towards Ethical Executions of Code“. T Swist, L Magee. 2018. cultureunbound.ep.liu.se Culture Unbound: Journal of Current …. 0 cites.
    627. Can Cryptocurrency Be Audited to Bank Secrecy Act and Anti-Money Laundering Regulations and Normalized in the United States“. AS Fink. 2018. search.proquest.com . 0 cites.
    628. Design of anonymous endorsement system in hyperledger fabric“. S Mazumdar. 2018. library.isical.ac.in . 0 cites.
    629. Architectures and Patterns for Moving Towards the Use of High-Frequency, Low-Fidelity Data in Healthcare“. P Zhang. 2018. etd.library.vanderbilt.edu . 0 cites.
    630. Extended Version“. E Cecchetti, A Kosba, A Juels, E Shi. . eprint.iacr.org. 0 cites.
    631. Tithonus: A Bitcoin Based Censorship Resilient System“. R Recabarren, B Carbunar. 2018. arxiv.org arXiv preprint arXiv:1810.00279. 0 cites.
    632. Zero-knowledge predictions market“. JR Kraemer, JR Linton. 2018. Google Patents US Patent App. 15/340,045. 0 cites.
    633. 19 Smart Contracts–Blockchains in the Wings“. T Bocek, B Stiller. 2017. books.google.com Digital Marketplaces Unleashed. 0 cites.
    634. Governing what wasn’t meant to be governed: A controversy-based approach to the study of Bitcoin governance“. C Méadel, A Mallard, F Musiani. 2017. taylorfrancis.com Bitcoin and Beyond. 0 cites.
    635. Anonymity in Bitcoin and Bitmessage“. DG Krawisz. 2018. repositories.lib.utexas.edu . 0 cites.
    636. 7 Governing what wasn’t meant to be governed“. F Musiani, A Mallard, C Méadel. . oapen.org Bitcoin and Beyond. 0 cites.
    637. SMER: a secure method of exchanging resources in heterogeneous internet of things“. Y Zhang, Y Han, J Wen. . Springer Frontiers of Computer Science. 0 cites.
    638. Was sind Kryptotransaktionssysteme?“. E Sixt. 2017. Springer Bitcoins und andere dezentrale Transaktionssysteme. 0 cites.
    639. Algorithmic Government: Automating Public Services and Supporting Civil Servants in using Data Science Technologies“. Z Engin, P Treleaven. 2018. researchgate.net The Computer Journal. 0 cites.
    640. Bitcoin and Volatility: Does the Media Play a Role?“. N McWharter. 2018. creativematter.skidmore.edu . 0 cites.
    641. The challenge of decentralized marketplaces“. B van IJzendoorn. 2017. arxiv.org arXiv preprint arXiv:1703.05713. 0 cites.
    642. CoC: 基于分布式账簿技术的供应链管理系统“. Z Gao, L Xu, L Chen, X Zhao, Y Lu, W Shi. 2018. jcst.ict.ac.cn 计算机科学技术学报. 0 cites.
    643. Confidential and efficient asset proof for bitcoin exchanges“. M Mohan, MKK Devi, VJ Prakash. 2018. Springer Sādhanā. 0 cites.
    644. Requirements for Ethereum Private Sidechains“. P Robinson. 2018. arxiv.org arXiv preprint arXiv:1806.09834. 0 cites.
    645. Securing Named Data Networks: Challenges and the Way Forward“. E Bertino, M Nabeel. 2018. dl.acm.org Proceedings of the 23nd ACM on Symposium on …. 0 cites.
    646. The Lawyer’s Cryptionary: A Resource for Talking to Clients About Crypto-Transactions“. CR Goforth. 2018. papers.ssrn.com . 0 cites.
    647. Übersicht über das Hacker-Ökosystem“. S Geyer. 2018. elib.uni-stuttgart.de . 0 cites.
    648. Mass Evidence Accumulation and Traveler Risk Scoring Engine in e-Border Infrastructure“. K Lai, SC Eastwood, WA Shier…. 2017. ieeexplore.ieee.org IEEE Transactions …. 0 cites.
    649. Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability“. K Kluczniak, MH Au. . eprint.iacr.org. 0 cites.
    650. SINFONIA: uma Ferramenta para o Encadeamento Seguro de Funç oes Virtualizadas de Rede Através de Corrente de Blocos“. GAF Rebello, ID Alvarenga, IJ Sanz. . gta.ufrj.br. 0 cites.
    651. Personal Genomics and Cryptocurrency Team Up“. J Abbasi. 2018. jamanetwork.com Jama. 0 cites.
    652. Follow the Silk Road: how Internet affordances influence and transform crime and law enforcement“. RD Jerde. 2017. calhoun.nps.edu . 0 cites.
    653. Steuerliche Risiken von Kryptowährungen“. W Pielke. 2018. Springer Besteuerung von Kryptowährungen. 0 cites.
    654. Zero to Monero“. KM Alonso. . getmonero.org. 0 cites.
    655. The effect of generic strategies on software ecosystem health: the case of cryptocurrency ecosystems“. S Boshuis, TB Braam, AP Marchena…. 2018. dl.acm.org Proceedings of the 1st …. 0 cites.
    656. Decentralized computing with auditability and taxability“. JR Kraemer, JR Linton. 2018. Google Patents US Patent App. 15/413,760. 0 cites.
    657. 블록체인 플랫폼의 보안 위협과 대응 방안 분석“. 김희열. 2018. dbpia.co.kr 한국정보기술학회논문지. 0 cites.
    658. 2017 Entertainment Technology in the Connected Age Looks at the Future of Connected Content“. T Coughlin. 2017. ieeexplore.ieee.org SMPTE Motion Imaging Journal. 0 cites.
    659. Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees“. G Fanti, SB Venkatakrishnan, S Bakshi…. 2018. dl.acm.org Proceedings of the …. 0 cites.
    660. Bitcoin money laundering: mixed results? An explorative study on money laundering of cybercrime proceeds using bitcoin“. R van Wegberg, JJ Oerlemans…. 2018. emeraldinsight.com Journal of Financial …. 0 cites.
    661. CHANGE HISTORY“. S Martín. . truessec.eu. 0 cites.
    662. Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data“. S Alam. 2018. qspace.library.queensu.ca . 0 cites.
    663. Decentralised coordination of electric vehicle aggregators“. A Perez-Diaz, E Gerding, F McGroarty. 2018. eprints.soton.ac.uk . 0 cites.
    664. La blockchain est-elle une technologie de confiance“. M Laurent. 2017. hal.archives-ouvertes.fr . 0 cites.
    665. R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies“. M Minaei, P Moreno-Sanchez, A Kate. . eprint.iacr.org. 0 cites.
    666. ブロックチェーンと秘密分散法を用いた情報ライフサイクル制御“. 今田丈雅, 松浦幹太. 2017. ipsj.ixsq.nii.ac.jp コンピュータセキュリティシンポジウム 2017 …. 0 cites.
    667. Externally Verifiable Oblivious RAM“. J Gancher, A Groce, A Ledger. 2017. degruyter.com Proceedings on Privacy Enhancing …. 0 cites.
    668. How to squeeze a crowd: Reducing bandwidth in mixing cryptocurrencies“. A Chator, M Green. 2018. isi.jhu.edu . 0 cites.
    669. Trustworthy Intersection Management by Crowd-sourced Digital Environment Information“. L veera kumar Kalyanasundaram. . publications.lib.chalmers.se. 0 cites.
    670. Bitcoins dunkle Seite“. P Rosenberger. 2018. Springer Bitcoin und Blockchain. 0 cites.
    671. Financial Intermediation in Cryptocurrency Markets–Regulation, Gaps and Bridges“. ID Motsi-Omoijiade. 2017. Elsevier Handbook of Blockchain, Digital Finance, and …. 0 cites.
    672. Designing confidentiality-preserving Blockchain-based transaction processing systems“. Y Wang, A Kogan. 2018. Elsevier International Journal of Accounting Information …. 0 cites.
    673. Transformation of Healthcare and Health Information Technology“. A SCHOENBAUM. 2018. books.google.com … : Redesigning Advanced Practice for the 21st …. 0 cites.
    674. Digital Disruption“. P Vanini. 2017. researchgate.net . 0 cites.
    675. Das Darknet. Wie können Behörden dagegen vorgehen?“. P Scheuermann, F Stoll, J Fleischmann. 2017. Hochschule Furtwangen … . 0 cites.
    676. New Paradigms and Big Disruptive Things“. M Oppitz, P Tomsu. 2018. Springer Inventing the Cloud Century. 0 cites.
    677. Systematically Understanding the Cyber Attack Business: A Survey“. K Huang, M Siegel, M Stuart. 2018. dl.acm.org ACM Computing Surveys (CSUR). 0 cites.
    678. Tech Tock…“. H Cohen. 2018. belfercenter.org . 0 cites.
    679. 2017 27th International Telecommunication Networks and Applications Conference (ITNAC)“. D Battulga, J Ankhzaya, SH Sodbileg, A Al-Najjar…. . computer.org. 0 cites.
    680. From Russia With Crypto: A Political History of Telegram“. N Marechal. 2018. usenix.org 8th {USENIX} Workshop on Free and Open …. 0 cites.
    681. MADARS VIRZA“. RL Rivest. 2017. madars.org . 0 cites.
    682. Towards Distributed Clouds“. M Westerlund, N Kratzke. 2018. arxiv.org arXiv preprint arXiv:1805.04657. 0 cites.
    683. (Smart) Citizens from Data Providers to Decision-Makers? The Case Study of Barcelona“. I Calzada. 2018. mdpi.com Sustainability. 0 cites.
    684. Architectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure …“. RM Katz, R Tercek. 2018. Google Patents US Patent App. 15/886,432. 0 cites.
    685. Cybersecurity Paper Compilation FEUP-Fall 2017“. R Morla. 2018. repositorio-aberto.up.pt . 0 cites.
    686. The illicit drug trade on the dark net: Analysing the need for a new EU Framework“. Y Hassan. 2017. openaccess.leidenuniv.nl . 0 cites.
    687. Monitoring Smart Contracts: ContractLarva and Open Challenges Beyond“. S Azzopardi, J Ellul, GJ Pace. . researchgate.net. 0 cites.
    688. Cryptocurrency“. M Milutinović. 2018. scindeks.ceon.rs Ekonomika. 0 cites.
    689. xJsnark: A Framework for Efficient Verifiable Computation“. A Kosba, C Papamanthou, E Shi. 2018. computer.org xJsnark: A Framework for Efficient …. 0 cites.
    690. New spaces of disruption? The failures of Bitcoin and the rhetorical power of algorithmic governance“. MA Zook, J Blankenship. 2018. Elsevier Geoforum. 0 cites.
    691. Online Anonymization Relating to Cyber Attacks“. J Cornwell. 2017. search.proquest.com . 0 cites.
    692. A Study on Digital Currency: The Safety of Future Money“. TS Reza. 2018. ojs.stiami.ac.id Transparansi Jurnal Ilmiah Ilmu Administrasi. 0 cites.
    693. Block and Mortar“. HGFB Gout. 2017. repository.tudelft.nl . 0 cites.
    694. Mining as Juridical and Information Category“. AA Maksurov. 2018. HeinOnline Actual Probs. Econ. & L.. 0 cites.
    695. Spheres of knowledge“. JR Kraemer, JR Linton. 2018. Google Patents US Patent App. 15/284,985. 0 cites.
    696. The Burst Dymaxion“. S Gauld, F von Ancoina, R Stadler. . cryptorating.eu. 0 cites.
    697. Bitcoin and Beyond“. F Gierschner. . mc-lab.inf.h-brs.de. 0 cites.
    698. Bitcoin Protocol Main Threats“. D Di Francesco Maesa. 2017. eprints.adm.unipi.it . 0 cites.
    699. It Takes Two to# MeToo-Using Enclaves to Build Autonomous Trusted Systems“. D Harnik, P Ta-Shma, E Tsfadia. 2018. arxiv.org arXiv preprint arXiv:1808.02708. 0 cites.
    700. Practical Constant-Size Ring Signature“. MJ Qin, YL Zhao, ZJ Ma. 2018. Springer Journal of Computer Science and Technology. 0 cites.
    701. 实用常数级环签名“. MJ Qin, YL Zhao, ZJ Ma. 2018. jcst.ict.ac.cn 计算机科学技术学报. 0 cites.
    702. System architecture for high-performance permissioned blockchains“. L Feng, H Zhang, WT Tsai, S Sun. . Springer Frontiers of Computer Science. 0 cites.
    703. The Regulation of Initial Coin Offerings in China: Problems, Prognoses and Prospects“. H Deng, RH Huang, Q Wu. 2018. Springer European Business Organization Law Review. 0 cites.
    704. Ransomware: Offensive Warfare Using Cryptography as a Weapon“. K Tapsoba. 2018. search.proquest.com . 0 cites.
    705. Proving the correct execution of concurrent services in zero-knowledge“. S Setty, S Angel, T Gupta, J Lee. 2018. cis.upenn.edu 13th {USENIX} Symposium on …. 0 cites.
    706. Análisis de Zcash“. D Llop Vila. . openaccess.uoc.edu. 0 cites.
    707. 불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구“. 정세진, 곽노현, 강병훈. 2018. dbpia.co.kr 정보보호학회논문지. 0 cites.
    708. Decentralized Anonymous Payments“. I Miers. 2017. jscholarship.library.jhu.edu . 0 cites.
    709. Implementation of a Crowdfunding Decentralized Application on Ethereum Master Thesis“. S Olivier, K Schmedders, JP Moyano. . researchgate.net. 0 cites.
    710. Towards trustworthiness without trusted authorities“. TE Haines. 2017. eprints.qut.edu.au . 0 cites.
    711. Private Transaktionen, dezentrale Kommunikation.“. K Jefferys, S Harman, J Ross, P McLean. 2018. loki.network . 0 cites.
    712. Trusting the Math and Mistrusting Humans“. N Ruh. 2018. oapen.org Mistrust. 0 cites.
    713. Government Activities to Detect, Deter and Disrupt Threats Enumerating from the Dark Web“. NV Denic. 2017. dtic.mil . 0 cites.
    714. Effective governance of and by the blockchain“. A Ali. 2018. cl.cam.ac.uk . 0 cites.
    715. Medshare: A Novel Hybrid Cloud for Medical Resource Sharing Among Autonomous Healthcare Providers“. Y Yang, X Li, N Qamar, P Liu, W Ke, B Shen…. 2018. ieeexplore.ieee.org IEEE Access. 0 cites.
    716. Money for Nothing: The Treatment of Bitcoin in Section 550 Recovery Actions“. ME Maginnis. 2017. scholarship.law.upenn.edu … of Pennsylvania Journal of Business Law. 0 cites.
    717. Decentralized Transactions in a Centralized Environment“. M LÖF. 2017. nada.kth.se . 0 cites.
    718. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments“. S Broadhead. 2018. Elsevier Computer Law & Security Review. 0 cites.
    719. Bring It“. D WEB. 2018. lacba.org Los Angeles Lawyer. 0 cites.
    720. A Dynamic Edge Caching Framework for Mobile 5G Networks“. DT Hoang, D Niyato, DN Nguyen…. 2018. ieeexplore.ieee.org IEEE Wireless …. 0 cites.
    721. Ancient Artifacts vs. Digital Artifacts: New Tools for Unmasking the Sale of Illicit Antiquities on the Dark Web“. KA Paul. 2018. mdpi.com Arts. 0 cites.
    722. Eros: A Decentralized Sex Marketplace with built-in Reputation System“. M O’Brien, K Yang. . pdfs.semanticscholar.org. 0 cites.
    723. Αρχιτεκτονικές προστασίας ιδιωτικότητας για κινητό και φορετό υπολογισμό“. Χ Χατζηγεωργίου. 2017. okeanis.lib.puas.gr . 0 cites.
    724. Practical Continuous Distributed Randomness“. P Schindler, A Judmayer, N Stifter, E Weippl. . eprint.iacr.org. 0 cites.
    725. The Establishment of Bitcoin“. P Hesch. 2017. dspace.allegheny.edu . 0 cites.
    726. Message from Global Leaders“. JF Moore. . content.taylorfrancis.com. 0 cites.
    727. A Secure Group Signature Scheme“. CY Tsai, PF Ho, MS Hwang. 2018. pdfs.semanticscholar.org International Journal of …. 0 cites.
    728. The Semantic Web–ISWC 2017: 16th International Semantic Web Conference, Vienna, Austria, October 21–25, 2017, Proceedings“. C d’Amato, M Fernandez, V Tamma, F Lecue…. 2017. books.google.com . 0 cites.
    729. 11 th Cloud Control Workshop“. H Slott. 2017. cloudresearch.org . 0 cites.
    730. Adversarial Examples in Deep Learning: Characterization and Divergence“. W Wei, L Liu, S Truex, L Yu, ME Gursoy. 2018. arxiv.org arXiv preprint arXiv:1807.00051. 0 cites.
    731. zk-SNARK o cómo garantizar la privacidad en las criptomonedas. De la teoría a la práctica.“. J Iglesias Jurado. 2018. repositori.upf.edu . 0 cites.
    732. ‪ L’instauration de droits de propriété sur les données personnelles: une légitimité économique contestable‪“. A Anciaux, J Farchy, C Méadel. 2017. cairn.info Revue d’économie industrielle. 0 cites.
    733. Malware Trends on ‘Darknet’Crypto-Markets: Research Review“. R Broadhurst, D Lord, D Maxim…. 2018. papers.ssrn.com Available at SSRN …. 0 cites.
    734. How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World“. G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang…. 2018. cs.ucr.edu . 0 cites.
    735. Online child sexual abuse imagery“. A Krasodomski-Jones, C White, D Eccleston, O Marsh. 2017. dera.ioe.ac.uk . 0 cites.
    736. Smart Contracts and Smart Disclosure: Coding a GDPR Compliance Framework“. M Corrales, P Jurcys, G Kousiouris. 2018. papers.ssrn.com . 0 cites.
    737. Emerging Threats and Sanctions: Abuses of Digital and Information Technologies“. E Carisch, L Rickard-Martin, SR Meister. 2017. Springer The Evolution of UN Sanctions. 0 cites.
    738. WebSci’18 Evolution of the Darknet“. GJ van Hardeveld. . websci18.webscience.org. 0 cites.
    739. Extended blockchains for event tracking and management“. BJ Taylor, G Hare. 2018. Google Patents US Patent App. 15/454,492. 0 cites.
    740. A Decentralized Oracle Network Steve Ellis, Ari Juels, and Sergey Nazarov“. S Ellis. . icowhitepapers.co. 0 cites.
    741. A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors“. SJ Robberson, MR McCoy. 2018. commons.erau.edu Journal of Digital Forensics …. 0 cites.
    742. Evaluation of Payment Channels for Bitcoin Exchange Inflows and Outflows“. F Mörtberg. 2018. diva-portal.org . 0 cites.
    743. 比特币与法定数字货币“. 秦波. 2017. jcr.cacrnet.org.cn 密码学报. 0 cites.
    744. Peer-to-peer and community-based markets: A comprehensive review“. T Sousaa, T Soaresb, P Pinsona, F Moreta, T Barochec…. . pierrepinson.com. 0 cites.
    745. Analysis of the Ethereum state“. C Pérez Jiménez. . openaccess.uoc.edu. 0 cites.
    746. Secure Digital Wallet Authentication Protocol“. K Tiwari. 2017. dalspace.library.dal.ca . 0 cites.
    747. Transactions privées, communication décentralisée.“. K Jefferys, S Harman, J Ross, P McLean. 2018. loki.network . 0 cites.
    748. Long term data storage using peer-to-peer technology“. PN Meessen, A de Vries. 2017. pdfs.semanticscholar.org . 0 cites.
    749. Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings“. Z Yan, R Molva, W Mazurczyk, R Kantola. 2017. books.google.com . 0 cites.
    750. The Investment Lawyer“. JP Kanach, AP Cross, MC Moynihan. 2017. perkinscoie.com . 0 cites.
    751. Infrastructures and their invisible carnivalesque“. D Kavanagh, G Miscione. 2017. papers.ssrn.com . 0 cites.
    752. The Post-Truth Business: How to Rebuild Brand Authenticity in a Distrusting World“. SP de Chenecey. 2018. books.google.com . 0 cites.
    753. Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency“. T Xue, Y Yuan, Z Ahmed, K Moniz, G Cao…. 2018. computer.org 2018 IEEE 42nd …. 0 cites.
    754. Moedas virtuais e seu impacto na sociedade“. MG Santos. 2017. app.uff.br . 0 cites.
    755. Ciberseguridad: la colaboración público-privada en la era de la cuarta revolución industrial (Industria 4.0 versus ciberseguridad 4.0)“. LJ Aguilar. 2017. dialnet.unirioja.es Cuadernos de estrategia. 0 cites.
    756. The Next Wave Magazine“. MD Wenner, C Deopersad, L Saghir, C Mejia…. 2018. publications.iadb.org . 0 cites.
    757. Decentralized Release of Self-emerging Data using Smart Contracts“. C Li, P Balaji. 2018. d-scholarship.pitt.edu . 0 cites.
    758. Emerging issues and challenges for cloud data at the edge“. KS Wong, MH Kim. 2018. inderscienceonline.com International Journal of Web and Grid …. 0 cites.
    759. Il giurista informatico: Digital Single Market e approccio olistico“. IM Alagna, GG Pacelli. 2017. Enrico Mucchi Editore Ciberspazio e diritto. 0 cites.
    760. Distributed ledger technical research in Central Bank of Brazil“. A de Vilaca Burgos, JD de Oliveira Filho, MVC Suares…. 2017. mail.jornalggn.com.br . 0 cites.
    761. Towards Safer Smart Contracts: A Survey of Languages and Verification Methods“. D Harz, W Knottenbelt. 2018. arxiv.org arXiv preprint arXiv:1809.09805. 0 cites.
    762. Extended blockchains for event tracking and management“. BJ Taylor, G Hare, AM Smith. 2018. Google Patents US Patent App. 15/345,031. 0 cites.
    763. Orchid: Enabling Decentralized Network Formation and Probabilistic Micro-Payments“. DL Salamon, G Simonsson, J Freeman, BJ Fox. 2018. orchidprotocol.com . 0 cites.
    764. Exploding Data: Reclaiming Our Cyber Security in the Digital Age“. M Chertoff. 2018. books.google.com . 0 cites.
    765. Cybersecurity Research Datasets: Taxonomy and Empirical Analysis“. M Zheng, H Robbins, Z Chai, P Thapa…. 2018. usenix.org 11th {USENIX} Workshop …. 0 cites.
    766. Entrepreneurs on the Darknet: Reaction to Negative Feedback“. M Batikas, T Kretschmer. 2018. papers.ssrn.com . 0 cites.
    767. Hyper-connectivity: Intricacies of national and international cyber securities (Part 2)“. M Dawson. 2017. works.bepress.com . 0 cites.
    768. Introduction To Online Threats and Countermeasures“. NA Hassan, R Hijazi. 2018. Springer Open Source Intelligence Methods and Tools. 0 cites.
    769. XCLAIM: Interoperability with Cryptocurrency-Backed Tokens⋆“. A Zamyatin, D Harz, J Lind, P Panayiotou, A Gervais…. . researchgate.net. 0 cites.
    770. On deploying succinct zero-knowledge proofs“. M Virza. 2017. dspace.mit.edu . 0 cites.
    771. The emergence of DLT in entrepreneurship: opportunities and business models.“. A Baliutavicius, C Alexe. 2018. projekter.aau.dk . 0 cites.
    772. WHEN WHISPERS ENTER THE CLOUD: EVALUATING TECHNOLOGY TO PREVENT AND REPORT SEXUAL ASSAULT“. H Liu. 2018. jolt.law.harvard.edu Harvard Journal of Law & Technology. 0 cites.
    773. Network Layer Aspects of Permissionless Blockchains“. T Neudecker, H Hartenstein. 2018. ieeexplore.ieee.org IEEE Communications Surveys & …. 0 cites.
    774. Coupled Cyber and Physical Systems: Embracing Smart Cities with Multistream Data Flow“. X Lu, B Chen, C Chen, J Wang. 2018. ieeexplore.ieee.org IEEE Electrification Magazine. 0 cites.
    775. Data and the city“. G McArdle, TP Lauriault, R Kitchin. 2017. taylorfrancis.com Data and the City. 0 cites.
    776. Banking malware and the laundering of its profits“. BHM Custers, RLD Pool…. 2018. journals.sagepub.com European Journal of …. 0 cites.
    777. Public Evidence from Secret Ballots“. M Bernhard, J Benaloh, JA Halderman…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
    778. Privacidade e verificabilidade de acesso em sistemas médicos usando searchable encryption“. G Luz. 2018. repositorio.ufsc.br . 0 cites.
    779. ERHEBUNG STATE-OF-THE-ART DIREKTER KOMMUNIKATIONSDIENSTE“. B Prünster–bernd. . demo.a-sit.at. 0 cites.
    780. Master Degree Thesis“. CF Chiasserini, P Giaccone, G Malnati, M Macagno. . webthesis.biblio.polito.it. 0 cites.
    781. Big Bits and Small States: Examining Reasons for Variation in Cryptocurrency Regulation in Europe“. A Rathod. 2018. openaccess.leidenuniv.nl . 0 cites.
    782. Digital Marketplaces Unleashed“. C Linnhoff-Popien, R Schneider, M Zaddach. 2017. books.google.com . 0 cites.
    783. The Politics of Seasteading The Politics of Seasteading“. R Taghizadegan. 2017. books.google.com … : Opportunities and Challenges for Small New …. 0 cites.
    784. The Rise-and-Fall of Leading International Financial Centers: Factors and Application“. A Church. 2018. repository.law.umich.edu Michigan Business & Entrepreneurial Law …. 0 cites.
    785. The case for regulating social networks and the internet“. METE Encryption. . dl.acm.org. 0 cites.
    786. Ransomware-Rising Menace to an Unsuspecting Cyber Audience“. P Narain. 2018. uh-ir.tdl.org . 0 cites.
    787. Transacciones privadas, comunicación descentralizada.“. K Jefferys, S Harman, J Ross, P McLean. . loki.network. 0 cites.
    788. An Overview of Cyber Insecurity and Malicious Uses of Cyberspace“. RM Silva, I Zelinka. 2017. Springer … Conference on Advanced Engineering Theory and …. 0 cites.
    789. Майнинг как юридическая и информационная категория“. АА Максуров. 2018. cyberleninka.ru Актуальные проблемы экономики и права. 0 cites.
    790. XIN SUN QUANLONG WANG PIOTR KULICKI XISHUN ZHAO“. Q WANG. . researchgate.net. 0 cites.
    791. Redes de anonimización y cibermercados negros“. X Salvadó Martí. . openaccess.uoc.edu. 0 cites.
    792. Il buio oltre il web: Dark web, deep web, fake news, controllo sociale, AI, virus e hacking“. A Gandini. 2018. Blu Editore . 0 cites.
    793. Sex Trafficking in the Digital Age: The Role of Virtual Currency-Specific Legislation in Keeping Pace with Technology“. J Hoyer. 2017. HeinOnline Wayne L. Rev.. 0 cites.
    794. Securing the Storage Data Path with SGX Enclaves“. D Harnik, E Tsfadia, D Chen, R Kat. 2018. arxiv.org arXiv preprint arXiv:1806.10883. 0 cites.
    795. The Dark Internet: An Exploration of Culture and User Experience“. J Foust, C Ghee, M Hartung, K Hynes, C Li, P Mandrich…. 2017. drum.lib.umd.edu . 0 cites.
    796. Aarts, Henk and Dijksterhuis, Ap (2000). Habits as Knowledge Structures: Automaticity in Goal-Directed Behavior. Journal of Personality and Social Psychology, 78 (1) …“. KU Hooked. . cambridge.org Psychology. 0 cites.
    797. Detecting and Mitigating Robotic Cyber Security Risks“. R Kumar, PK Pattnaik, P Pandey. 2017. books.google.com . 0 cites.
    798. Decentralization and Distributed Innovation: Fintech, Bitcoin and ICO’s“. K Chuen, D Lee. 2017. papers.ssrn.com . 0 cites.
    799. Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure“. C Patsonakis, K Samari, M Roussopoulos, A Kiayias. 2017. eprint.iacr.org . 0 cites.
    800. Towards a block age or blockages of global governance?“. M Campbell-Verduyn. . oapen.org Bitcoin and Beyond. 0 cites.
    801. Taking a Byte out of Bitcoin Regulation“. D Ma. 2017. HeinOnline Alb. LJ Sci. & Tech.. 0 cites.
    802. traceability of consent [version 1; referees: 1 approved, 1 not“. M Benchoufi, R Porcher, P Ravaud. . f1000research.com. 0 cites.
    803. Security in cyber-physical production systems: A roadmap to improving IT-security in the production system lifecycle“. E Weippl, P Kieseberg. 2017. ieeexplore.ieee.org AEIT International Annual Conference …. 0 cites.
    804. Contributors: M. Crozes, PA. Meley, M. Vincenti, S. Amani, C. O’Brien“. A Ismail, F El-Yagoubi. 2018. varanida.com . 0 cites.
    805. Critical Analysis of DDoS—An Emerging Security Threat over IoT Networks“. A Lohachab, B Karambir. 2018. Springer Journal of Communications and Information …. 0 cites.
    806. Secure Handling of Electronic Health Records for Telemedicine Applications“. F Ljung. 2018. diva-portal.org . 0 cites.
    807. Designing Safe and Secure Industrial Control Systems: A Tutorial Review“. D Serpanos, MT Khan, H Shrobe. 2018. ieeexplore.ieee.org IEEE Design & Test. 0 cites.
    808. Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrencies and More“. F Zhang, P Daian, G Kaptchuk, I Bentov, I Miers…. . eprint.iacr.org. 0 cites.
    809. Moedas digitais bitcoin“. JO Silva, LGL Machado. 2017. app.uff.br . 0 cites.
    810. The viability of cryptocurrency in relation to the response of financial institutions and governments“. C Partanen. 2018. theseus.fi . 0 cites.
    811. Risk assessment for I2P with an enhanced outproxy design.“. D Smits. 2018. openaccess.leidenuniv.nl . 0 cites.
    812. Ransomware: The Cyber Extortionist“. R Chaurasia. 2018. igi-global.com Handbook of Research on Information and Cyber …. 0 cites.
    813. Current Priorities and Gaps in German National Cybersecurity, Future Trends“. M Schallbruch, I Skierka. 2018. Springer Cybersecurity in Germany. 0 cites.
    814. Криптовалюта, как качественно новый платежный инструмент и перспективы ее интеграции в мировую финансовую систему“. O Dzhusov, N Rubtsova. 2017. mi-dnu.dp.ua European Journal of Management Issues. 0 cites.
    815. A Cross-Sectional Overview of Cryptoasset Governance and Implications for Investors“. N Carter. . coinmetrics.io. 0 cites.
    816. Decentralized infrastructure for file storage“. N Greco. 2017. dspace.mit.edu . 0 cites.
    817. OF THE INFORMATION ECONOMY INDuSTRY IN uKRAINE“. T Ponomarenko, V Khudolei, O Prokopenko, J Klisinski. 2018. ceeol.com . 0 cites.
    818. Digital construction: From point solutions to IoT ecosystem“. R Woodhead, P Stephenson, D Morrey. 2018. Elsevier Automation in Construction. 0 cites.
    819. Secure policy execution using reusable garbled circuit in the cloud“. KKR Choo, R Buyya. 2018. researchgate.net . 0 cites.
    820. ICTs and value creation in public sector: Manufacturing logic vs service logic“. A Cordella, A Paletti. 2018. content.iospress.com Information Polity. 0 cites.
    821. LOKI: a lease-oriented key infrastructure with instant updates and seizure-resistance“. C Fromknecht. 2017. dspace.mit.edu . 0 cites.
    822. Technologien, Forschungsfragen und Anwendungen“. J Schütte, G Fridgen, W Prinz, T Rose, NU FIT…. . aisec.fraunhofer.de. 0 cites.
    823. Designing a payment system to the RGCE network“. T Sikorski. 2017. theseus.fi . 0 cites.
    824. Start-up and Corporate Collaboration: the Handling of Legal Challenges, Emerging Legal Technologies and the Role of the Lawyer“. A Reynolds, J Li. 2017. . 0 cites.
    825. Human Capital and Assets in the Networked World“. M Russ. 2017. emeraldinsight.com . 0 cites.
    826. Revocable identity-based proxy re-signature against signing key exposure“. X Yang, C Chen, T Ma, J Wang, C Wang. 2018. journals.plos.org PloS one. 0 cites.
    827. Bitcoinová peněženka pro Android podporující zařízení TREZOR“. M Skála. 2018. dspace.cvut.cz . 0 cites.
    828. Livre blanc Zen“. R Viglione, R Versluis, J Lippencott. 2017. blog.zencash.com . 0 cites.
    829. Cyber Threat Intelligence Sharing through National and Sector-Oriented Communities“. F Skopik. 2017. content.taylorfrancis.com Collaborative Cyber Threat Intelligence. 0 cites.
    830. Cyber Threat Intelligence Sharing through National and Sector-Oriented Communities“. R Kerkdijk, F Fransen. 2017. taylorfrancis.com Collaborative Cyber Threat Intelligence. 0 cites.
    831. The Value of Cryptocurrencies: How Bitcoin Fares in the Pockets of Federal and State Courts“. BM Peck. 2017. HeinOnline U. Miami Bus. L. Rev.. 0 cites.
    832. El mundo en 2017: siempre alerta, nunca atemorizados“. JM Blanco, JC Villaverde, C Alberto…. 2017. dialnet.unirioja.es bie3: Boletín …. 0 cites.
    833. BLOCKCHAIN AND THE CMO“. J Epstein. 2017. neverstopmarketing.com . 0 cites.
    834. Derecho e innovación tecnológica. Retos de presente y futuro“. JLP Mañas. . abogacia.es. 0 cites.
    835. Cryptography for societal benefit“. S Park. 2018. dspace.mit.edu . 0 cites.
    836. traceability of consent [version 5; referees: 1 approved, 2“. M Benchoufi, R Porcher, P Ravaud. 2017. pdfs.semanticscholar.org . 0 cites.
    837. 클라우드 (Cloud) 에서, 다시 크라우드 (Crowd) 로“. 이항우. 2018. dbpia.co.kr 경제와사회. 0 cites.
    838. Multicloud Resource Allocation“. H Zhuang. 2017. infoscience.epfl.ch . 0 cites.
    839. Toward Shared Ownership in the Cloud“. H Ritzdorf, C Soriente, GO Karame…. 2018. ieeexplore.ieee.org IEEE Transactions …. 0 cites.
    840. DoT Defenses and Mitigation Techniques for IoT Device Manufacturers and Cybersecurity Operations“. J Bilodeau. 2018. search.proquest.com . 0 cites.
    841. Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities“. M Al-Bassam, A Sonnino, V Buterin. 2018. arxiv.org arXiv preprint arXiv:1809.09044. 0 cites.
    842. The Pure Price of Anarchy of Pool Block Withholding Attacks in Bitcoin Mining“. C Alkalay-Houlihan, N Shah. . cs.toronto.edu. 0 cites.
    843. Recupero di indirizzi bitcoin dal web“. A Santoru, S Bistarelli. . dmi.unipg.it. 0 cites.
    844. Technophysics, Smart Health Networks, and the Bio-cryptoeconomy: Quantized Fungible Global Health Care Equivalency Units for Health and Well-being“. M Swan. . researchgate.net. 0 cites.
    845. The Price of Cryptocurrencies: An Empirical Analysis“. J Wiedmer. . wwz.unibas.ch. 0 cites.
    846. ALA Midwinter Meeing Program Book-Denver, 2018“. American Library Association. 2018. alair.ala.org . 0 cites.
    847. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. C Jonker, T Habeck, Y Park, F Jordens…. 2017. books.google.com … and Data Security …. 0 cites.
    848. Open Source Intelligence Methods and Tools“. NA Hassan, R Hijazi. . Springer. 0 cites.
    849. Bitcoin Explained: Become a Bitcoin Millionaire in 2018“. M Atwood. 2018. books.google.com . 0 cites.
    850. R3 Reports“. J Stark. . r3.com. 0 cites.
    851. Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts“. A Golchubian. 2017. search.proquest.com . 0 cites.
    852. Information, Communications, and Technology in the Ocean Economy“. T Kelly. . elibrary.worldbank.org The Ocean Economy in Mauritius. 0 cites.
    853. Cortex-AI on Blockchain“. Z Chen, W Wang, X Yan, J Tian. . cortexlabs.ai. 0 cites.
    854. Advances in Designing Trustworthy Cloud Services“. H Ritzdorf. 2018. research-collection.ethz.ch . 0 cites.
    855. Frequency Based Real-time Pricing for Residential Prosumers.“. SM Hambridge. 2017. repository.lib.ncsu.edu . 0 cites.
    856. A Conceptual Model for Networking of Carbon Markets on Distributed Ledger Technology Architecture“. JD Macinante. 2017. HeinOnline CCLR. 0 cites.
    857. Sign-to-contract: how to achieve trustless digital timestamping with zero marginal cost“. L COMANDINI. 2018. politesi.polimi.it . 0 cites.
    858. Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation“. A Wilner. 2017. Taylor & Francis Comparative Strategy. 0 cites.
    859. Cryptocurrencies and Regulation, a Master Thesis on the best practices for regulating cryptocurrencies within the EU“. A Bos, GP Economy. 2018. openaccess.leidenuniv.nl . 0 cites.
    860. Raptor: A Practical Lattice-Based (Linkable) Ring Signature“. X Lu, MH Au, Z Zhang. . eprint.iacr.org. 0 cites.
    861. Policing af kryptomarkeder“. J Demant, R Munksgaard. 2017. justitsministeriet.dk . 0 cites.
    862. Long-term Bitcoin Scalability“. ES Thorsrud. 2018. brage.bibsys.no . 0 cites.
    863. The impact of Self-Generated Images in online pornography“. A Monaghan. 2017. eprints.mdx.ac.uk . 0 cites.
    864. Design and Implementation of Legal Protection for Trade Secrets in Cloud Brokerage Architectures relying on Blockchains“. MU Wasim. 2018. amsdottorato.unibo.it . 0 cites.
    865. Topics of Interest 2018“. SB Border, Z Saleh. . researchbriefings.files.parliament.uk. 0 cites.
    866. Anonymity for Decentralized Electronic Cash Systems“. S Dahle. 2018. brage.bibsys.no . 0 cites.
    867. Welche Gefahren ergeben sich aus Bitcoins für die mikro-und makro-prudentielle Aufsicht?“. F Karaagac. 2017. Gottfried Wilhelm Leibniz Universität … . 0 cites.
    868. The Regulation of Crimes against Information Systems in Hungary“. K Mezei. 2017. HeinOnline JE-Eur. Crim. L.. 0 cites.
    869. 秘匿化トランザクションと分散型コミュニケーション.“. K Jefferys, S Harman, J Ross, P McLean. 2018. loki.network . 0 cites.
    870. Cryptocurrency and the Myth of the Trustless Transaction“. RM Bratspies. 2018. papers.ssrn.com . 0 cites.
    871. Computer Security–ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings“. SN Foley, D Gollmann, E Snekkenes. 2017. books.google.com . 0 cites.
    872. G20 Governance of Digitalization1“. JJ Kirton, B Warren. 2018. iorj.hse.ru VESTNIK MEZHDUNARODNYKH ORGANIZATSII …. 0 cites.
    873. Telegram Open Network“. N Durov. 2017. telegrammar.ru . 0 cites.
    874. Ransomware: A New Era of Digital Terrorism“. R Indu, A Sharma. 2018. purkh.com Computer Reviews Journal. 0 cites.
    875. Bitcoin: Currency but not money. Cryptocurrencies (as illustrated by Bitcoin) in the Electronic Money Directive and the Payment Services Directive in light of the …“. JR Hernaiz Bravo. 2017. duo.uio.no . 0 cites.
    876. Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion“. S Savage. 2018. cseweb.ucsd.edu . 0 cites.
    877. Digital technologies and the environment: desk research on digital technologies diffusion in the italian context“. A Meduri. 2017. politesi.polimi.it . 0 cites.
    878. Побудова ефективної системи електронного голосування з використанням ланцюгів блоків“. КА Олешко. 2018. ela.kpi.ua . 0 cites.
    879. EFFICIËNTIE VAN CRYPTOCURRENCY-MARKTEN“. E De Decker. . lib.ugent.be. 0 cites.
    880. Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication“. WL Brown, N Smith, E Landau, R Paul…. 2018. Google Patents US Patent App. 15 …. 0 cites.
    881. Dynamic Key Management for Secure Heterogeneous Vehicular Communication Systems“. A Lei. 2017. core.ac.uk . 0 cites.
    882. ID-fraud mitigation-A proposal of an EoI evaluation system operationalizing common objectives in ID proofing“. ØAA Toftegaard. 2017. brage.bibsys.no . 0 cites.
    883. AFC Protocol Specification“. D Hopwood, S Bowe, T Hornby, N Wilcox. 2018. acfio.org . 0 cites.
    884. Analyzing Weak Memory Models“. R Stenhammar. . mycourses.aalto.fi Science: Internet, Data and Things (CS-E4000), Spring …. 0 cites.
    885. Distributed Ledgers for the Prevention of Accounting Fraud“. N Rückeshäuser. . d-nb.info. 0 cites.
    886. The Impact of Regulatory Measures Imposed on Initial Coin Offerings in the United States Market Economy“. JD Moran. 2018. scholarship.law.edu Catholic University Journal of Law and Technology. 0 cites.
    887. System architecture and method of processing data therein“. D Williams, T Hanke. 2018. Google Patents US Patent App. 15/817,792. 0 cites.
    888. Computer Security–ESORICS 2017“. SN Foley, D Gollmann, E Snekkenes. . Springer. 0 cites.
    889. Geog netu rafia inter“. K Janc. . zzp.geogr.uni.wroc.pl. 0 cites.
    890. Acceptance of Electronic Monetary Exchanges, Specifically Bitcoin, by Information Security Professionals: A Quantitative Study Using the Unified Theory of …“. M Hutchison. 2017. search.proquest.com . 0 cites.
    891. Scaling Bitcoin“. R Nyffenegger. . wwz.unibas.ch. 0 cites.
    892. Technologieübergreifende Herausforderungen und Fragestellungen“. B Bogdan. 2018. Springer MedRevolution. 0 cites.
    893. ULUSAL SİBER GÜVENLİK STRATEJİ BELGELERİNDE İNSAN HAKLARI“. TJ Volgy, K Kanthak, D Frazier…. . cyberpolitikjournal.org Research Articles …. 0 cites.
    894. Systems of Global Governance in the Era of Human-Machine Convergence“. EM Battaglia, J Mei, G Dumas. 2018. arxiv.org arXiv preprint arXiv:1802.04255. 0 cites.
    895. Cryptographically secure medical test data distribution system using smart testing/diagnostic devices“. GG Rose. 2018. Google Patents US Patent App. 15/911,027. 0 cites.
    896. THE UNIVERSITY OF TULSA THE GRADUATE SCHOOL“. M Vasek. 2017. tylermoore.ens.utulsa.edu . 0 cites.
    897. The SAGE Encyclopedia of the Internet“. B Warf. 2018. books.google.com . 0 cites.
    898. THE 4TH“. F HOVSEPIAN. . Springer. 0 cites.
    899. Mastering Google Home: Ultimate Guide To Quickstart Your Google Home Experience“. A Wilson. . books.google.com. 0 cites.
    900. Valute virtuali: utilizzi attuali e prospettive di sviluppo dei Bitcoin“. E Masin. 2017. tesi.cab.unipd.it . 0 cites.
    901. 02 Dean’s Message“. DG Smith, KM Kulbeth, RW Clarke, LH Primosch…. 2018. digitalcommons.law.byu.edu . 0 cites.
    902. Superregulation: Competitive Approved Private Regulators“. GK Hadfield, BR Weingast, DL Rhode, F Carugati…. 2017. works.bepress.com . 0 cites.
    903. Vizualizace a vyhledávání v distribuované databázi“. M Barus. 2017. dspace.cvut.cz . 0 cites.
    904. Identifying Controllers and Processors Pursuant to the General Data Protection Regulation“. AG Meyer. 2018. duo.uio.no . 0 cites.
    905. Intelligent Computing & Optimization“. P Vasant. 2018. books.google.com . 0 cites.
    906. A taxonomy of cyber-physical threats and impact in the smart home“. R Heartfield, G Loukas, S Budimir, A Bezemskij…. 2018. Elsevier Computers & …. 0 cites.
    907. Towards an architecture for tag-based predictive placement in distributed storage systems“. S Delbruel. 2017. tel.archives-ouvertes.fr . 0 cites.
    908. Landtag BW wählt Brink zum Datenschutzbeauftragten“. I Avalanche. . Springer. 0 cites.
    909. How to build time-lock encryption“. J Liu, T Jager, SA Kakvi, B Warinschi. 2018. Springer Designs, Codes and Cryptography. 0 cites.
    910. On the use of stochastic systems for sensing and security“. LJ Gunn. 2017. digital.library.adelaide.edu.au . 0 cites.
    911. Logos Network“. M Zochowski. . logos.network. 0 cites.
    912. EUROCRYPT 2018“. JB Nielsen, V Rijmen. . Springer. 0 cites.
    913. Bitcoin als alternative Anlagemöglichkeit-unter besonderer Berücksichtigung der Volatilität“. T Schmidt. 2017. econstor.eu . 0 cites.
    914. Important Issues for Consumers, Insurers and Insurance Regulators 2“. E Nordman, C Director, K DeFrain, SN Hall…. 2018. states.naic.org . 0 cites.
    915. REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways“. A Aggarwal, M Zamani, M Christodorescu. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
    916. Digital data heritage preservation (DHP) modelling and design“. C Gordon, L Cristina. 2018. opus.lib.uts.edu.au . 0 cites.
    917. Blockchain and Privacy Protection in the Case of the European General Data Protection Regulation (GDPR): A Delphi Study“. S Schwerin. 2018. jbba.scholasticahq.com The JBBA. 0 cites.
    918. Advances in Internetworking, Data & Web Technologies: The 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT …“. L Barolli, M Zhang, XA Wang. 2017. books.google.com . 0 cites.
    919. Submission on the re-use of public sector information: with an emphasis on energy system datasets“. G Hawker, HU Heinrichs, P Hiersemenzel, S Hilpert…. 2017. forum.openmod-initiative.org . 0 cites.
    920. Auditing, Assurance Services, and Forensics“. FI Lessambo. . Springer. 0 cites.
    921. Queer Practices, Queer Rhetoric, Queer Technologies: Studies of Digital Performativity in Gendered Network Culture“. G Jackson. 2017. scholarcommons.sc.edu . 0 cites.
    922. Zwischen Online-Streife und Online-(Raster-) Fahndung–Ein Beitrag zur Verarbeitung öffentlich zugänglicher Daten im Ermittlungsverfahren“. C Rückert. 2017. degruyter.com Zeitschrift für die gesamte Strafrechtswissenschaft. 0 cites.
    923. System and method for electronic data capture and management for audit, monitoring, reporting and compliance“. SF Bisbee, JW Tebay, AJ Attinello. 2018. Google Patents US Patent App. 15/761,264. 0 cites.
    924. LE TRAFIC ILLICITE DE TABAC SUR LES CRYPTOMARCHÉS“. D Décary-Hétu, V Mousseau, I Rguioui. 2017. daviddhetu.openum.ca . 0 cites.
    925. A Progressive Web Application for Coinblesk“. S Schrepfer. . files.ifi.uzh.ch. 0 cites.
    926. Kakofoni: Denetim Gürültüsünü Açığa Çıkarmak1“. E YETİŞKİN. . sosbildergi.msgsu.edu.tr MSGSÜ Sosyal Bilimler Dergisi. 0 cites.
    927. Building an E ective IoT Ecosystem for Your Business“. SR Sinha, Y Park. . Springer. 0 cites.
    928. Technology and the Insurance Industry: Re-configuring the Competitive Landscape“. A Cappiello. 2018. books.google.com . 0 cites.
    929. Islamic State of Iraq and Syria Revenue Sources and Countermeasures With a Specific Look at Cryptocurrency Use“. DM Haines. 2017. search.proquest.com . 0 cites.
    930. Mastering Amazon Alexa: The Ultimate User Guide To Amazon Alexa 2nd Generation with Latest Updates“. A Wilson. . books.google.com. 0 cites.
    931. Handbook on the Rule of Law“. C May, A Winchester. 2018. books.google.com . 0 cites.
    932. TELECOMMUNICATION DATA MONETIZATION“. J HAAPANIEMI. 2017. core.ac.uk . 0 cites.
    933. A Feasibility Study of Blockchain Technology As Local Energy Market Infrastructure“. F Blom. 2018. brage.bibsys.no . 0 cites.
    934. Wide-Area Software-Defined Storage“. JC Nelson. 2018. search.proquest.com . 0 cites.
    935. Building an Effective IoT Ecosystem for Your Business“. SR Sinha, Y Park. 2017. books.google.com . 0 cites.
    936. The World of Open Data“. Y Charalabidis, A Zuiderwijk, C Alexopoulos…. . Springer. 0 cites.
    937. Enforcing Role-Based Access Control with Attribute-Based Cryptography in MLS Environments“. M Kiviharju. . maanpuolustuskorkeakoulu.fi. 0 cites.
    938. Digital Healing: People, Information, Healthcare“. M Ringel. 2018. content.taylorfrancis.com . 0 cites.
    939. An investigation into the diffusion of the cryptocurrency innovation“. M Wesley. 2018. jyx.jyu.fi . 0 cites.
    940. Humanity Works: Merging Technologies and People for the Workforce of the Future“. A Levit. 2018. books.google.com . 0 cites.
    941. Emerging risks identification on food and feed–EFSA“. European Food Safety Authority (EFSA)…. 2018. Wiley Online Library EFSA …. 0 cites.
    942. Emerging cryptocurrency trust in an agent–based model“. P Terna, M Maggiora, L Battistoni. . terna.to.it. 0 cites.
    943. Public-Key Distribution and Acquisition services over SMS“. G Skurichinas. 2017. imm.dtu.dk . 0 cites.
    944. Computer Aided Verification“. H Chockler, G Weissenbacher. . Springer. 0 cites.
    945. policy works“. MW Decisions. 2018. gspp.berkeley.edu POLICY. 0 cites.
    946. ED TECH TRENDS TO WATCH“. HOWABR LED. . pdf.101com.com. 0 cites.
    947. A conceptual perspective on collaborative consumption“. M Ertz, F Durif, M Arcand. 2018. Springer AMS Review. 0 cites.
    948. Auditing, Assurance Services, and Forensics: A Comprehensive Approach“. FI Lessambo. 2018. books.google.com . 0 cites.
    949. How Arficial Intelligence Is Changing the Insurance Industry 2“. E Nordman, C Director, K DeFrain, SN Hall…. 2017. states.naic.org . 0 cites.
    950. Praxiswissen Digitalisierung: 25 Tipps, Tricks und Business-Hacks“. I Dahm. 2018. BoD–Books on Demand . 0 cites.
    951. MakeToCare. An ecosystem of actors and user-centred solutions for innovation in the healthcare sector“. S Maffei, M Bianchini, B Parini, Z Delli. 2018. re.public.polimi.it . 0 cites.
    952. Bitcoin-virtuaalivaluutan ja kullan mahdollisuudet suojata tuottoa rahoitusmarkkinoiden epävakaissa ja turbulenteissa vaiheissa“. T Mäki. 2017. osuva.uwasa.fi . 0 cites.
    953. IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments“. S Contiu, R Pires, S Vaucher, M Pasin, P Felber…. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    954. Realising Relative Autonomy and Adaptation in Smart Objects Systems“. ME Pérez Hernández. 2018. lra.le.ac.uk . 0 cites.
    955. Digital Watermarking of Non-media data stream (applications)“. A Soltani Panah. 2017. researchbank.rmit.edu.au . 0 cites.
    956. A Complete Bibliography of Publications in the Journal of Network and Computer Applications“. NHF Beebe. 2018. netlib.org . 0 cites.
    957. The Wireless Control Plane: An Overview and Directions for Future Research“. EDA Mazied, MY ElNainay, MJ Abdel-Rahman…. 2018. arxiv.org arXiv preprint arXiv …. 0 cites.
    958. Guidance for Investing in Digital Health“. P Drury, S Roth, T Jones, M Stahl, D Medeiros. 2018. think-asia.org . 0 cites.
    959. American Kingpin: Catching the Billion-Dollar Baron of the Dark Web“. N Bilton. 2017. Random House . 0 cites.
    960. Technische Verfahren für eine digitale Infrastruktur“. O Berberich. 2018. Springer Trusted WEB 4.0–Infrastruktur für eine …. 0 cites.
    961. Bitcoin och borgenärerna-En kryptovaluta i konflikt med konkursinstitutet?“. S Karinsdotter. 2018. gupea.ub.gu.se . 0 cites.
    962. Using Crypto-currencies to Measure Financial Activities and Uncover Potential Identities of Actors Involved“. Y Huang. 2017. cloudfront.escholarship.org . 0 cites.
    963. Computer Security“. J Lopez, J Zhou, M Soriano. . Springer. 0 cites.
    964. Unternehmensreputation von Onlineunternehmen-Eine Empirische Analyse“. A Deneke, M Metz. 2018. jums.academy . 0 cites.
    965. Organizational Change in Digital Servitization“. G Sæland. 2018. brage.bibsys.no . 0 cites.
    966. A sampling framework for counting temporal motifs“. P Liu, A Benson, M Charikar. 2018. arxiv.org arXiv preprint arXiv:1810.00980. 0 cites.
    967. Future Politics: Living Together in a World Transformed by Tech“. J Susskind. 2018. books.google.com . 0 cites.
    968. High Impact Technologies Radar-II edizione: General Report“. S Meregalli, G Salviotti. 2018. EGEA spa . 0 cites.
    969. LES ENJEUX TECHNOLOGIQUES DES BLOCKCHAINS (CHAÎNES DE BLOCS)“. MC VILLANI, MG LONGUET. . senat.fr. 0 cites.
    970. Addressing Selfishness in the Design of Cooperative Systems“. G LENA COTA. 2017. air.unimi.it . 0 cites.
    971. Âmbar: desenvolvimento de um serviço multiplataforma e descentralizado de foto-memórias“. PLS Brizolara. 2017. monografias.ufrn.br . 0 cites.
    972. INTEGRA DA REVISTA“. MD Varella, IE Villarroel. 2017. search.proquest.com Revista Brasileira de Políticas …. 0 cites.
    973. Le evoluzioni della moneta virtuale prospettive ed incognite legate ai bitcoin“. M Pellegrini, E Burricco, P Lucantoni. . tesi.luiss.it. 0 cites.
    974. Big Data, Innovation und Datenschutz. Studie für eine DS-GVO kompatible Vorgangsweise zur Entwicklung einer Big Data Anwendung“. C Appl, A Ekelhart, N Fenz, P Keiseberg, H Leo…. 2017. epub.wu.ac.at . 0 cites.
    975. Zur politischen Ökonomie von Sezessionen“. CL Thiele, M Diehl, T Mayer, D Elsner, G Pecksen…. 2017. cesifo-group.de . 0 cites.
    976. Big Data und Musik: Jahrbuch für Musikwirtschafts-und Musikkulturforschung 1/2018“. M Ahlers, L Grünewald-Schukalla, M Lücke, M Rauch. 2018. books.google.com . 0 cites.
    977. Big Data und Musik“. M Ahlers, L Grünewald-Schukalla, M Lücke, M Rauch. . Springer. 0 cites.
    978. Io sono cultura. Rapporto 2018. L’Italia della qualità e della bellezza sfida la crisi“. F Zurlo. 2018. re.public.polimi.it . 0 cites.
    979. Le numérique au service de comportements durables? Premiers pas des entreprises de «Transition Techs»“. V Peugeot, JS Beuscart…. 2018. journals.openedition.org … . Technologie de l’ …. 0 cites.
    980. Künstliche Intelligenz in der Medizin“. B Bogdan. 2018. Springer MedRevolution. 0 cites.
    981. Bitcoin: En analyse av Bitcoins implikasjoner og hvordan norske skattemyndigheter utfordres“. L Standal, JH Hageløkken. 2017. brage.bibsys.no . 0 cites.
    982. I processi di trasformazione digitale nelle PA con particolare riferimento all’integrazione dei sistemi informativi“. L Pisano. 2017. tesi.luiss.it . 0 cites.
    983. Network Science–Applications in Technology, Business and Social Media“. A Baumann. 2018. edoc.hu-berlin.de . 0 cites.
    984. Verbraucherrecht 2.0-Verbraucher in der digitalen Welt“. HW Micklitz, LA Reisch, G Joost, H Zander-Hayat. 2017. Nomos . 0 cites.
    985. Il ruolo dell’Italia nella sicurezza cibernetica: Minacce, sfide e opportunità“. V De Luca, GMT di Sant’Agata, F Voce. 2018. FrancoAngeli . 0 cites.
    986. MakeToCare. Un ecosistema di attori e soluzioni user-centered per l’innovazione nel campo dell’healthcare“. S Maffei, M Bianchini, B Parini, E Delli Zotti. 2017. re.public.polimi.it . 0 cites.
    987. Ransomware“. MJ Arnaltes Navarro. . openaccess.uoc.edu. 0 cites.
    988. Verbraucher und Online-Plattformen“. L Adam, HW Micklitz. 2017. nomos-elibrary.de … 2.0-Verbraucher in der digitalen Welt. 0 cites.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.