References
- Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
- Ron, D., & Shamir, A. (2013, April). Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security (pp. 6-24). Springer, Berlin, Heidelberg.
- Androulaki, E., Karame, G. O., Roeschlin, M., Scherer, T., & Capkun, S. (2013, April). Evaluating user privacy in bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 34-51). Springer, Berlin, Heidelberg.
- Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013, October). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). ACM.
- Spagnuolo, M., Maggi, F., & Zanero, S. (2014, March). Bitiodine: Extracting intelligence from the bitcoin network. In International Conference on Financial Cryptography and Data Security (pp. 457-468). Springer, Berlin, Heidelberg.
- Nick, J. D. (2015). Data-Driven De-Anonymization in Bitcoin (Master's thesis, ETH-Zurich).
- Harrigan, M., & Fretter, C. (2016, July). The unreasonable effectiveness of address clustering. In Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 Intl IEEE Conferences (pp. 368-373). IEEE.
- Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014, November). Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 15-29). ACM.
- Koshy, P., Koshy, D., & McDaniel, P. (2014, March). An analysis of anonymity in bitcoin using p2p network traffic. In International Conference on Financial Cryptography and Data Security (pp. 469-485). Springer, Berlin, Heidelberg.
- Biryukov, A., & Pustogarov, I. (2015, May). Bitcoin over Tor isn't a good idea. In Security and Privacy (SP), 2015 IEEE Symposium on (pp. 122-134). IEEE.
- Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A., & Felten, E. W. (2014, March). Mixcoin: Anonymity for Bitcoin with accountable mixes. In International Conference on Financial Cryptography and Data Security (pp. 486-504). Springer, Berlin, Heidelberg.
- Valenta, L., & Rowan, B. (2015, January). Blindcoin: Blinded, accountable mixes for bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 112-126). Springer, Berlin, Heidelberg.
- Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., & Goldberg, S. (2017). Tumblebit: An untrusted bitcoin-compatible anonymous payment hub. Proceedings of NDSS 2017.
- Maxwell, G.: CoinJoin: Bitcoin privacy for the real world. Post on Bitcoin Forum (August 2013), https://bitcointalk.org/index.php?topic=279249
- Ruffing, T., Moreno-Sanchez, P., & Kate, A. (2014, September). CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security (pp. 345-364). Springer, Cham.
- Ruffing, T., Moreno-Sanchez, P., Kate, A. (2017). P2P mixing and unlinkable Bitcoin transactions. In: NDSS 2017
- Ruffing, T., & Moreno-Sanchez, P. (2017, April). ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 133-154). Springer, Cham.
- Maxwell, G.: Confidential transactions (2015). https://people.xiph.org/-greg/confidential values.txt
- Todd, P.: Stealth addresses. Post on Bitcoin development mailing list. https://www.mail-archive.com/bitcoin-development@lists.sourceforge.net/msg03613.html