170 lines
5.0 KiB
BibTeX
170 lines
5.0 KiB
BibTeX
@misc{zcash-spec,
|
||
author = {Daira Hopwood and Sean Bowe and Taylor Hornby and Nathan Wilcox},
|
||
title = {{Zcash Protocol Specification}},
|
||
howpublished = {\url{https://github.com/zcash/zips/blob/master/protocol/protocol.pdf}},
|
||
note = {
|
||
{last accessed 2020-05-29}
|
||
},
|
||
year = {2020}
|
||
}
|
||
|
||
@misc{light-wallet-spec,
|
||
author = {George Tankersley, Jack Grigg},
|
||
title = {{Light Client Protocol for Payment Detection}},
|
||
howpublished = {\url{https://github.com/gtank/zips/blob/light_payment_detection/zip-XXX-light-payment-detection.rst}},
|
||
note = {
|
||
{last accessed 2020-05-29}
|
||
},
|
||
year = {2018}
|
||
}
|
||
|
||
|
||
@misc{katzenpost,
|
||
author = {Yawning Angel and George Danezis and Claudia Diaz and Ania Piotrowska and David Stainton},
|
||
title = {{Katzenpost Mix Network Specification}},
|
||
howpublished = {\url{https://katzenpost.mixnetworks.org/docs/specs/mixnet.html}},
|
||
note = {
|
||
{last accessed 2019-12-16}
|
||
},
|
||
year = {2017}
|
||
}
|
||
|
||
@inproceedings{Dingledine2004TorTS,
|
||
title={{Tor: The Second-Generation Onion Router}},
|
||
author={Roger Dingledine and Nick Mathewson and Paul F. Syverson},
|
||
booktitle={USENIX Security Symposium},
|
||
year={2004}
|
||
}
|
||
|
||
@inproceedings{Piotrowska:2017:LAS,
|
||
author = {Piotrowska, Ania M. and Hayes, Jamie and Elahi, Tariq and Meiser, Sebastian and Danezis, George},
|
||
title = {{The Loopix Anonymity System}},
|
||
booktitle = {Proceedings of the 26th USENIX Conference on Security Symposium},
|
||
series = {SEC'17},
|
||
year = {2017},
|
||
pages = {1199--1216},
|
||
numpages = {18},
|
||
url = {http://dl.acm.org/citation.cfm?id=3241189.3241283},
|
||
acmid = {3241283},
|
||
publisher = {USENIX Association},
|
||
}
|
||
|
||
@misc{fanti2018dandelion,
|
||
title={Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees},
|
||
author={Giulia Fanti and Shaileshh Bojja Venkatakrishnan and Surya Bakshi and Bradley Denby and Shruti Bhargava and Andrew Miller and Pramod Viswanath},
|
||
year={2018},
|
||
eprint={1805.11060},
|
||
archivePrefix={arXiv},
|
||
primaryClass={cs.CR}
|
||
}
|
||
|
||
@InProceedings{anon-bitcoin,
|
||
author="Koshy, Philip
|
||
and Koshy, Diana
|
||
and McDaniel, Patrick",
|
||
editor="Christin, Nicolas
|
||
and Safavi-Naini, Reihaneh",
|
||
title="An Analysis of Anonymity in Bitcoin Using P2P Network Traffic",
|
||
booktitle="Financial Cryptography and Data Security",
|
||
year="2014",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="469--485",
|
||
isbn="978-3-662-45472-5"
|
||
}
|
||
|
||
|
||
@misc{dandelion,
|
||
title={Dandelion: Redesigning the Bitcoin Network for Anonymity},
|
||
author={Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath},
|
||
year={2017},
|
||
eprint={1701.04439},
|
||
archivePrefix={arXiv},
|
||
primaryClass={cs.CR}
|
||
}
|
||
|
||
@article{BojjaVenkatakrishnan:2017:DRB,
|
||
author = {Bojja Venkatakrishnan, Shaileshh and Fanti, Giulia and Viswanath, Pramod},
|
||
title = {{Dandelion: Redesigning the Bitcoin Network for Anonymity}},
|
||
journal = {Proc. ACM Meas. Anal. Comput. Syst.},
|
||
issue_date = {June 2017},
|
||
volume = {1},
|
||
number = {1},
|
||
month = jun,
|
||
year = {2017},
|
||
issn = {2476-1249},
|
||
pages = {22:1--22:34},
|
||
articleno = {22},
|
||
numpages = {34},
|
||
url = {http://doi.acm.org/10.1145/3084459},
|
||
doi = {10.1145/3084459},
|
||
acmid = {3084459},
|
||
publisher = {ACM},
|
||
address = {New York, NY, USA},
|
||
keywords = {bitcoin, cryptocurrencies},
|
||
}
|
||
|
||
@article{Fanti:2018:DLC,
|
||
author = {Fanti, Giulia and Venkatakrishnan, Shaileshh Bojja and Bakshi, Surya and Denby, Bradley and Bhargava, Shruti and Miller, Andrew and Viswanath, Pramod},
|
||
title = {{Dandelion++: Lightweight Cryptocurrency Networking with Formal
|
||
Anonymity Guarantees}},
|
||
journal = {Proc. ACM Meas. Anal. Comput. Syst.},
|
||
issue_date = {June 2018},
|
||
volume = {2},
|
||
number = {2},
|
||
month = jun,
|
||
year = {2018},
|
||
issn = {2476-1249},
|
||
pages = {29:1--29:35},
|
||
url = {http://doi.acm.org/10.1145/3224424},
|
||
doi = {10.1145/3224424},
|
||
publisher = {ACM},
|
||
address = {New York, NY, USA},
|
||
keywords = {anonymity, cryptocurrencies, p2p networks},
|
||
}
|
||
|
||
@misc{tor-specification,
|
||
author = {Roger Dingledine and Nick Mathewson},
|
||
title = {{Tor Protocol Specification}},
|
||
howpublished = {\url{https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt}},
|
||
note = {
|
||
{last accessed 2020-06-22}
|
||
},
|
||
year = {2020}
|
||
}
|
||
|
||
|
||
@article{pir,
|
||
author = {Chor, Benny and Kushilevitz, Eyal and Goldreich, Oded and Sudan, Madhu},
|
||
title = {Private Information Retrieval},
|
||
year = {1998},
|
||
issue_date = {Nov. 1998},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {45},
|
||
number = {6},
|
||
issn = {0004-5411},
|
||
url = {https://doi.org/10.1145/293347.293350},
|
||
doi = {10.1145/293347.293350},
|
||
journal = {J. ACM},
|
||
month = nov,
|
||
pages = {965–981},
|
||
numpages = {17}
|
||
}
|
||
|
||
|
||
@article{JAWAHERI2020101684,
|
||
title = "Deanonymizing Tor hidden service users through Bitcoin transactions analysis",
|
||
journal = "Computers \& Security",
|
||
volume = "89",
|
||
pages = "101684",
|
||
year = "2020",
|
||
issn = "0167-4048",
|
||
doi = "https://doi.org/10.1016/j.cose.2019.101684",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S0167404818309908",
|
||
author = "Husam Al Jawaheri and Mashael Al Sabah and Yazan Boshmaf and Aiman Erbad",
|
||
keywords = "Bitcoin, Tor hidden services, Privacy, Deanonymization, Attack",
|
||
}
|
||
|
||
|