tech-reports/network-privacy-assessment/network-privacy.bib

170 lines
5.0 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@misc{zcash-spec,
author = {Daira Hopwood and Sean Bowe and Taylor Hornby and Nathan Wilcox},
title = {{Zcash Protocol Specification}},
howpublished = {\url{https://github.com/zcash/zips/blob/master/protocol/protocol.pdf}},
note = {
{last accessed 2020-05-29}
},
year = {2020}
}
@misc{light-wallet-spec,
author = {George Tankersley, Jack Grigg},
title = {{Light Client Protocol for Payment Detection}},
howpublished = {\url{https://github.com/gtank/zips/blob/light_payment_detection/zip-XXX-light-payment-detection.rst}},
note = {
{last accessed 2020-05-29}
},
year = {2018}
}
@misc{katzenpost,
author = {Yawning Angel and George Danezis and Claudia Diaz and Ania Piotrowska and David Stainton},
title = {{Katzenpost Mix Network Specification}},
howpublished = {\url{https://katzenpost.mixnetworks.org/docs/specs/mixnet.html}},
note = {
{last accessed 2019-12-16}
},
year = {2017}
}
@inproceedings{Dingledine2004TorTS,
title={{Tor: The Second-Generation Onion Router}},
author={Roger Dingledine and Nick Mathewson and Paul F. Syverson},
booktitle={USENIX Security Symposium},
year={2004}
}
@inproceedings{Piotrowska:2017:LAS,
author = {Piotrowska, Ania M. and Hayes, Jamie and Elahi, Tariq and Meiser, Sebastian and Danezis, George},
title = {{The Loopix Anonymity System}},
booktitle = {Proceedings of the 26th USENIX Conference on Security Symposium},
series = {SEC'17},
year = {2017},
pages = {1199--1216},
numpages = {18},
url = {http://dl.acm.org/citation.cfm?id=3241189.3241283},
acmid = {3241283},
publisher = {USENIX Association},
}
@misc{fanti2018dandelion,
title={Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees},
author={Giulia Fanti and Shaileshh Bojja Venkatakrishnan and Surya Bakshi and Bradley Denby and Shruti Bhargava and Andrew Miller and Pramod Viswanath},
year={2018},
eprint={1805.11060},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@InProceedings{anon-bitcoin,
author="Koshy, Philip
and Koshy, Diana
and McDaniel, Patrick",
editor="Christin, Nicolas
and Safavi-Naini, Reihaneh",
title="An Analysis of Anonymity in Bitcoin Using P2P Network Traffic",
booktitle="Financial Cryptography and Data Security",
year="2014",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="469--485",
isbn="978-3-662-45472-5"
}
@misc{dandelion,
title={Dandelion: Redesigning the Bitcoin Network for Anonymity},
author={Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath},
year={2017},
eprint={1701.04439},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@article{BojjaVenkatakrishnan:2017:DRB,
author = {Bojja Venkatakrishnan, Shaileshh and Fanti, Giulia and Viswanath, Pramod},
title = {{Dandelion: Redesigning the Bitcoin Network for Anonymity}},
journal = {Proc. ACM Meas. Anal. Comput. Syst.},
issue_date = {June 2017},
volume = {1},
number = {1},
month = jun,
year = {2017},
issn = {2476-1249},
pages = {22:1--22:34},
articleno = {22},
numpages = {34},
url = {http://doi.acm.org/10.1145/3084459},
doi = {10.1145/3084459},
acmid = {3084459},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {bitcoin, cryptocurrencies},
}
@article{Fanti:2018:DLC,
author = {Fanti, Giulia and Venkatakrishnan, Shaileshh Bojja and Bakshi, Surya and Denby, Bradley and Bhargava, Shruti and Miller, Andrew and Viswanath, Pramod},
title = {{Dandelion++: Lightweight Cryptocurrency Networking with Formal
Anonymity Guarantees}},
journal = {Proc. ACM Meas. Anal. Comput. Syst.},
issue_date = {June 2018},
volume = {2},
number = {2},
month = jun,
year = {2018},
issn = {2476-1249},
pages = {29:1--29:35},
url = {http://doi.acm.org/10.1145/3224424},
doi = {10.1145/3224424},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {anonymity, cryptocurrencies, p2p networks},
}
@misc{tor-specification,
author = {Roger Dingledine and Nick Mathewson},
title = {{Tor Protocol Specification}},
howpublished = {\url{https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt}},
note = {
{last accessed 2020-06-22}
},
year = {2020}
}
@article{pir,
author = {Chor, Benny and Kushilevitz, Eyal and Goldreich, Oded and Sudan, Madhu},
title = {Private Information Retrieval},
year = {1998},
issue_date = {Nov. 1998},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {45},
number = {6},
issn = {0004-5411},
url = {https://doi.org/10.1145/293347.293350},
doi = {10.1145/293347.293350},
journal = {J. ACM},
month = nov,
pages = {965981},
numpages = {17}
}
@article{JAWAHERI2020101684,
title = "Deanonymizing Tor hidden service users through Bitcoin transactions analysis",
journal = "Computers \& Security",
volume = "89",
pages = "101684",
year = "2020",
issn = "0167-4048",
doi = "https://doi.org/10.1016/j.cose.2019.101684",
url = "http://www.sciencedirect.com/science/article/pii/S0167404818309908",
author = "Husam Al Jawaheri and Mashael Al Sabah and Yazan Boshmaf and Aiman Erbad",
keywords = "Bitcoin, Tor hidden services, Privacy, Deanonymization, Attack",
}