P2P Mixing and Unlinkable Bitcoin Transactions

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (24. : 2017 : San Diego, Calif.) Network and Distributed System Security Symposium 2017 ; Volume 1 of 2
1. Verfasser: Ruffing, T. (VerfasserIn)
Weitere Verfasser: Moreno-Sanchez, P. (VerfasserIn), Kate, A. (VerfasserIn)
Pages:2017
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
ObliviSync: Practical Oblivious File Backup and Synchronization 2020 Aviv, A. J.
KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting 2020 Xu, W.
A Large-scale Analysis of the Mnemonic Password Advice 2020 Kiesel, J.
MAMADROID: Detecting Android Malware by Building Markov Chains of Behavioral Models 2020 Mariconti, E.
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO 2020 Nielsen, J. B.
The Security Impact of HTTPS Interception 2020 Durumeric, Z.
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub 2020 Heilman, E.
PSI: Precise Security Instrumentation for Enterprise Networks 2020 Yu, T.
Fake Co-visitation Injection Attacks to Recommender Systems 2020 Yang, G.
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns 2020 Kwon, B. J.
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS 2020 Dorey, K.
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps 2020 Yang, W.
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality 2020 Miers, I.
P2P Mixing and Unlinkable Bitcoin Transactions 2020 Ruffing, T.
DELTA: A Security Assessment Framework for Software-Defined Networks 2020 Lee, S.
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries the Web 2020 Lauinger, T.
Broken Hearted: How To Attack ECG Biometrics 2020 Eberz, S.
Dial One for Scam: A Large-Scale Analysis of Technical Support Scams 2020 Miramirkhani, N.
Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability 2020 Feng, Y.
Pushing the Communication Barrier in Secure Computation using Lookup Tables 2020 Dessouky, G.
Alle Artikel auflisten