An Analysis of Anonymity in Bitcoin Using P2P Network Traffic

作者: Philip Koshy , Diana Koshy , Patrick McDaniel

DOI: 10.1007/978-3-662-45472-5_30

关键词:

摘要: … Inspired by Dan Kaminsky’s 2011 Black Hat presentation [5], we decided to analyze traffic patterns on the Bitcoin network to see if it was possible to create mappings from …

参考文章(15)
Alice Kao, RIAA v. Verizon: Applying the Subpoena Provision of the DMCA Berkeley Technology Law Journal. ,vol. 19, pp. 405- ,(2004) , 10.15779/Z38769F
Tyler Moore, Nicolas Christin, Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk financial cryptography. pp. 25- 33 ,(2013) , 10.1007/978-3-642-39884-1_3
Dorit Ron, Adi Shamir, Quantitative Analysis of the Full Bitcoin Transaction Graph financial cryptography. pp. 6- 24 ,(2013) , 10.1007/978-3-642-39884-1_2
Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun, Evaluating User Privacy in Bitcoin financial cryptography. pp. 34- 51 ,(2013) , 10.1007/978-3-642-39884-1_4
Joseph Bonneau, Mike Just, Greg Matthews, What's in a name? Evaluating statistical attacks on personal knowledge questions financial cryptography. pp. 98- 113 ,(2010) , 10.1007/978-3-642-14577-3_10
I. Miers, C. Garman, M. Green, A. D. Rubin, Zerocoin: Anonymous Distributed E-Cash from Bitcoin ieee symposium on security and privacy. pp. 397- 411 ,(2013) , 10.1109/SP.2013.34
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, A fistful of bitcoins: characterizing payments among men with no names internet measurement conference. pp. 127- 140 ,(2013) , 10.1145/2504730.2504747
Micha Ober, Stefan Katzenbeisser, Kay Hamacher, Structure and Anonymity of the Bitcoin Transaction Graph Future Internet. ,vol. 5, pp. 237- 250 ,(2013) , 10.3390/FI5020237
Gail-Joon Ahn, Mohamed Shehab, Anna Squicciarini, Security and Privacy in Social Networks IEEE Internet Computing. ,vol. 15, pp. 10- 12 ,(2011) , 10.1109/MIC.2011.66