[1] |
REID F , HARRIGAN M . An analysis of anonymity in the Bitcoin system[C]// The 2011 IEEE Third International Conference on Privacy,Security,Risk and Trust,October 9-11,2011,Boston,USA. Piscataway:IEEE Press, 2011: 1318-1326.
|
[2] |
LIAO K , ZHAO Z , DOUPE A ,et al. Behind closed doors:measurement and analysis of CryptoLocker ransoms in Bitcoin[C]// The Symposium on Electronic Crime Research,June 1-3,2016,Toronto,Canada. Piscataway:IEEE Press, 2016: 1-13.
|
[3] |
RON D , SHAMIR A . Quantitative analysis of the full Bitcoin transaction graph[C]// The 17th International Conference on Financial Cryptography and Data Security,April 1-5,2013,Okinawa,Japan. Heidelberg:Springer, 2013: 6-24.
|
[4] |
MEIKLEJOHN S , POMAROLE M , JORDAN G ,et al. A fistful of bitcoins:characterizing payments among men with no names[C]// The 13th ACM Internet Measurement Conference,October 23-25,2013,Barcelona,Spain. New York:ACM Press, 2013: 127-140.
|
[5] |
ZHAO C . Graph-based forensic investigation of Bitcoin transactions[D]. Iowa:Iowa State University, 2014.
|
[6] |
DWORK C , NAOR M . Pricing via processing or combatting junk mail[C]// The 12th Annual International Cryptology Conference on Advances in Cryptology,August 16-20,1992,Santa Barbara,USA. Piscataway:IEEE Press, 1992: 139-147.
|
[7] |
CASTRO M , LISKOV B . Practical byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002,20(4): 398-461.
|
[8] |
ANDROULAKI E , KARAME G O , ROESCHLIN M ,et al. Evaluating user privacy in Bitcoin[C]// The 17th International Conference on Financial Cryptography and Data Security,April 1-5,2013,Okinawa,Japan. Heidelberg:Springer, 2013: 34-51.
|
[9] |
MONACO J V , . Identifying Bitcoin users by transaction behavior[C]// The SPIE DSS,April 20-25,2015,Baltimore,USA. Baltimore:SPIE, 2015.
|
[10] |
CHAUM D . Untraceable electronic mail,return addresses and digital pseudonyms[J]. Communications of the ACM, 2003: 211-219.
|
[11] |
BONNEAU J , NARAYANAN A , MILLER A ,et al. Mixcoin:anonymity for Bitcoin with accountable mixes[C]// The 19th International Conference on Financial Cryptography and Data Security,January 26-30,2015,San Juan,Argentina. Barbados:Financial Cryptography, 2014: 486-504.
|
[12] |
VALENTA L , ROWAN B . Blindcoin:blinded,accountable mixes for Bitcoin[J]. Financial Cryptography and Data Security, 2015: 112-126
|
[13] |
SHENTU Q C , YU J P . A blind-mixing scheme for Bitcoin based on an elliptic curve cryptography blind digital signature algorithm[J]. Computer Science, 2015.
|
[14] |
RUFFING T,MORENO-SANCHEZ P , KATE A . CoinShuffle:practical decentralized coin mixing for Bitcoin[M]// Computer Security -ESORICS 2014,Heidelberg:Springer, 2014: 345-364.
|
[15] |
BISSIAS G , OZISIK A P , LEVINE B N ,et al. Sybil-resistant mixing for Bitcoin[C]// The 2015 ACM Workshop on Privacy in the Electronic Society,November 3,2014,Scottsdale,USA. New York:ACM Press, 2014: 149-158.
|
[16] |
ZIEGELDORF J H , GROSSMANN F , HENZE M ,et al. CoinParty:secure multi-party mixing of Bitcoins[C]// The 5th ACM Conference on Data and Application Security and Privacy,March 2-4,2015,San Antonio,USA. New York:ACM Press, 2015: 75-86.
|
[17] |
DANEZIS G , FOURNET C , KOHLWEISS M ,et al. Pinocchio coin:building zerocoin from a succinct pairing-based proof system[C]// ACM Workshop on Language Support for Privacy-Enhancing Technologies,November 4,2013,Berlin,Germany. New York:ACM Press, 2013: 27-30.
|
[18] |
SASSON E B , CHIESA A , GARMAN C ,et al. Zerocash:decentralized anonymous payments from Bitcoin[C]// The 2014 IEEE Symposium on Security and Privacy,May 18-21,2014,Berkeley,USA. Washington:IEEE Computer Society, 2014: 459-474.
|