%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.129", %%% date = "16 January 2026", %%% time = "09:25:52 MDT", %%% filename = "bitcoin.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "05634 60023 258784 2704044", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "Autonocoin; BGPCoin; bibliography; BibTeX; %%% Bit Gold; Bitcoin; Blindcoin; Blockchain; %%% BlueWallet; Botcoin; Catena; CommitCoin; %%% CONIKS; cryptocoin; Dietcoin; Digicash; %%% distributed ledger; dogecoin; Ecash; %%% Electroneum; Equihash; Ethereum; Filecoin; %%% Frax; Freicoin; GayCoin; Hashcash; Kodak %%% KashMiner; KodakCoin; Libra; Litecoin; %%% litecoin; LocalCoin; MasterCoin; MicroMint; %%% MixCoin; Namecoin; Nautiluscoin; New Economy %%% Movement (NEM); Paxos; PayWord; peercoin; %%% Peppercoin; Permacoin; PPCoin; Primecoin; %%% primecoin; Proof of Activity; Proof of Luck; %%% Proof of Stake; Proof of Work; Retricoin; %%% Ripplecoin; RPXcoin; Smileycoin; Solidity; %%% Stablecoin; Tether; Zerocash; Zerocoin; %%% Zetacoin; ZombieCoin", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a bibliography of publications about %%% digital currency systems, of which Bitcoin is %%% the most notable example. It also includes %%% in a separate section, near the end of this %%% file, COMPLETE coverage of a new open-source %%% journal, Ledger, that is devoted to %%% cryptocurrency and blockchain technology. %%% %%% From the Oxford English Dictionary online: %%% %%% Bitcoin n. (a proprietary name for) a %%% digital payment system introduced in %%% 2009, having its own unit of account; the %%% unit of account of this system. %%% %%% The New York Times reported (see entry %%% Popper:2017:BSI) that in late 2017, Bitcoin %%% trading was about five billion dollars a day. %%% During 2017, stocks in First Bitcoin Capital %%% Corporation fluctuated from USD 0.001/share %%% to almost USD 2700/share. Share prices in %%% another firm, Bitcoin Investment Trust, have %%% ranged from USD 98 to USD 1824 in the same %%% interval. Despite the market volatility of %%% Bitcoin, there is a fair amount of serious %%% academic research published in about 120 %%% different journals, and in scores of books, %%% more than 80 graduate dissertations and %%% theses, and hundreds of conference papers, %%% devoted to the study of Bitcoin and other %%% digital currency proposals. %%% %%% For a good survey of the origins of Bitcoin, %%% see entry Narayanan:2017:BAP. %%% %%% At version 1.129, the year coverage looked %%% like this: %%% %%% 1976 ( 1) 1993 ( 2) 2010 ( 0) %%% 1977 ( 0) 1994 ( 0) 2011 ( 10) %%% 1978 ( 0) 1995 ( 0) 2012 ( 17) %%% 1979 ( 0) 1996 ( 4) 2013 ( 63) %%% 1980 ( 1) 1997 ( 3) 2014 ( 122) %%% 1981 ( 1) 1998 ( 1) 2015 ( 118) %%% 1982 ( 1) 1999 ( 1) 2016 ( 189) %%% 1983 ( 2) 2000 ( 2) 2017 ( 473) %%% 1984 ( 0) 2001 ( 2) 2018 ( 233) %%% 1985 ( 1) 2002 ( 3) 2019 ( 205) %%% 1986 ( 0) 2003 ( 3) 2020 ( 244) %%% 1987 ( 0) 2004 ( 3) 2021 ( 287) %%% 1988 ( 1) 2005 ( 2) 2022 ( 185) %%% 1989 ( 1) 2006 ( 0) 2023 ( 14) %%% 1990 ( 0) 2007 ( 0) 2024 ( 6) %%% 1991 ( 3) 2008 ( 6) 2025 ( 0) %%% 1992 ( 0) 2009 ( 3) 2026 ( 1) %%% %%% Article: 1278 %%% Book: 82 %%% InBook: 1 %%% InCollection: 187 %%% InProceedings: 447 %%% MastersThesis: 51 %%% Misc: 100 %%% PhdThesis: 30 %%% Proceedings: 17 %%% TechReport: 20 %%% Unpublished: 1 %%% %%% Total entries: 2214 %%% %%% Bitcoins and other digital currencies may be %%% convertable to and from conventional national %%% currencies via exchange brokers, including %%% many listed at these Web locations: %%% %%% https://bitcoin.org/en/exchanges %%% https://cex.io/ %%% https://filecoin.io/ %%% https://www.coinbase.com/ %%% https://www.itbit.com/exchange %%% %%% Some countries, including the US, strictly %%% control, limit, and tax, digital currency %%% exchange transactions. %%% %%% The highly-volatile Bitcoin exchange rates %%% are tracked live at %%% %%% https://www.gdax.com/trade/BTC-USD %%% https://www.coinbase.com/charts?locale=en-US %%% %%% There is a dynamic table of digital-currency %%% market capitalization at %%% %%% https://coinmarketcap.com/ %%% %%% There is a list of most-cited blockchain and %%% Bitcoin publications at %%% %%% https://blockchainlibrary.org/most-cited-blockchain-bitcoin-publications/ %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation tags were automatically generated by %%% software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted %%% first by ascending year, and within each %%% year, alphabetically by author or editor, %%% and then, if necessary, by the 3-letter %%% abbreviation at the end of the BibTeX %%% citation tag, using the bibsort -byyear %%% utility. Year order has been chosen to %%% make it easier to identify the most recent %%% work. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\hyphenation{}" # "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" # "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-ACM-SIGCAS-COMPUT-SOC = "ACM SIGCAS Computers and Society"} @String{j-ADV-APPL-PROB = "Advances in Applied Probability"} @String{j-ALGORITHMS-BASEL = "Algorithms ({Basel})"} @String{j-AM-SCI = "American Scientist"} @String{j-ANN-STAT = "Annals of Statistics"} @String{j-CACM = "Communications of the ACM"} @String{j-CAN-J-STAT = "The Canadian Journal of Statistics = La revue canadienne de statistique"} @String{j-CCPE = "Concurrency and Computation: Prac\-tice and Experience"} @String{j-CHAOS-SOLITONS-FRACTALS = "Chaos, Solitons \& Fractals"} @String{j-COMMUN-STAT-THEORY-METH = "Communications in Statistics: Theory and Methods"} @String{j-COMP-ARCH-NEWS = "ACM SIGARCH Computer Architecture News"} @String{j-COMP-J = "The Computer Journal"} @String{j-COMP-NET-AMSTERDAM = "Computer Networks (Amsterdam, Netherlands: 1999)"} @String{j-COMP-OP-RES = "Computers and Operations Research"} @String{j-COMP-SURV = "ACM Computing Surveys"} @String{j-COMPUT-EDGE = "ComputingEdge"} @String{j-COMPUT-ELECTR-ENG = "Computers and Electrical Engineering"} @String{j-COMPUT-INTELL = "Computational Intelligence"} @String{j-COMPUT-SCI-ENG = "Computing in Science and Engineering"} @String{j-COMPUT-SECUR = "Computers \& Security"} @String{j-COMPUT-STAT-DATA-ANAL = "Computational Statistics \& Data Analysis"} @String{j-COMPUT-SUPPORTED-COOP-WORK = "Computer Supported Cooperative Work [CSCW]"} @String{j-COMPUT-SYST-SCI-ENG = "Computer Systems Science and Engineering"} @String{j-COMPUTER = "Computer"} @String{j-COMPUTING = "Computing"} @String{j-CROSSROADS = "ACM Crossroads"} @String{j-CRYPTOBYTES = "CryptoBytes"} @String{j-CRYPTOGR-COMMUN = "Cryptography and Communications"} @String{j-CRYPTOLOGIA = "Cryptologia"} @String{j-DEC-SUPP-SYS = "Decision Support Systems"} @String{j-DESIGNS-CODES-CRYPTOGR = "Designs, Codes, and Cryptography"} @String{j-DGOV = "Digital Government: Research and Practice (DGOV)"} @String{j-DTRAP = "Digital Threats: Research and Practice (DTRAP)"} @String{j-ECONOM-LETT = "Economics Letters"} @String{j-ECONOM-STAT = "Econometrics and Statistics"} @String{j-ECONOMIST = "The Economist"} @String{j-ELECT-NOTES-THEOR-COMP-SCI = "Electronic Notes in Theoretical Computer Science"} @String{j-EMPIR-SOFTWARE-ENG = "Empirical Software Engineering"} @String{j-ENTROPY = "Entropy"} @String{j-EUR-J-OPER-RES = "European Journal of Operational Research"} @String{j-EUR-MATH-SOC-NEWSL = "European Mathematical Society. Newsletter"} @String{j-EUR-PHYS-J-SPEC-TOP = "European Physical Journal --- Special Topics"} @String{j-EXPERT-SYST-APPL = "Expert Systems with Applications"} @String{j-FORBES = "Forbes"} @String{j-FUT-GEN-COMP-SYS = "Future Generation Computer Systems"} @String{j-FUTURE-INTERNET = "Future Internet"} @String{j-IBM-JRD = "IBM Journal of Research and Development"} @String{j-IEEE-ACCESS = "IEEE Access"} @String{j-IEEE-CGA = "IEEE Computer Graphics and Applications"} @String{j-IEEE-MICRO = "IEEE Micro"} @String{j-IEEE-SEC-PRIV = "IEEE Security \& Privacy"} @String{j-IEEE-SOFTWARE = "IEEE Software"} @String{j-IEEE-SPECTRUM = "IEEE Spectrum"} @String{j-IEEE-TRANS-BIG-DATA = "IEEE Transactions on Big Data"} @String{j-IEEE-TRANS-COMPUT = "IEEE Transactions on Computers"} @String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"} @String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"} @String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and Distributed Systems"} @String{j-IEEE-TRANS-SOFTW-ENG = "IEEE Transactions on Software Engineering"} @String{j-IEEE-TRANS-VIS-COMPUT-GRAPH = "IEEE Transactions on Visualization and Computer Graphics"} @String{j-INFO-PROC-LETT = "Information Processing Letters"} @String{j-INFORMATIK-SPEKTRUM = "Informatik Spektrum"} @String{j-INT-J-INFO-SEC = "International Journal of Information Security"} @String{j-INT-J-STAT-PROBAB = "International Journal of Statistics and Probability"} @String{j-INTERACTIONS = "Interactions (New York, NY)"} @String{j-IT-PRO = "{IT} Professional"} @String{j-J-ACCOUNT-EDUC = "Journal of Accounting Education"} @String{j-J-APPL-STAT = "Journal of Applied Statistics"} @String{j-J-ASSET-MANAGE = "Journal of Asset Management"} @String{j-J-COMP-SECUR = "Journal of Computer Security"} @String{j-J-COMPUT-APPL-MATH = "Journal of Computational and Applied Mathematics"} @String{j-J-CRYPTOLOGY = "Journal of Cryptology: the journal of the International Association for Cryptologic Research"} @String{j-J-GRID-COMP = "Journal of Grid Computing"} @String{j-J-INFO-SEC-APPL = "Journal of Information Security and Applications (JISA)"} @String{j-J-INFORMETRICS = "Journal of Informetrics"} @String{j-J-MED-SYST = "Journal of Medical Systems"} @String{j-J-NETW-COMPUT-APPL = "Journal of Network and Computer Applications"} @String{j-NETWORK-SECURITY = "Network Security"} @String{j-J-PAR-DIST-COMP = "Journal of Parallel and Distributed Computing"} @String{j-J-SOFTW-EVOL-PROC = "Journal of Software: Evolution and Process"} @String{j-J-SUPERCOMPUTING = "The Journal of Supercomputing"} @String{j-J-SYST-SOFTW = "The Journal of Systems and Software"} @String{j-JDIQ = "Journal of Data and Information Quality (JDIQ)"} @String{j-LEARN-PUBL = "Learned Publishing"} @String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"} @String{j-LOGIN = ";login: the USENIX Association newsletter"} @String{j-MAR-POLICY = "Marine Policy"} @String{j-MULTIMEDIA-TOOLS-APPLIC = "Multimedia Tools and Applications"} @String{j-NETWORK-SECURITY = "Network Security"} @String{j-NEW-J-PHYS = "New Journal of Physics"} @String{j-NEW-SCIENTIST = "New Scientist"} @String{j-NY-TIMES = "New York Times"} @String{j-OPER-SYS-REV = "Operating Systems Review"} @String{j-PACMHCI = "Proceedings of the ACM on Human-Computer Interaction (PACMHCI)"} @String{j-PACMPL = "Proceedings of the ACM on Programming Languages (PACMPL)"} @String{j-PARALLEL-COMPUTING = "Parallel Computing"} @String{j-PERF-EVAL = "Performance Evaluation"} @String{j-PHYSICA-A = "Physica A"} @String{j-POMACS = "Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)"} @String{j-PROC-VLDB-ENDOWMENT = "Proceedings of the VLDB Endowment"} @String{j-QUAL-QUANT = "Quality \& Quantity"} @String{j-QUANT-FINANCE = "Quantitative Finance"} @String{j-QUEUE = "ACM Queue: Tomorrow's Computing Today"} @String{j-REGISTER = "The Register"} @String{j-REV-FINANCE = "Review of Finance"} @String{j-SCI-AMER = "Scientific American"} @String{j-SCI-PUBLIC-POL = "Science and Public Policy"} @String{j-SCIENTOMETRICS = "Scientometrics"} @String{j-SCPE = "Scalable Computing: Practice and Experience"} @String{j-SIAM-J-FINANCIAL-MATH = "SIAM Journal on Financial Mathematics"} @String{j-SIGACT = "ACM SIGACT News"} @String{j-SIGADA-LETTERS = "ACM SIGADA Ada Letters"} @String{j-SIGMETRICS = "ACM SIGMETRICS Performance Evaluation Review"} @String{j-SIGMOD = "SIGMOD Record (ACM Special Interest Group on Management of Data)"} @String{j-SIGPLAN = "ACM SIG{\-}PLAN Notices"} @String{j-SIGSOFT = "ACM SIGSOFT Software Engineering Notes"} @String{j-SOFT-COMP = "Soft computing: newsletter of the {Canadian Society for Fuzzy Information and Neural Systems}"} @String{j-SPE = "Soft\-ware\emdash Prac\-tice and Experience"} @String{j-TALLIP = "ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)"} @String{j-TCPS = "ACM Transactions on Cyber-Physical Systems (TCPS)"} @String{j-TEAC = "ACM Transactions on Economics and Computation"} @String{j-TECHNOVATION = "Technovation"} @String{j-TECS = "ACM Transactions on Embedded Computing Systems"} @String{j-TELEMAT-INFORM = "Telematics and Informatics"} @String{j-THEOR-COMP-SCI = "Theoretical Computer Science"} @String{j-TISSEC = "ACM Transactions on Information and System Security"} @String{j-TMIS = "ACM Transactions on Management Information Systems (TMIS)"} @String{j-TOCS = "ACM Transactions on Computer Systems"} @String{j-TODAES = "ACM Transactions on Design Automation of Electronic Systems"} @String{j-TOIT = "ACM Transactions on Internet Technology (TOIT)"} @String{j-TOMM = "ACM Transactions on Multimedia Computing, Communications, and Applications"} @String{j-TOPLAS = "ACM Transactions on Programming Languages and Systems"} @String{j-TOPS = "ACM Transactions on Privacy and Security (TOPS)"} @String{j-TOSEM = "ACM Transactions on Software Engineering and Methodology"} @String{j-TSC = "ACM Transactions on Social Computing (TSC)"} @String{j-TWEB = "ACM Transactions on the Web (TWEB)"} @String{j-WALL-ST-J = "Wall Street Journal"} @String{j-WIRED = "Wired"} %%% ==================================================================== %%% Publisher abbreviations: @String{pub-ACADEMIC = "Academic Press"} @String{pub-ACADEMIC:adr = "New York, NY, USA"} @String{pub-ACM = "ACM Press"} @String{pub-ACM:adr = "New York, NY 10036, USA"} @String{pub-APRESS = "Apress"} @String{pub-APRESS:adr = "Berkeley, CA, USA"} @String{pub-ARTECH = "Artech House Inc."} @String{pub-ARTECH:adr = "Norwood, MA, USA"} @String{pub-CAMBRIDGE = "Cambridge University Press"} @String{pub-CAMBRIDGE:adr = "Cambridge, UK"} @String{pub-CRC = "CRC Press"} @String{pub-CRC:adr = "Boca Raton, FL 33431-9868, USA"} @String{pub-DEC = "Digital Equipment Corporation"} @String{pub-DEC:adr = "Maynard, MA, USA"} @String{pub-DOUBLEDAY = "Doubleday"} @String{pub-DOUBLEDAY:adr = "New York, NY, USA"} @String{pub-HARVARD = "Harvard University Press"} @String{pub-HARVARD:adr = "Cambridge, MA, USA"} @String{pub-IBM = "IBM Corporation"} @String{pub-IBM:adr = "San Jose, CA, USA"} @String{pub-IEEE = "IEEE Computer Society Press"} @String{pub-IEEE:adr = "1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA"} @String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"} @String{pub-MCGRAW-HILL:adr = "New York, NY, USA"} @String{pub-MIT = "MIT Press"} @String{pub-MIT:adr = "Cambridge, MA, USA"} @String{pub-NIST = "National Institute for Standards and Technology"} @String{pub-NIST:adr = "Gaithersburg, MD, USA"} @String{pub-NO-STARCH = "No Starch Press"} @String{pub-NO-STARCH:adr = "San Francisco, CA, USA"} @String{pub-ORA = "O'Reilly \& Associates, Inc."} @String{pub-ORA:adr = "103a Morris Street, Sebastopol, CA 95472, USA, Tel: +1 707 829 0515, and 90 Sherman Street, Cambridge, MA 02140, USA, Tel: +1 617 354 5800"} @String{pub-ORA-MEDIA = "O'Reilly Media, Inc."} @String{pub-ORA-MEDIA:adr = "1005 Gravenstein Highway North, Sebastopol, CA 95472, USA"} @String{pub-PACKT = "Packt Publishing"} @String{pub-PACKT:adr = "Birmingham"} @String{pub-PLENUM = "Plenum Press"} @String{pub-PLENUM:adr = "New York, NY, USA; London, UK"} @String{pub-PRINCETON = "Princeton University Press"} @String{pub-PRINCETON:adr = "Princeton, NJ, USA"} @String{pub-PROMETHEUS-BOOKS = "Prometheus Books"} @String{pub-PROMETHEUS-BOOKS:adr = "Amherst, NY, USA"} @String{pub-QUE = "Que Corporation"} @String{pub-QUE:adr = "Indianapolis, IN, USA"} @String{pub-ROUTLEDGE = "Routledge \& Kegan Paul"} @String{pub-ROUTLEDGE:adr = "London, UK and New York, NY, USA"} @String{pub-ST-MARTINS = "St. Martin's Press"} @String{pub-ST-MARTINS:adr = "New York, NY, USA"} @String{pub-SV = "Spring{\-}er-Ver{\-}lag"} @String{pub-SV:adr = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc."} @String{pub-U-COLUMBIA = "Columbia University Press"} @String{pub-U-COLUMBIA:adr = "New York, NY, USA"} @String{pub-USENIX = "USENIX"} @String{pub-USENIX:adr = "San Francisco, CA, USA"} @String{pub-USGPO = "United States Government Printing Office"} @String{pub-USGPO:adr = "Washington, DC, USA"} @String{pub-WILEY = "John Wiley"} @String{pub-WILEY:adr = "New York, NY, USA"} %%% ==================================================================== %%% Series abbreviations: @String{ser-LNCS = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Bibliography entries, sorted by year, and then by citation label, %%% with ``bibsort --byyear'': @Article{Diffie:1976:NDC, author = "Whitfield Diffie and Martin E. Hellman", title = "New Directions in Cryptography", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-22", number = "6", pages = "644--654", month = nov, year = "1976", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1976.1055638", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=18", referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:SUR}, \cite[Ref. 8]{Goldreich:1997:FMCb}, \cite[Ref. 1]{Wiener:1998:PCP}, \cite[Ref. 3]{Handschuh:1998:SCC}, \cite[Ref. 2]{Haber:1995:HDD}.", remark = "This important paper, the first public description of public-key cryptography (see also \cite{Merkle:1978:SCI,Ellis:1975:PKC}), begins with the prescient statement ``We stand today on the brink of a revolution in cryptography.'' and ends with ``Thomas Jefferson, a cryptographic amateur, invented a system which was still in use in World War II [2, pp. 192--195], while the most noted cryptographic system of the twentieth century, the rotor machine, was invented simultaneously by four separate people, all amateurs [2, pp. 415, 420, 422--424]. We hope this will inspire others to work in this fascinating area in which participation has been discouraged in the recent past by a nearly total government monopoly.'' Their reference [2] is \cite{Kahn:1967:CSSa}.", } @InProceedings{Merkle:1980:PPK, author = "Ralph C. Merkle", editor = "????", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 14--16 April, 1980", title = "Protocols for public key cryptosystems", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "122--134", year = "1980", DOI = "https://doi.org/10.1109/SP.1980.10006", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Nov 30 17:33:26 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/6233691/; http://www.merkle.com/papers/Protocols.pdf", acknowledgement = ack-nhfb, } @Article{Chaum:1981:UEM, author = "David Chaum", title = "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", journal = j-CACM, volume = "24", number = "2", pages = "84--88", year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 22 06:30:41 MST 2001", bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Chaum81; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm1980.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", oldlabel = "Chaum81", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Chaum81", } @Article{Lamport:1982:BGP, author = "Leslie Lamport and Robert Shostak and Marshall Pease", title = "The {Byzantine Generals} Problem", journal = j-TOPLAS, volume = "4", number = "3", pages = "382--401", month = jul, year = "1982", CODEN = "ATPSDT", ISSN = "0164-0925 (print), 1558-4593 (electronic)", ISSN-L = "0164-0925", bibdate = "Sat Oct 17 12:24:31 1998", bibsource = "Compiler/bevan.bib; Compiler/Compiler.Lins.bib; Compiler/TOPLAS.bib; Database/dbase.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toplas.bib; Theory/ProbAlgs.bib", note = "They proved that Byzantine agreement (the subject of Section \ref{sec-byzantine}) cannot be reached unless fewer than one-third of the processes are faulty. This result assumes that authentication, i.e., the crypting of messages to make them unforgeable, is not used. With unforgeable messages, they show that the problem is solvable for any $ n \geq t > 0 $, where $n$ is the total number of processes and $t$ is the number of faulty processes.", abstract = "Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try and confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement. It is shown that, using only oral messages, this problem is solvable if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals. With unforgeable written messages, the problem is solvable for any number of generals and possible traitors. Applications of the solutions to reliable computer systems are then discussed.", acknowledgement = ack-pb, checked = "19940302", fjournal = "ACM Transactions on Programming Languages and Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J783", keywords = "fault tolerance; interactive consistency; network communications; network operating systems; reliability", source = "Dept. Library", } @InProceedings{Chaum:1983:BSU, author = "David Chaum", title = "Blind Signatures for Untraceable Payments", crossref = "Chaum:1983:ACP", pages = "199--203", year = "1983", DOI = "https://doi.org/10.1007/978-1-4757-0602-4_18", bibdate = "Fri Dec 1 10:07:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Chaum:1985:SIT, author = "David Chaum", title = "Security without identification: transaction systems to make big brother obsolete", journal = j-CACM, volume = "28", number = "10", pages = "1030--1044", month = oct, year = "1985", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; http://www.acm.org/pubs/toc/; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1022.html", abstract = "The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.", acknowledgement = ack-nhfb, annote = "Extensive article on use of random, transient personal id's. A digital pseudonym with each organization.", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "design; human factors; information hiding; security; steganography", referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SUR}.", review = "ACM CR 8608-0693", subject = "{\bf C.2.0}: Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, General, Security and protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf J.1}: Computer Applications, ADMINISTRATIVE DATA PROCESSING, Financial. {\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY, Public Policy Issues, Privacy. {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY, Social Issues, Abuse and crime involving computers.", } @InProceedings{Merkle:1988:DSB, author = "Ralph C. Merkle", editor = "Carl Pomerance", booktitle = "Advances in Cryptology --- CRYPTO '87", title = "A Digital Signature Based on a Conventional Encryption Function", volume = "293", publisher = pub-SV, address = pub-SV:adr, pages = "369--378", year = "1988", DOI = "https://doi.org/10.1007/3-540-48184-2_32", ISBN = "3-540-48184-2", ISBN-13 = "978-3-540-48184-3", bibdate = "Tue Jan 23 11:16:45 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = ser-LNCS, abstract = "A new digital signature based only on a conventional encryption function (such as DES) is described which is as secure as the underlying encryption function --- the security does not depend on the difficulty of factoring and the high computational costs of modular arithmetic are avoided. The signature system can sign an unlimited number of messages, and the signature size increases logarithmically as a function of the number of messages signed. Signature size in a `typical' system might range from a few hundred bytes to a few kilobytes, and generation of a signature might require a few hundred to a few thousand computations of the underlying conventional encryption function.", acknowledgement = ack-nhfb, } @TechReport{Lamport:1989:PTP, author = "Leslie Lamport", title = "The part-time parliament", type = "Report", number = "SRC-RR 49", institution = pub-DEC, address = pub-DEC:adr, year = "1989", bibdate = "Thu Nov 30 17:27:03 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://computerarchive.org/files/mirror/www.bitsavers.org/pdf/dec/tech_reports/SRC-RR-49.pdf", acknowledgement = ack-nhfb, } @Article{Haber:1991:HTS, author = "Stuart Haber and W. Scott Stornetta", title = "How to time-stamp a digital document", journal = j-J-CRYPTOLOGY, volume = "3", number = "2", pages = "99--111", month = "????", year = "1991", CODEN = "JOCREQ", ISSN = "0933-2790 (print), 1432-1378 (electronic)", ISSN-L = "0933-2790", bibdate = "Sat Nov 21 09:52:57 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcryptology.bib", acknowledgement = ack-nhfb, affiliation = "Bellcore", affiliationaddress = "Morristown, NJ, USA", classification = "723; 914", fjournal = "Journal of Cryptology", journal-URL = "http://link.springer.com/journal/145", journalabr = "J Cryptol", keywords = "Computer Networks--Security Systems; Cryptography; Data Processing--Security of Data; Time-Stamp", } @Article{Okamoto:1991:UEC, author = "Tatsuaki Okamoto and Kazuo Ohta", title = "Universal Electronic Cash", journal = j-LECT-NOTES-COMP-SCI, volume = "576", pages = "324--??", year = "1991", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:11 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0576.htm; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs1991.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0576/05760324.htm; http://link.springer-ny.com/link/service/series/0558/papers/0576/05760324.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @Misc{Vo:1991:FHF, author = "Phong Vo and Glenn Fowler and Landon Curt Noll", title = "{FowlerNollVo} hash function", howpublished = "Web document.", year = "1991", bibdate = "Tue Jan 23 07:32:23 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "https://en.wikipedia.org/wiki/Fowler%E2%80%93Noll%E2%80%93Vo_hash_function#cite_note-2", acknowledgement = ack-nhfb, } @InCollection{Bayer:1993:IER, author = "D. Bayer and Stuart Haber and W. Scott Stornetta", booktitle = "Sequences {II}: Methods in Communication, Security and Computer Science", title = "Improving the efficiency and reliability of digital time-stamping", publisher = "????", address = "????", bookpages = "", pages = "329--334", year = "1993", bibdate = "Mon Dec 04 11:44:19 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Dwork:1993:PPC, author = "Cynthia Dwork and Moni Naor", title = "Pricing via Processing or Combatting Junk Mail", journal = j-LECT-NOTES-COMP-SCI, volume = "740", pages = "139--147", year = "1993", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/3-540-48071-4_10", ISBN = "3-540-57340-2 (print), 3-540-48071-4 (online)", ISBN-13 = "978-3-540-57340-1 (print), 978-3-540-48071-6 (online)", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:48:51 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t0740.htm; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs1993.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/0740/07400139.htm; http://link.springer-ny.com/link/service/series/0558/papers/0740/07400139.pdf; https://link.springer.com/chapter/10.1007/3-540-48071-4_10", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", keywords = "CRYPTO; cryptology", remark = "In Brickell, E. F. (eds) Advances in Cryptology --- CRYPTO' 92. Lecture Notes in Computer Science, vol 740.", } @Article{Panurach:1996:MEC, author = "Patiwat Panurach", title = "Money in electronic commerce: digital cash, electronic fund transfer, and {Ecash}", journal = j-CACM, volume = "39", number = "6", pages = "45--50", month = jun, year = "1996", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 6 09:19:11 MST 1997", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm1990.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/228512.html; http://www.acm.org/pubs/toc/Abstracts/cacm/228512.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "design; economics; performance; security", subject = "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT, Systems, Transaction processing. {\bf C.3}: Computer Systems Organization, SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS. {\bf H.4.3}: Information Systems, INFORMATION SYSTEMS APPLICATIONS, Communications Applications. {\bf J.1}: Computer Applications, ADMINISTRATIVE DATA PROCESSING, Financial.", } @Unpublished{Rivest:1996:PMTa, author = "R. Rivest and A. Shamir", title = "{PayWord} and {MicroMint} --- Two simple micropayment schemes", pages = "????", month = apr, year = "1996", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "Published in \cite{Rivest:1996:PMTb}.", URL = "http://theory.lcs.mit.edu/~rivest", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 7]{Rivest:1996:PMT}.", remark = "Also published in \booktitle{Proceedings of the 1996 International Workshop on Security Protocols}.", } @Article{Rivest:1996:PMTb, author = "Ronald L. Rivest and Adi Shamir", title = "{PayWord} and {MicroMint}: Two Simple Micropayment Schemes", journal = j-CRYPTOBYTES, volume = "2", number = "1", pages = "7--11", month = "Spring", year = "1996", bibdate = "Thu Apr 29 18:06:35 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib", note = "See \cite{Rivest:1996:PMTa}.", URL = "ftp://ftp.rsa.com/pub/cryptobytes/crypto2n1.pdf", acknowledgement = ack-nhfb, fjournal = "CryptoBytes", } @TechReport{Rivest:1996:TLP, author = "Ron Rivest and Adi Shamir and David Wagner", title = "Time-lock puzzles and timed-release crypto", type = "Report", institution = "MIT Laboratory for Computer Science", address = "Cambridge, MA 02139, USA", day = "10", month = mar, year = "1996", bibdate = "Sun Jan 21 10:36:18 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/time-lock.pdf", acknowledgement = ack-nhfb, } @Misc{Back:1997:HCP, author = "Adam Back", title = "Hash cash postage implementation", howpublished = "Announcement on e-mail list {\tt cypherpunks@toad.com}.", day = "28", month = mar, year = "1997", bibdate = "Sun Jan 21 10:30:04 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/hashcash.pdf", acknowledgement = ack-nhfb, remark = "This is the first publication on Hashcash.", } @Article{DePrisco:1997:RPA, author = "R. {De Prisco} and B. Lampson and N. Lynch", title = "Revisiting the {Paxos} Algorithm", journal = j-LECT-NOTES-COMP-SCI, volume = "1320", pages = "111--??", year = "1997", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Apr 28 08:51:33 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs1997b.bib", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @InProceedings{Haber:1997:SNB, author = "S. Haber and W. S. Stornetta", editor = "{ACM}", booktitle = "{Proceedings of the 4th ACM Conference on Computer and Communications Security, April 1997}", title = "Secure names for bitstrings", publisher = pub-ACM, address = pub-ACM:adr, pages = "28--35", year = "1997", bibdate = "Thu Nov 30 17:23:14 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://dl.acm.org/citation.cfm?id=266430", acknowledgement = ack-nhfb, } @Article{Schoenmakers:1998:SAE, author = "Berry Schoenmakers", title = "Security Aspects of the {Ecash\TM} Payment System", journal = j-LECT-NOTES-COMP-SCI, volume = "1528", pages = "338--352", year = "1998", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Feb 5 11:53:19 MST 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t1528.htm; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; https://www.math.utah.edu/pub/tex/bib/lncs1998b.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/1528/15280338.htm; http://link.springer-ny.com/link/service/series/0558/papers/1528/15280338.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", keywords = "computer security; electrical; engineering; industrial cryptography", } @InProceedings{Massias:1999:DST, author = "H. Massias and X. S. Avila and J.-J. Quisquater", editor = "????", booktitle = "{20th Symposium on Information Theory in the Benelux, May 1999}", title = "Design of a secure timestamping service with minimal trust requirements", publisher = "????", address = "????", pages = "??--??", year = "1999", bibdate = "Mon Dec 04 11:46:08 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{DePrisco:2000:RPA, author = "Roberto {De Prisco} and Butler Lampson and Nancy Lynch", title = "Revisiting the {PAXOS} algorithm", journal = j-THEOR-COMP-SCI, volume = "243", number = "1--2", pages = "35--91", day = "28", month = jul, year = "2000", CODEN = "TCSCDI", DOI = "https://doi.org/10.1016/S0304-3975(00)00042-6", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Tue Oct 31 11:38:34 MST 2000", bibsource = "http://www.elsevier.com/locate/issn/03043975; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tcs2000.bib", URL = "http://www.elsevier.nl/gej-ng/10/41/16/177/21/22/abstract.html; http://www.elsevier.nl/gej-ng/10/41/16/177/21/22/article.pdf", acknowledgement = ack-nhfb, fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975/", } @Article{Gafni:2000:DP, author = "E. Gafni and L. Lamport", title = "Disk {Paxos}", journal = j-LECT-NOTES-COMP-SCI, volume = "1914", pages = "330--??", year = "2000", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Sep 10 19:08:51 MDT 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t1914.htm; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs2000.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/1914/19140330.htm; http://link.springer-ny.com/link/service/series/0558/papers/1914/19140330.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @Misc{Back:2001:HC, author = "Adam Back", title = "Hash cash", howpublished = "Web document.", year = "2001", bibdate = "Thu Nov 30 17:17:13 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://cypherspace.org/hashcash/; https://web.archive.org/web/20010614013848/", acknowledgement = ack-nhfb, } @Misc{Lamport:2001:PMS, author = "Leslie Lamport", title = "{Paxos} made simple", howpublished = "Web document.", year = "2001", bibdate = "Thu Nov 30 17:28:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://lamport.azurewebsites.net/pubs/paxos-simple.pdf", acknowledgement = ack-nhfb, } @Misc{Back:2002:HAP, author = "Adam Back", title = "{Hashcash} --- Amortizable Publicly Auditable Cost-Functions", howpublished = "Web document.", pages = "7", day = "1", month = aug, year = "2002", bibdate = "Tue Jan 23 07:21:47 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/amortizable.pdf", acknowledgement = ack-nhfb, } @Misc{Back:2002:HDS, author = "Adam Back", title = "{Hashcash} --- a denial of service counter measure", howpublished = "Web document.", year = "2002", bibdate = "Thu Nov 30 17:17:13 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://www.hashcash.org/papers/hashcash.pdf.", acknowledgement = ack-nhfb, } @Article{vanSomeren:2002:PPI, author = "Nicko van Someren", title = "The Practical Problems of Implementing {MicroMint}", journal = j-LECT-NOTES-COMP-SCI, volume = "2339", pages = "41--??", year = "2002", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Sep 10 19:09:40 MDT 2002", bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t2339.htm; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs2002b.bib", URL = "http://link.springer-ny.com/link/service/series/0558/bibs/2339/23390041.htm; http://link.springer-ny.com/link/service/series/0558/papers/2339/23390041.pdf", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @Misc{Back:2003:HPW, author = "Adam Back", title = "The {Hashcash} Proof-of-Work Function", howpublished = "Internet Network Working Group draft", month = jun, year = "2003", bibdate = "Sun Jan 21 10:32:28 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/draft-hashcash.txt", abstract = "Hashcash is a denial-of-service counter measure tool. Its main current use is to help hashcash users avoid losing email due to content based and blacklist based anti-spam systems.\par Email senders attach hashcash tokens with the X-Hashcash: header. Vendors and authors of anti-spam tools are encouraged to exempt mail sent with hashcash from their blacklists and content based filtering rules.\par This memo describes how to use hashcash to increase email reliability.", acknowledgement = ack-nhfb, } @Article{Ross:2003:DP, author = "Rocky Ross", title = "Deconstructing {Paxos}", journal = j-SIGACT, volume = "34", number = "1", pages = "47--67", month = mar, year = "2003", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/637437.637447", ISSN = "0163-5700 (print), 1943-5827 (electronic)", ISSN-L = "0163-5700", bibdate = "Wed Mar 21 18:30:25 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", abstract = "The celebrated Paxos algorithm of Lamport implements a fault-tolerant deterministic service by replicating it over a distributed message-passing system. This paper presents a deconstruction of the algorithm by factoring out its fundamental algorithmic principles within two abstractions: an eventual leader election and an eventual register abstractions. In short, the leader election abstraction encapsulates the liveness property of Paxos whereas the register abstraction encapsulates its safety property. Our deconstruction is faithful in that it preserves the resilience and efficiency of the original Paxos algorithm in terms of stable storage logs, message complexity, and communication steps. In a companion paper, we show how to use our abstractions to reconstruct powerful variants of Paxos.", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @InProceedings{Vishnumurthy:2003:KSE, author = "Vivek Vishnumurthy and Sangeeth Chandrakumar and Emin Gun Sirer", editor = "????", booktitle = "{Proceedings of the Workshop on Economics of Peer-to-Peer Systems, Berkeley, California, June 2003}", title = "{KARMA}: A secure economic framework for peer-to-peer resource sharing", publisher = pub-ACM, address = pub-ACM:adr, pages = "??--??", year = "2003", bibdate = "Sun Jan 21 08:54:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.cs.cornell.edu/people/egs/papers/karma.pdf", abstract = "Peer-to-peer systems are typically designed around the assumption that all peers will willingly contribute resources to a global pool. They thus suffer from freeloaders, that is, participants who consume many more resources than they contribute. In this paper, we propose a general economic framework for avoiding freeloaders in peer-to-peer systems. Our system works by keeping track of the resource consumption and resource contribution of each participant. The overall standing of each participant in the system is represented by a single scalar value, called their karma. A set of nodes, called a bank-set, keeps track of each node's karma, increasing it as resources are contributed, and decreasing it as they are consumed. Our framework is resistant to malicious attempts by the resource provider, consumer, and a fraction of the members of the bank set. We illustrate the application of this framework to a peer-to-peer filesharing application.", acknowledgement = ack-nhfb, pagecount = "6", } @InProceedings{Laurie:2004:PWP, author = "Ben Laurie and Richard Clayton", editor = "????", booktitle = "WEIS, 2004", title = "``{Proof}-of-work'' proves not to work", publisher = "????", address = "????", pages = "??--??", year = "2004", bibdate = "Sun Jan 21 07:59:34 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/proof-work.pdf; https://www.cl.cam.ac.uk/~rnc1/proofwork.pdf", abstract = "A frequently proposed method of reducing unsolicited bulk email (``spam'') is for senders to pay for each email they send. Proof-of-work schemes avoid charging real money by requiring senders to demonstrate that they have expended processing time in solving a cryptographic puzzle. We attempt to determine how difficult that puzzle should be so as to be effective in preventing spam. We analyse this both from an economic perspective,``how can we stop it being cost-effective to send spam'', and from a security perspective, ``spammers can access insecure end-user machines and will steal processing cycles to solve puzzles''. Both analyses lead to similar values of puzzle difficulty. Unfortunately, real-world data from a large ISP shows that these difficulty levels would mean that significant numbers of senders of legitimate email would be unable to continue their current levels of activity. We conclude that proof-of-work will not be a solution to the problem of spam.", acknowledgement = ack-nhfb, pagecount = "9", } @InProceedings{Rivest:2004:PM, author = "Ronald L. Rivest", title = "Peppercoin micropayments", crossref = "Juels:2004:FCI", pages = "2--8", year = "2004", DOI = "https://doi.org/10.1007/978-3-540-27809-2_2", bibdate = "Sun Jan 21 08:11:23 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://link.springer.com/content/pdf/10.1007/978-3-540-27809-2_2.pdf; https://people.csail.mit.edu/rivest/pubs/Riv04c.slides.slides.pdf", acknowledgement = ack-nhfb, } @InProceedings{Garcia:2005:LKD, author = "Flavio S. Garcia and Jaap-Henk Hoepman", title = "Off-line {Karma}: A Decentralized Currency for Peer-to-peer and Grid Applications", crossref = "Ioannidis:2005:ACN", pages = "364--377", year = "2005", DOI = "https://doi.org/10.1007/11496137_25", bibdate = "Sun Jan 21 10:43:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "www.hashcash.org/papers/offline-karma.pdf", acknowledgement = ack-nhfb, } @InProceedings{Coelho:2008:ACE, author = "Fabien Coelho", editor = "Serge Vaudenay", booktitle = "{Progress in Cryptology --- AfriCrypt 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11--14, 2008. Proceedings}", title = "An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on {Merkle} Trees", volume = "5023", publisher = pub-SV, address = pub-SV:adr, pages = "80--93", year = "2008", DOI = "https://doi.org/10.1007/978-3-540-68164-9_6", ISBN = "3-540-68164-7", ISBN-13 = "978-3-540-68164-9", bibdate = "Sun Jan 21 10:45:04 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://www.hashcash.org/papers/merkle-proof.pdf; https://link.springer.com/chapter/10.1007/978-3-540-68164-9_6", acknowledgement = ack-nhfb, } @InProceedings{Guo:2008:VMS, author = "Jingzhi Guo and Angelina Chow", editor = "{IEEE}", booktitle = "{Proceedings of the 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services, CEC 2008 and EEE 2008, 21--24 July, 2008, Washington, DC, USA}", title = "Virtual money systems: a phenomenal analysis", publisher = pub-IEEE, address = pub-IEEE:adr, bookpages = "xviii + 460", pages = "267--272", year = "2008", DOI = "https://doi.org/10.1109/CECandEEE.2008.91", ISBN = "0-7695-3340-X", ISBN-13 = "978-0-7695-3340-7", LCCN = "HF5548.32 .I343 2008", bibdate = "Tue Jan 23 11:07:11 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Misc{Nakamoto:2008:BPP, author = "S. Nakamoto", title = "{Bitcoin}: A peer-to-peer electronic cash system", howpublished = "Web document.", year = "2008", bibdate = "Thu Nov 30 17:08:21 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcoin.org/bitcoin.pdf", acknowledgement = ack-nhfb, remark-01 = "The document is undated, but the PDF file accessed on 04 December 2017 was created on Tue Mar 24 11:33:15 2009 by OpenOffice.org 2.4.", remark-02 = "The original authorship of the Bitcoin system is in dispute: Nakamoto may be a pseudonym, rather than a real known person. The \url{bitcoin.org} Internet IP hostname is anonymously registered in Panama. On 2 December 2017, a traceroute on that hostname ends at a site registered to DigitalOcean, LLC, in New York City, NY, USA. That company is a known business that often advertises virtual-machine services on the BSD-Now TV Webcasts.", } @Misc{Nakamoto:2008:RBP, author = "S. Nakamoto", title = "Re: {Bitcoin P2P} e-cash paper", howpublished = "Web document", year = "2008", bibdate = "Thu Nov 30 17:13:03 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://satoshi.nakamotoinstitute.org/emails/cryptography/11/", acknowledgement = ack-nhfb, remark = "The original authorship of the Bitcoin system is in dispute: Nakamoto may be a pseudonym, rather than a real known person. The \url{nakamotoinstitute.org} Internet IP hostname is anonymously registered in Panama. On 30 November 2017, a traceroute on that hostname ends at a site registered to DigitalOcean, LLC, in New York City, NY, USA. That company is a known business that often advertises virtual-machine services on the BSD-Now TV Webcasts.", } @Misc{Szabo:2008:BGU, author = "N. Szabo", title = "Bit gold. {Unenumerated}", howpublished = "Web document.", year = "2008", bibdate = "Thu Nov 30 17:44:02 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://unenumerated.blogspot.com/2005/12/bit-gold.html", acknowledgement = ack-nhfb, } @Article{Vieira:2008:CRF, author = "Gustavo M. D. Vieira and Luiz E. Buzato", title = "On the coordinator's rule for {Fast Paxos}", journal = j-INFO-PROC-LETT, volume = "107", number = "5", pages = "183--187", day = "16", month = aug, year = "2008", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Thu Mar 31 15:53:08 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/infoproc2000.bib", acknowledgement = ack-nhfb, fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190/", } @Misc{Bakker:2009:MHT, author = "Arno Bakker", title = "{Merkle} hash torrent extension", howpublished = "Web document.", month = aug, year = "2009", bibdate = "Tue Jan 23 10:54:44 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://www.bittorrent.org/beps/bep_0030.html", acknowledgement = ack-nhfb, } @Misc{BCD:2009:BCI, author = "{Bitcoin Core Developers}", title = "{Bitcoin} Core integration\slash staging tree", howpublished = "Web site", year = "2009", bibdate = "Sun Jan 21 11:03:36 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://github.com/bitcoin/bitcoin/", acknowledgement = ack-nhfb, } @Misc{Percival:2009:SKD, author = "Colin Percival", title = "Stronger key derivation via sequential memory-hard functions", howpublished = "Web document", month = may, year = "2009", bibdate = "Tue Jan 23 11:20:07 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "This is the origin of the scrypt proof-of-work function that is used in Litecoin (LTC).", URL = "https://www.tarsnap.com/scrypt/scrypt.pdf", acknowledgement = ack-nhfb, } @Article{Babaioff:2011:BRB, author = "Moshe Babaioff and Shahar Dobzinski and Sigal Oren and Aviv Zohar", title = "On {Bitcoin} and Red Balloons", journal = "ACM SIGecom Exchanges", volume = "10", number = "3", pages = "5--9", day = "11", month = dec, year = "2011", DOI = "https://doi.org/10.1145/2325702.2325704", ISSN = "1551-9031", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "2325704", ajournal = "SIGecom Exch.", keywords = "Bitcoin, information propagation, mechanism design", pagecount = "5", } @Article{Grinberg:2011:BIA, author = "Rueben Grinberg", title = "{Bitcoin}: An Innovative Alternative Digital Currency", journal = "Hastings Science \& Technology Law Journal", volume = "4", pages = "159--207", day = "23", month = apr, year = "2011", CODEN = "????", ISSN = "1947-4156 (print), 2331-835X (electronic)", ISSN-L = "1947-4156", bibdate = "Sun Jan 21 07:48:09 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://hstlj.org/wp-content/uploads/2011/12/8-grinberg-159-208.pdf; https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1817857", acknowledgement = ack-nhfb, journal-URL = "http://journals.uchastings.edu/journals/websites/science-technology/index.php", pagecount = "50", } @Misc{Laurie:2011:DCP, author = "Ben Laurie", title = "Decentralised currencies are probably impossible (but let's at least make them efficient)", howpublished = "Web blog.", day = "2", month = jul, year = "2011", bibdate = "Sun Jan 21 07:58:58 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.links.org/?p=1179", acknowledgement = ack-nhfb, } @Misc{Laurie:2011:EDC, author = "Ben Laurie", title = "An Efficient Distributed Currency", howpublished = "Web document.", pages = "5", day = "23", month = jul, year = "2011", bibdate = "Sun Jan 21 07:58:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.links.org/files/distributed-currency.pdf", acknowledgement = ack-nhfb, } @InProceedings{Martins:2011:IBP, author = "Sergio Martins and Yang Yang", booktitle = "Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research", title = "Introduction to {Bitcoins}: A Pseudo-anonymous Electronic Currency System", publisher = pub-IBM, address = pub-IBM:adr, pages = "349--350", year = "2011", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CASCON '11", URL = "http://dl.acm.org/citation.cfm?id=2093889.2093944", acknowledgement = ack-nhfb, acmid = "2093944", location = "Toronto, Ontario, Canada", pagecount = "2", } @Article{Rao:2011:UPB, author = "Jun Rao and Eugene J. Shekita and Sandeep Tata", title = "Using {Paxos} to build a scalable, consistent, and highly available datastore", journal = j-PROC-VLDB-ENDOWMENT, volume = "4", number = "4", pages = "243--254", month = jan, year = "2011", CODEN = "????", ISSN = "2150-8097", ISSN-L = "2150-8097", bibdate = "Fri May 13 14:55:17 MDT 2011", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @Article{Reid:2011:AABa, author = "Fergal Reid and Martin Harrigan", title = "An Analysis of Anonymity in the Bitcoin System", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2011", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1107.4524; https://dblp.org/db/journals/corr/corr1107.html#abs-1107-4524", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1107-4524", dblp-mdate = "2018-08-13", } @InProceedings{Reid:2011:AABb, author = "F. Reid and M. Harrigan", booktitle = "2011 {IEEE} Third International Conference on Privacy, Security, Risk and Trust and 2011 {IEEE} Third International Conference on Social Computing", title = "An Analysis of Anonymity in the {Bitcoin} System", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1318--1326", month = oct, year = "2011", DOI = "https://doi.org/10.1109/PASSAT/SocialCom.2011.79", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Anonymity; anonymity analysis; Context; Educational institutions; electronic money; History; IP networks; Joining processes; Network Analysis; network topological structure; nontrivial topological structure; Peer to peer computing; peer-to-peer computing; peer-to-peer electronic currency system; Public key; public key cryptography; public key generation; telecommunication network topology; user mapping; {Bitcoin}; {Bitcoin} public transaction history; {Bitcoin} system", } @Misc{Rosenfeld:2011:ABP, author = "Meni Rosenfeld", title = "Analysis of {Bitcoin} Pooled Mining Reward Systems", howpublished = "Web document.", day = "17", month = nov, year = "2011", bibdate = "Mon Dec 04 07:23:26 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcoil.co.il/pool_analysis.pdf", acknowledgement = ack-nhfb, lastaccessed = "20 March 2015", } @Misc{Voight:2011:PDR, author = "F. Voight", title = "p2pool: Decentralized, {DoS}-resistant, Hop-Proof pool", howpublished = "Web document.", month = jun, year = "2011", bibdate = "Sun Jan 21 08:55:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcointalk.org/index.php?topic=18313.0", acknowledgement = ack-nhfb, } @TechReport{Anonymous:2012:VCS, author = "Anonymous", title = "Virtual Currency Schemes", type = "Technical Report", institution = "European Central Bank", address = "Kaiserstrasse 29, 60311 Frankfurt am Main, Germany", pages = "55", month = oct, year = "2012", bibdate = "Sun Jan 21 07:17:07 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemes201210en.pdf", acknowledgement = ack-nhfb, tableofcontents = "Executive summary / 5 \\ 1 Introduction / 9 \\ 1.1 Preliminary remarks and motivation / 9 \\ 1.2 A short historical review of money / 9 \\ 1.3 Money in the virtual world / 10 \\ 2 Virtual currency schemes / 13 \\ 2.1 Definition and categorisation / 13 \\ 2.2 Virtual currency schemes and electronic money / 16 \\ 2.3 Payment arrangements in virtual currency schemes / 17 \\ 2.4 Reasons for implementing virtual currency schemes / 18 \\ 3 Case studies / 21 \\ 3.1 The Bitcoin scheme / 21 \\ 3.1.1 Basic features / 21 \\ 3.1.2 Technical description of a Bitcoin transaction / 23 \\ 3.1.3 Monetary aspects / 24 \\ 3.1.4 Security incidents and negative press / 25 \\ 3.2 The Second Life scheme / 28 \\ 3.2.1 Basic features / 28 \\ 3.2.2 Second Life economy / 28 \\ 3.2.3 Monetary aspects / 29 \\ 3.2.4 Issues with Second Life / 30 \\ 4 The relevance of virtual currency schemes for central banks / 33 \\ 4.1 Risks to price stability / 33 \\ 4.2 Risks to financial stability / 37 \\ 4.3 Risks to payment system stability / 40 \\ 4.4 Lack of regulation / 42 \\ 4.5 Reputational risk / 45 \\ 5 Conclusion / 47 \\ Annex: References and further information on virtual currency schemes / 49", } @Article{Aron:2012:BSF, author = "Jacob Aron", title = "{BitCoin} software finds new life", journal = j-NEW-SCIENTIST, volume = "213", number = "2847", pages = "20--20", day = "14", month = jan, year = "2012", CODEN = "NWSCAL", ISSN = "0262-4079 (print), 1364-8500 (electronic)", ISSN-L = "0262-4079", bibdate = "Sun Jan 21 10:27:25 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "New Scientist", journal-URL = "http://www.sciencedirect.com/science/journal/02624079", } @Article{Aszalos:2012:PAP, author = "L{\'a}szl{\'o} Aszal{\'o}s and Andrea Huszti", title = "Payment Approval for {PayWord}", journal = j-LECT-NOTES-COMP-SCI, volume = "7690", pages = "161--176", year = "2012", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-35416-8_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Dec 19 15:18:58 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-35416-8_12/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-35416-8", book-URL = "http://www.springerlink.com/content/978-3-642-35416-8", fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @InProceedings{Babaioff:2012:BRB, author = "Moshe Babaioff and Shahar Dobzinski and Sigal Oren and Aviv Zohar", booktitle = "Proceedings of the 13th {ACM} Conference on Electronic Commerce", title = "On {Bitcoin} and Red Balloons", publisher = pub-ACM, address = pub-ACM:adr, pages = "56--73", year = "2012", DOI = "https://doi.org/10.1145/2229012.2229022", ISBN = "1-4503-1415-5", ISBN-13 = "978-1-4503-1415-2", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "EC '12", acknowledgement = ack-nhfb, acmid = "2229022", keywords = "information propagation, mechanism design, sybil-proof mechanisms", location = "Valencia, Spain", pagecount = "18", } @InProceedings{Barber:2012:BBH, author = "Simon Barber and Xavier Boyen and Elaine Shi and Ersin Uzun", booktitle = "Financial Cryptography and Data Security", title = "Bitter to Better: How to Make {Bitcoin} a Better Currency", crossref = "Keromytis:2012:FCD", pages = "399--414", year = "2012", DOI = "https://doi.org/10.1007/978-3-642-32946-3_29", ISBN = "3-642-32946-2", ISBN-13 = "978-3-642-32946-3", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-32946-3_29", acknowledgement = ack-nhfb, } @Article{Cap:2012:BOS, author = "{Prof.Dr.Clemens} H. Cap", title = "{Bitcoin das Open-Source-Geld}. ({German}) [{Bitcoin} the open-source gold]", journal = "{HMD Praxis der Wirtschaftsinformatik}", volume = "49", number = "1", pages = "84--93", month = feb, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/BF03340666", ISSN = "1436-3011 (print), 2198-2775 (electronic)", ISSN-L = "1436-3011", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/BF03340666", acknowledgement = ack-nhfb, language = "German", } @Misc{Castro:2012:BPN, author = "Sebastian Castro", title = "{Bitcoin} {P2P} network sniffer v0.0.2", howpublished = "Web site.", year = "2012", bibdate = "Sun Jan 21 11:00:03 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://github.com/sebicas/bitcoin-sniffer", acknowledgement = ack-nhfb, } @InProceedings{Clark:2012:CCD, author = "Jeremy Clark and Aleksander Essex", booktitle = "Financial Cryptography and Data Security", title = "{CommitCoin}: Carbon Dating Commitments with {Bitcoin}", crossref = "Keromytis:2012:FCD", pages = "390--398", year = "2012", DOI = "https://doi.org/10.1007/978-3-642-32946-3_28", ISBN = "3-642-32946-2", ISBN-13 = "978-3-642-32946-3", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-32946-3_28", acknowledgement = ack-nhfb, } @Misc{Hearn:2012:BIP, author = "Mike Hearn and Matt Corallo", title = "{Bitcoin} improvement proposal 0037", howpublished = "Web document", month = oct, year = "2012", bibdate = "Tue Jan 23 11:11:54 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://en.bitcoin.it/wiki/BIP_0037", acknowledgement = ack-nhfb, } @InProceedings{Karame:2012:DSF, author = "Ghassan O. Karame and Elli Androulaki and Srdjan {\v{C}}apkun", booktitle = "Proceedings of the 2012 {ACM} Conference on Computer and Communications Security", title = "Double-spending Fast Payments in {Bitcoin}", publisher = pub-ACM, address = pub-ACM:adr, pages = "906--917", year = "2012", DOI = "https://doi.org/10.1145/2382196.2382292", ISBN = "1-4503-1651-4", ISBN-13 = "978-1-4503-1651-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '12", acknowledgement = ack-nhfb, acmid = "2382292", keywords = "Bitcoin, countermeasures, double-spending, fast payments", location = "Raleigh, North Carolina, USA", pagecount = "12", } @Misc{King:2012:PPP, author = "Sunny King and Scott Nadal", title = "{PPCoin}: Peer-to-Peer Crypto-Currency with Proof-of-Stake", howpublished = "Web document.", pages = "6", month = aug, year = "2012", bibdate = "Sun Jan 21 07:53:13 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://decred.org/research/king2012.pdf", abstract = "A peer-to-peer crypto-currency design derived from Satoshi Nakamoto's Bitcoin. Proof-of-stake replaces proof-of-work to provide most of the network security. Under this hybrid design proof-of-work mainly provides initial minting and is largely non-essential in the long run. Security level of the network is not dependent on energy consumption in the long term thus providing an energy-efficient and more cost-competitive peer-to-peer crypto-currency. Proof-of-stake is based on coin age and generated by each node via a hashing scheme bearing similarity to Bitcoin's but over limited search space. Block chain history and transaction settlement are further protected by a centrally broadcasted checkpoint mechanism", acknowledgement = ack-nhfb, remark = "The author names Sunny King and Scott Nadal are claimed to be pseudonyms in \cite{Sprankel:2013:TBD}.", } @Article{Malkhi:2012:PCF, author = "Dahlia Malkhi and Mahesh Balakrishnan and John D. Davis and Vijayan Prabhakaran and Ted Wobber", title = "From {Paxos} to {CORFU}: a flash-speed shared log", journal = j-OPER-SYS-REV, volume = "46", number = "1", pages = "47--51", month = jan, year = "2012", CODEN = "OSRED8", DOI = "https://doi.org/10.1145/2146382.2146391", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Fri Feb 17 19:19:11 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/opersysrev.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J597", } @Article{Peck:2012:CAC, author = "Morgan E. Peck", title = "The cryptoanarchists' answer to cash", journal = j-IEEE-SPECTRUM, volume = "49", number = "6", pages = "50--56", month = jun, year = "2012", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2012.6203968", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; Cryptography; Currency; Digital printing; dollar bill; electronic money; Exchange rates; Internet smut; Public key cryptography; stripper", } @Misc{Rosenfeld:2012:OCC, author = "Meni Rosenfeld", title = "Overview of Colored Coins", howpublished = "Web document.", pages = "13", year = "2012", bibdate = "Tue Jan 23 07:35:00 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "https://bitcoil.co.il/BitcoinX.pdf; https://web.archive.org/web/20170922052930/", abstract = "Bitcoin is the world's first decentralized digital currency, allowing the easy storage and transfer of cryptographic tokens. It uses a peer-to-peer network to carry information, hashing as a synchronization signal to prevent double-spending, and a powerful scripting system to determine ownership of the tokens. There is a growing technology and business infrastructure supporting it.\par By the original design bitcoins are fungible, acting as a neutral medium of exchange. However, by carefully tracking the origin of a given bitcoin, it is possible to color a set of coins to distinguish it from the rest. These coins can then have special properties supported by either an issuing agent or a Schelling point, and have value independent of the face value of the underlying bitcoins. Such colored bitcoins can be used for alternative currencies, commodity certificates, smart property, and other financial instruments such as stocks and bonds.\par Because colored bitcoins make use of the existing Bitcoin infrastructure and can be stored and transferred without the need for a third party, and even be exchanged for one another in an atomic transaction, they can open the way for the decentralized exchange of things that are not possible by traditional methods. In this paper we will discuss the implementation details of colored bitcoins and some of their use cases.", acknowledgement = ack-nhfb, lastaccessed = "20 March 2015", remark = "First URL no longer reachable, but second one accessed on 23 January 2018.", } @Article{Santos:2012:TPH, author = "Nuno Santos and Andr{\'e} Schiper", title = "Tuning {Paxos} for High-Throughput with Batching and Pipelining", journal = j-LECT-NOTES-COMP-SCI, volume = "7129", pages = "153--167", year = "2012", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-25959-3_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Wed Dec 19 15:24:42 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-25959-3_11/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-25959-3", book-URL = "http://www.springerlink.com/content/978-3-642-25959-3", fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @Article{Sorge:2012:BEE, author = "Christoph Sorge and Artus Krohn-Grimberghe", title = "{Bitcoin: Eine erste Einordnung}. ({German}) [{Bitcoin}: A first classification]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "36", number = "7", pages = "479--484", month = jun, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-012-0164-9", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-012-0164-9", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @Book{Altshuler:2013:SPS, editor = "Yaniv Altshuler and others", title = "Security and privacy in social networks", publisher = pub-SV, address = pub-SV:adr, pages = "vi + 253", year = "2013", ISBN = "1-4614-4138-2", ISBN-13 = "978-1-4614-4138-0", LCCN = "HM742 .S43 2013", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", URL = "http://www.loc.gov/catdir/enhancements/fy1306/2012943943-d.html; http://www.loc.gov/catdir/enhancements/fy1306/2012943943-t.html", abstract = "This book: Presents innovative solutions to social network security challenges; Defines a new field of research in computer and communications security; Raises emerging security problems in online social network environments.", acknowledgement = ack-nhfb, subject = "Online social networks; Security measures; Data encryption (Computer science); Data protection; Computer crimes; Prevention", tableofcontents = "Introduction to security and privacy in social networks / Yuval Elovici and Yaniv Altshuler \\ Interdisciplinary impact analysis of privacy in social networks / Michael Netter, Sebastian Herbst, and G{\"u}nther Pernul \\ Recognizing your digital friends / Patrik Bichsel, Jan Camenisch, and Mario Verdicchio \\ Encryption for peer-to-peer social networks / Oleksandr Bodriagov and Sonja Buchegger \\ Crowdsourcing and ethics: the employment of crowdsourcing workers for tasks that violate privacy and ethics / Christopher G. Harris and Padmini Srinivasan \\ The effect of social status on decision-making and prices in financial networks / Yoel Krasny \\ Stealing reality: when criminals become data scientists (or vice versa) / Yaniv Altshuler \ldots{} [et al.] \\ Applications of k-anonymity and l-diversity in publishing online social networks / Na Li and Sajal K. Das \\ Link reconstruction attack: using link prediction algorithms to compromise social networks privacy / Michael Fire \ldots{} [et al.] \\ An analysis of anonymity in the Bitcoin system / Fergal Reid and Martin Harrigan \\ Privacy-preserving data integration using decoupled data / Hye-Chung Kum, Stanley Ahalt, and Darshana Pathak", } @InProceedings{Androulaki:2013:EUP, author = "Elli Androulaki and Ghassan O. Karame and Marc Roeschlin and Tobias Scherer and Srdjan {\v{C}}apkun", booktitle = "Financial Cryptography and Data Security", title = "Evaluating User Privacy in {Bitcoin}", crossref = "Sadeghi:2013:FCD", pages = "34--51", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-39884-1_4", ISBN = "3-642-39884-7", ISBN-13 = "978-3-642-39884-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-39884-1_4", acknowledgement = ack-nhfb, } @Article{Andrychowicz:2013:HDM, author = "Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek", title = "How to deal with malleability of {BitCoin} transactions", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2013", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1312.3230; https://dblp.org/db/journals/corr/corr1312.html#AndrychowiczDMM13", acknowledgement = ack-nhfb, dblp-key = "journals/corr/AndrychowiczDMM13", dblp-mdate = "2018-08-13", } @Misc{Anonymous:2013:LC, author = "Anonymous", title = "List of cryptocurrencies", howpublished = "Wikipedia article.", year = "2013", bibdate = "Tue Jan 23 11:23:18 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://en.wikipedia.org/wiki/List_of_cryptocurrencies", acknowledgement = ack-nhfb, } @Article{Anonymous:2013:MBT, author = "Anonymous", title = "Massive {Bitcoin} thefts and seizures leave many users nervous and poorer", journal = "Computer Fraud \& Security", volume = "2013", number = "12", pages = "1--3", day = "30", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1016/S1361-3723(13)70106-4", ISSN = "1361-3723 (print), 1873-7056 (electronic)", ISSN-L = "1361-3723", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1361372313701064", acknowledgement = ack-nhfb, fjournal = "Computer Fraud \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/13613723", } @InProceedings{Bamert:2013:SPB, author = "Tobias Bamert and Christian Decker and Lennart Elsen and Roger Wattenhofer and Samuel Welten", editor = "{IEEE}", booktitle = "Proceedings of the {IEEE} International Conference on Peer-to-Peer Computing {(P2P) 2013}, Trento, Italy", title = "Have a snack, pay with {Bitcoins}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--5", year = "2013", DOI = "https://doi.org/10.1109/P2P.2013.6688717", ISBN = "1-4799-0521-6", ISBN-13 = "978-1-4799-0521-8", bibdate = "Sun Jan 21 10:55:59 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Becker:2013:CWA, author = "J{\"o}rg Becker and Dominic Breuker and Tobias Heide and Justus Holler and Hans Peter Rauer and Rainer B{\"o}hme", booktitle = "The Economics of Information Security and Privacy", title = "Can We Afford Integrity by Proof-of-Work? {Scenarios} Inspired by the {Bitcoin} Currency", publisher = pub-SV, address = pub-SV:adr, pages = "135--156", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-39498-0_7", ISBN = "3-642-39498-1", ISBN-13 = "978-3-642-39498-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-39498-0_7", acknowledgement = ack-nhfb, } @Article{Bergstra:2013:BBE, author = "Jan A. Bergstra and Karl de Leeuw", title = "Bitcoin and Beyond: Exclusively Informational Monies", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2013", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1304.4758; https://dblp.org/db/journals/corr/corr1304.html#abs-1304-4758", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1304-4758", dblp-mdate = "2018-08-13", } @Article{Berson:2013:VMS, author = "Susan A. Berson", title = "Virtual Money: Some basic rules for using `{Bitcoin}'", journal = "{ABA} Journal", volume = "99", number = "7", pages = "32--32", year = "2013", ISSN = "0747-0088 (print), 2162-7983 (electronic)", ISSN-L = "0747-0088", bibdate = "Fri Dec 1 13:57:34 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.jstor.org/stable/24595821", acknowledgement = ack-nhfb, fjournal = "American Bar Association Journal", } @InProceedings{Bohme:2013:IPA, author = "Rainer B{\"o}hme", editor = "????", booktitle = "{Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge, UK}", title = "{Internet} Protocol Adoption: Learning from {Bitcoin}", publisher = "????", address = "????", pages = "??--??", year = "2013", bibdate = "Mon Dec 04 06:43:11 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Bradbury:2013:ATB, author = "Danny Bradbury", title = "Anti-Theft {Bitcoin} Tracking Proposals Divide {Bitcoin} Communications", journal = "Coindesk", day = "15", month = nov, year = "2013", bibdate = "Sun Jan 21 07:09:48 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.coindesk.com/bitcoin-tracking-proposal-divides-bitcoin-community/", acknowledgement = ack-nhfb, } @TechReport{Buterin:2013:DMH, author = "Vitalik Buterin", title = "{Dagger}: A Memory-Hard to Compute, Memory-Easy to Verify {Scrypt} Alternative", type = "Report", institution = "????", address = "????", month = dec, year = "2013", bibdate = "Sun Jan 21 10:48:12 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://vitalik.ca/ethereum/dagger.html; http://www.hashcash.org/papers/dagger.html", abstract = "Over the past five years of experience with Bitcoin and alternative cryptocurrencies, one important property for proof of work functions that has been discovered is that of ``memory-hardness'' --- computing a valid proof of work should require not only a large number of computations, but also a large amount of memory. Currently, two major categories of memory-hard functions, scrypt and Primecoin mining, exist, but both are imperfect; neither require nearly as much memory as an ideal memory-hard function could require, and both suffer from time-memory tradeoff attacks, where the function can be computed with significantly less memory than intended at the cost of sacrificing some computational efficiency. This paper presents Dagger, a memory-hard proof of work based on moderately connected directed acyclic graphs (DAGs, hence the name), which, while far from optimal, has much stronger memory-hardness properties than anything else in use today.", acknowledgement = ack-nhfb, } @Misc{Buterin:2013:ENG, author = "Vitalik Buterin", title = "{Ethereum}: A Next-Generation Smart Contract and Decentralized Application Platform.", howpublished = "Web document.", year = "2013", bibdate = "Tue Jan 23 07:27:07 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ethereum.org/ethereum.html", acknowledgement = ack-nhfb, } @Article{Chirgwin:2013:ABB, author = "Richard Chirgwin", title = "{Android} Bug Batters {Bitcoin} Wallets", journal = j-REGISTER, volume = "??", number = "??", pages = "??--??", month = "????", year = "2013", bibdate = "Sat Nov 29 13:52:49 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "https://www.theregister.co.uk/2013/08/12/android_bug_batters_bitcoin_wallets/", acknowledgement = ack-nhfb, fjournal = "The Register", journal-URL = "https://www.theregister.co.uk/", } @InProceedings{Christin:2013:TSR, author = "Nicolas Christin", booktitle = "Proceedings of the {22Nd} International Conference on World Wide Web", title = "Traveling the {Silk Road}: A Measurement Analysis of a Large Anonymous Online Marketplace", publisher = pub-ACM, address = pub-ACM:adr, pages = "213--224", year = "2013", DOI = "https://doi.org/10.1145/2488388.2488408", ISBN = "1-4503-2035-X", ISBN-13 = "978-1-4503-2035-1", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WWW '13", acknowledgement = ack-nhfb, acmid = "2488408", keywords = "anonymity, electronic commerce, online crime", location = "Rio de Janeiro, Brazil", pagecount = "12", } @Misc{Coutu:2013:DMB, author = "Olivier Coutu", title = "Decentralized Mixers in {Bitcoin}", howpublished = "Web video.", year = "2013", bibdate = "Sun Jan 21 07:40:16 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.youtube.com/watch?v=6hc8qaR_Fok", acknowledgement = ack-nhfb, } @InProceedings{Danezis:2013:PCB, author = "George Danezis and Cedric Fournet and Markulf Kohlweiss and Bryan Parno", booktitle = "Proceedings of the First {ACM} Workshop on Language Support for Privacy-enhancing Technologies", title = "{Pinocchio Coin}: Building {Zerocoin} from a Succinct Pairing-based Proof System", publisher = pub-ACM, address = pub-ACM:adr, pages = "27--30", year = "2013", DOI = "https://doi.org/10.1145/2517872.2517878", ISBN = "1-4503-2489-4", ISBN-13 = "978-1-4503-2489-2", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PETShop '13", acknowledgement = ack-nhfb, acmid = "2517878", keywords = "anonymous electronic cash, Bitcoin, zero-knowledge proofs, zerocoin", location = "Berlin, Germany", pagecount = "4", } @InProceedings{Decker:2013:IPB, author = "C. Decker and R. Wattenhofer", booktitle = "{IEEE} {P2P 2013} Proceedings", title = "Information propagation in the {Bitcoin} network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--10", month = sep, year = "2013", DOI = "https://doi.org/10.1109/P2P.2013.6688704", ISSN = "2161-3559 (print), 2161-3567 (electronic)", ISSN-L = "2161-3559", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin network; blockchain forks; Buildings; Conferences; Delays; digital currency; financial data processing; foreign exchange trading; History; information propagation; multihop broadcast; Peer-to-peer computing; protocol; Protocols; replicated ledger; Synchronization; transaction verification", } @Misc{Ducklin:2013:ARN, author = "Paul Ducklin", title = "{Android} random number flaw implicated in {Bitcoin} thefts", howpublished = "Web news story.", day = "12", month = aug, year = "2013", bibdate = "Mon Sep 02 10:43:49 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", note = "From the story: ``It looks as though, at least on occasion, the Java-based PRNG on Android will repeat its pseudorandom sequences, thanks to a flaw in Android's so-called {\tt SecureRandom} Java class.''", URL = "http://nakedsecurity.sophos.com/2013/08/12/android-random-number-flaw-implicated-in-bitcoin-thefts/", acknowledgement = ack-nhfb, } @Article{Greenberg:2013:FSS, author = "Andy Greenberg", title = "{FBI} Says It's Seized \$28.5 Million in {Bitcoins} from {Ross Ulbricht}, Alleged Owner of {Silk Road}", journal = j-FORBES, volume = "??", number = "??", pages = "??--??", day = "25", month = oct, year = "2013", CODEN = "FORBA5", ISSN = "0015-6914", bibdate = "Mon Dec 04 07:01:20 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Forbes", } @Article{Hanley:2013:FPP, author = "Brian P. Hanley", title = "The False Premises and Promises of Bitcoin", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2013", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1312.2048; https://dblp.org/db/journals/corr/corr1312.html#Hanley13", acknowledgement = ack-nhfb, dblp-key = "journals/corr/Hanley13", dblp-mdate = "2018-08-13", } @Misc{Hearn:2013:MAN, author = "Mike Hearn", title = "Merge-Avoidance: a note on privacy-enhancing techniques in the {Bitcoin} protocol", howpublished = "Web blog", year = "2013", bibdate = "Sun Jan 21 07:49:04 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.coindesk.com/merge-avoidance-privacy-bitcoin/", acknowledgement = ack-nhfb, } @Article{Hobson:2013:WB, author = "Dominic Hobson", title = "What is {Bitcoin}?", journal = j-CROSSROADS, volume = "20", number = "1", pages = "40--44", month = sep, year = "2013", DOI = "https://doi.org/10.1145/2510124", ISSN = "1528-4972 (print), 1528-4980 (electronic)", ISSN-L = "1528-4972", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "2510124", fjournal = "ACM Crossroads", pagecount = "5", } @Article{Juels:2013:NAS, author = "Ari Juels and Alina Oprea", title = "New approaches to security and availability for cloud data", journal = j-CACM, volume = "56", number = "2", pages = "64--73", month = feb, year = "2013", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2408776.2408793", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Wed Jan 30 15:28:27 MST 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", abstract = "Extending the data trust perimeter from the enterprise to the public cloud requires more than encryption.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{K:2013:BCC, author = "D. K.", title = "{Bitcoin}'s Collapse: {China} Blues: The {Bitcoin} price plunges after {China} bans financial firms from dealing with {Bitcoin} exchanges", journal = j-ECONOMIST, volume = "??", number = "??", pages = "??--??", day = "18", month = dec, year = "2013", CODEN = "EONOEH", ISSN = "0013-0613 (print), 1476-8860 (electronic)", ISSN-L = "0013-0613", bibdate = "Sun Jan 21 07:13:27 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.economist.com/blogs/schumpeter/2013/12/bitcoins-collapse", acknowledgement = ack-nhfb, fjournal = "The Economist", } @Misc{King:2013:PCP, author = "Sunny King", title = "{Primecoin}: Cryptocurrency with prime number proof-of-work", howpublished = "Web document.", pages = "6", month = jul, year = "2013", bibdate = "Sun Jan 21 07:52:34 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://primecoin.io/bin/primecoin-paper.pdf", acknowledgement = ack-nhfb, remark = "The author name Sunny King is claimed to be a pseudonym in \cite{Sprankel:2013:TBD}.", } @InProceedings{Kroll:2013:EBM, author = "Joshua A. Kroll and Ian C. Davey and Edward W. Felten", booktitle = "{The Twelfth Workshop on the Economics of Information Security (WEIS 2013), Georgetown University, Washington, DC, June 11--12, 2013}", title = "The economics of {Bitcoin} mining, or {Bitcoin} in the presence of adversaries", publisher = "????", address = "????", pages = "??--??", year = "2013", bibdate = "Sun Jan 21 07:54:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://weis2013.econinfosec.org/papers/KrollDaveyFeltenWEIS2013.pdf", acknowledgement = ack-nhfb, pagecount = "21", } @Article{Krugman:2013:BE, author = "Paul Krugman", title = "{Bitcoin} is Evil", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "28", month = dec, year = "2013", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Sun Jan 21 07:55:24 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://krugman.blogs.nytimes.com/2013/12/28/bitcoin-is-evil/", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the article: ``To be successful, money must be both a medium of exchange and a reasonably stable store of value. And it remains completely unclear why BitCoin should be a stable store of value.''", } @TechReport{Larimer:2013:MMH, author = "Daniel Larimer", title = "Momentum --- A Memory-Hard Proof-of-Work via finding Birthday Collisions", type = "Report", institution = "Invictus Innovations, Inc.", address = "Blacksburg, VA, USA", pages = "6", month = oct, year = "2013", bibdate = "Sun Jan 21 10:46:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/momentum.pdf", acknowledgement = ack-nhfb, } @Misc{Lee:2013:MGB, author = "Timothy B. Lee", title = "Major glitch in {Bitcoin} network sparks sell-off: price temporarily falls 23\%: It hit a low of \$37 as developers scrambled to fix the problem.", howpublished = "Ars Technica blog.", day = "11", month = mar, year = "2013", bibdate = "Sun Jan 21 08:00:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arstechnica.com/information-technology/2013/03/major-glitch-in-bitcoin-network-sparks-sell-off-price-temporarily-falls-23/", acknowledgement = ack-nhfb, } @Misc{Lerner:2013:SMH, author = "Sergio Demian Lerner", title = "Strict Memory Hard Hashing Functions", howpublished = "Web blog.", day = "31", month = dec, year = "2013", bibdate = "Sun Jan 21 10:49:59 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://bitslog.wordpress.com/2013/12/31/strict-memory-hard-hash-functions/; http://www.hashcash.org/papers/memohash.pdf", abstract = "Strict memory hard functions are an extension of memory hard functions such that a slight reduction in the memory available for computation, compared to a predefined optimal memory size, makes the function evaluation exponentially slower or infeasible. The main application of strict memory hard functions is to prove a certain amount of memory is used during a certain time interval or in a certain computation. This in turn can be used to attest that areas of memory of devices do not contain hidden data. Other applications are password hashing and proof of work. Here I present a preliminary paper of SeqMemoHash, a strict sequential memory hard functions under the random oracle model.", acknowledgement = ack-nhfb, } @InProceedings{Luo:2013:PCB, author = "Z. Luo and W. Shen and L. Hu", booktitle = "2013 International Conference on Computer Sciences and Applications", title = "Parallel Computing Based {Bitcoin} Currency System Analysis Approach", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "483--486", month = dec, year = "2013", DOI = "https://doi.org/10.1109/CSA.2013.118", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Computers; electronic money; financial system; graph theory; Indexes; parallel analysis approach; Parallel Computing; parallel computing based {Bitcoin} currency system analysis approach; parallel processing; Parallel processing; peer-to-peer computing; Peer-to-peer computing; peer-to-peer electronic cash system; Privacy; Protocols; Receivers; transaction graph; Transaction Graph; transaction processing", } @Article{Matonis:2013:BCR, author = "Jon Matonis", title = "{Bitcoin} Casinos Release 2012 Earnings", journal = j-FORBES, volume = "??", number = "??", pages = "??--??", day = "??", month = jan, year = "2013", CODEN = "FORBA5", ISSN = "0015-6914", bibdate = "Mon Dec 04 07:09:56 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Forbes", } @Misc{McLeod:2013:BSV, author = "Andrew Saks McLeod", title = "{Bitcoins} Soar in Value in {Argentina} due to Capital Control Laws", howpublished = "Forex Magnates Web site.", day = "9", month = jul, year = "2013", bibdate = "Mon Dec 04 07:11:25 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.financemagnates.com/", acknowledgement = ack-nhfb, } @Article{McMillan:2013:HSW, author = "Robert McMillan", title = "\${1.2M} Hack Shows Why You Should Never Store {Bitcoins} on the {Internet}", journal = j-WIRED, volume = "??", number = "??", pages = "??--??", day = "7", month = nov, year = "2013", CODEN = "WREDEM", ISSN = "1059-1028 (print), 1078-3148 (electronic)", ISSN-L = "1059-1028", bibdate = "Mon Dec 04 07:12:42 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Wired", journal-URL = "http://www.wired.com", } @InProceedings{Meiklejohn:2013:FBC, author = "Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage", booktitle = "Proceedings of the 2013 Conference on Internet Measurement Conference", title = "A Fistful of {Bitcoins}: Characterizing Payments Among Men with No Names", publisher = pub-ACM, address = pub-ACM:adr, pages = "127--140", year = "2013", DOI = "https://doi.org/10.1145/2504730.2504747", ISBN = "1-4503-1953-X", ISBN-13 = "978-1-4503-1953-9", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IMC '13", acknowledgement = ack-nhfb, acmid = "2504747", keywords = "anonymity, Bitcoin, measurement", location = "Barcelona, Spain", pagecount = "14", } @InProceedings{Miers:2013:ZAD, author = "I. Miers and C. Garman and M. Green and A. D. Rubin", booktitle = "2013 {IEEE} Symposium on Security and Privacy", title = "{Zerocoin}: Anonymous Distributed E-Cash from {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "397--411", month = may, year = "2013", DOI = "https://doi.org/10.1109/SP.2013.34", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "anonymous currency transactions; anonymous distributed e-cash; Concrete; cryptographic extension; cryptography; Cryptography; data privacy; electronic money; financial interaction; Online banking; Peer-to-peer computing; Privacy; Protocols; pseudonym; standard cryptographic assumptions; user privacy; Zerocoin cryptographic construction; {Bitcoin} protocol", } @Book{Molleken:2013:BGB, author = "Dirk M{\"o}lleken", title = "{Bitcoin: Geld ohne Banken --- ist das m{\"o}glich?}. ({German}) [{Bitcoin}: money without banks --- is that possible?]", publisher = "Bachelor + Master Publishing", address = "Hamburg, Germany", pages = "71", year = "2013", ISBN = "3-86341-425-X, 3-86341-925-1 (e-book)", ISBN-13 = "978-3-86341-425-2, 978-3-86341-925-7 (e-book)", LCCN = "HF5548.32 .M65 2013", bibdate = "Mon Dec 4 08:46:59 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Diplomarbeit", URL = "http://public.eblib.com/choice/publicfullrecord.aspx?p=1593931; http://site.ebrary.com/id/10851161", abstract = "Was ist an Bitcoin so au{\ss}ergew{\"o}hnlich, dass Jason Calacanis es 'das gef{\"a}hrlichste Projekt aller Zeiten' nannte, der BVDW Verbraucher und H{\"a}ndler vor der Nutzung von Bitcoin warnte und sogar der Spiegel einen Artikel dar{\"u}ber ver{\"o}ffentlichte? Der Grund daf{\"u}r ist, dass Bitcoin einige Eigenschaften hat, die Staaten die Hoheit {\"u}ber Teile der Geldpolitik entzieht. Dieses Buch erkl{\"a}rt das System Bitcoin, ordnet es in das bestehende Geldsystem ein und versucht einen Blick in die Zukunft. Dazu wird die Geschichte des Geldes skizziert, um die historisch gewachsene Art des heutigen Geldes und warum es imm.", acknowledgement = ack-nhfb, language = "German", remark = "Originaltitel der Abschlussarbeit: \booktitle{Bitcoin, eine neue Art von Geld}.", subject = "Electronic commerce; Money; Electronic commerce; Money.", tableofcontents = "Bitcoin \\ Inhaltsverzeichnis \\ Abbildungsverzeichnis \\ Formelverzeichnis \\ Tabellenverzeichnis \\ Listings \\ Abk{\"u}rzungsverzeichnis \\ 1. Einleitung \\ 2. Historie des Geldes \\ 2.1. Die Suche nach dem passenden Tauschpartner \\ 2.2. Von der Muschel zur M{\"u}nze \\ 2.3. Das Zahlungsversprechen: Das Erste Papiergeld \\ 2.4. Buchgeld \\ 3. Theorie des Geldes \\ 3.1. Formen von Geld \\ 3.2. Funktionen von Geld \\ 3.3. Motive der Geldhaltung \\ 3.4. Geldmengendefinition \\ 3.5. Geldsch{\"o}pfung \\ 4. Bitcoin \\ 4.1. Der Initiator \\ 4.2. Eigenschaften von Bitcoin \\ 5. Die Technik hinter Bitcoin \\ 5.1. Das Peer-to-Peer-Netz \\ 5.2. Der Block5.3. Die Block-Chain5.4. Die Transaktion \\ 5.5. Die Wallet \\ 5.6. Das Mining \\ 6. Bitcoin in der Praxis \\ 6.1. Wie erh{\"a}lt man Bitcoin \\ 6.2. Bezug von Waren und Dienstleistungen mit Bitcoin \\ 6.3. Bitcoin als Spendenkonto \\ 7. Bitcoin Heute und Zuk{\"u}nftig \\ 7.1. Andere alternative W{\"a}hrungen \\ 7.2. Bitcoin und das heutige Geldsystem \\ 7.3. Verbesserungsm{\"o}glichkeiten von Bitcoin \\ 7.4. Hat Bitcoin eine Zukunft? \\ Anhang \\ Literatur", } @InProceedings{Moore:2013:BME, author = "Tyler Moore and Nicolas Christin", booktitle = "Financial Cryptography and Data Security", title = "Beware the Middleman: Empirical Analysis of {Bitcoin}-Exchange Risk", crossref = "Sadeghi:2013:FCD", pages = "25--33", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-39884-1_3", ISBN = "3-642-39884-7", ISBN-13 = "978-3-642-39884-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-39884-1_3", acknowledgement = ack-nhfb, } @InProceedings{Moser:2013:IML, author = "Malte M{\"o}ser and Rainer B{\"o}hme and Dominic Breuker", booktitle = "{2013 APWG eCrime Researchers Summit, 17--18 September 2013, San Francisco, CA, USA}", title = "An inquiry into money laundering tools in the {Bitcoin} ecosystem", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--14", month = sep, year = "2013", DOI = "https://doi.org/10.1109/eCRS.2013.6805780", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "AML strategy; anonymous transaction system; anti-money laundering; Bitcoin; Bitcoin ecosystem; Bitcoin Fog; BitLaundry; Blockchain.info send shared functionality; Communities; cryptographic protocols; Deanonymization; decentralized cryptographic currency; distributed processing; Ecosystems; Educational institutions; financial data processing; Information systems; Internet; Know-Your-Customer principle; Money Laundering; money laundering tools; Monitoring; Public key; reverse engineering; reverse-engineering methods; transaction graph", } @InProceedings{Mser:2013:IML, author = "M. M{\"o}ser and R. B{\"o}hme and D. Breuker", booktitle = "2013 {APWG} eCrime Researchers Summit", title = "An inquiry into money laundering tools in the {Bitcoin} ecosystem", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--14", month = sep, year = "2013", DOI = "https://doi.org/10.1109/eCRS.2013.6805780", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "AML strategy; anonymous transaction system; anti-money laundering; BitLaundry; Blockchain.info send shared functionality; Communities; cryptographic protocols; Deanonymization; decentralized cryptographic currency; distributed processing; Ecosystems; Educational institutions; financial data processing; Information systems; Internet; Know-Your-Customer principle; Money Laundering; money laundering tools; Monitoring; Public key; reverse engineering; reverse-engineering methods; transaction graph; {Bitcoin}; {Bitcoin} ecosystem; {Bitcoin} Fog", } @Article{Ober:2013:SAB, author = "Micha Ober and Stefan Katzenbeisser and Kay Hamacher", title = "Structure and Anonymity of the {Bitcoin} Transaction Graph", journal = "Future Internet", volume = "5", number = "2", pages = "237--250", month = "????", year = "2013", DOI = "https://doi.org/10.3390/fi5020237", ISSN = "1999-5903", ISSN-L = "1999-5903", bibdate = "Mon Dec 04 07:18:07 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.mdpi.com/1999-5903/5/2/237", acknowledgement = ack-nhfb, journal-URL = "http://www.mdpi.com/journal/futureinternet", } @Misc{PBCFAM:2013:PRA, author = "{People's Bank of China and Five Associated Ministries}", title = "Prevention of Risks Associated with {Bitcoin}", howpublished = "Web document.", year = "2013", bibdate = "Mon Dec 04 07:19:51 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://vip.btcchina.com/page/bocnotice2013", acknowledgement = ack-nhfb, lastaccessed = "20 March 2015", } @Article{Peck:2013:BAR, author = "M. E. Peck", title = "The {Bitcoin} Arms Race is on!", journal = j-IEEE-SPECTRUM, volume = "50", number = "6", pages = "11--13", month = jun, year = "2013", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2013.6521016", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Book{Platzer:2013:BKG, author = "J{\"o}rg Platzer", title = "{Bitcoin --- kurz and gut}. ({German}) [{Bitcoin} --- short and good]", publisher = pub-ORA, address = pub-ORA:adr, pages = "204", year = "2013", ISBN = "3-95561-650-9 (print), 3-95561-653-3", ISBN-13 = "978-3-95561-650-2 (print), 978-3-95561-653-3", LCCN = "HG1710 .P53 2014", bibdate = "Mon Dec 4 08:36:37 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ora.bib", acknowledgement = ack-nhfb, language = "German", subject = "Bitcoin; Electronic Commerce", } @Book{Province:2013:BRB, author = "Jay Province", title = "{Bitcoin} rising: beginner's guide to {Bitcoin}", publisher = "CreateSpace", address = "????, USA", pages = "iii + 33", year = "2013", ISBN = "1-4948-5944-0 (paperback)", ISBN-13 = "978-1-4948-5944-2 (paperback)", LCCN = "HF5548.32 .P76 2013", bibdate = "Mon Dec 4 08:49:05 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "You've heard that bitcoin is distributed freely over the web, but has somehow recently soared to over \$1000 per bitcoin. What? How is that possible? Virtual money? Cryptocurrency? Is it the currency of the future? You sense something important is going on, and you're having a hard time making any sense of it. Don't get caught waving from the platform while the train meant for you pulls away from the station. It's time to take action. Bitcoin Rising is the book for you, and it's the only bitcoin guide you'll ever need. Bitcoin Rising will get you up to speed with chapters chock-full of information. Bitcoin Rising is enjoyable reading, and explores the Bitcoin movement from both its serious and zany perspectives. At the same time it also answers your important questions: Who is behind the Bitcoin revolution? How does the Bitcoin system work? How do I get started with Bitcoin? Which Bitcoin exchanges are the safest? How do I set up a secure wallet safely? How can I protect my privacy and security? How do I get paid in bitcoin? What is the future of Bitcoin --- keep up with the times! You don't need to worry about technical terms like blockchain, wallet, private key or mining because you'll learn them step by step as you enjoy every page of reading. Bitcoin Rising is bitcoin prepared for you in bite-sized morsels. After years of market experience with stocks, bonds and Bitcoin, Province lays out a serious but entertaining step-by-step Bitcoin guide that will get you up-to-speed in the new economy.", acknowledgement = ack-nhfb, subject = "Electronic commerce; Electronic funds transfers; Electronic commerce; Electronic funds transfers.", } @Article{Raskin:2013:MBM, author = "Max Raskin", title = "Meet the {Bitcoin} Millionaires", journal = "Bloomberg Businessweek", volume = "??", number = "??", pages = "??--??", day = "10", month = apr, year = "2013", ISSN = "0007-7135 (print), 2162-657X (electronic)", ISSN-L = "0007-7135", bibdate = "Mon Dec 04 07:21:35 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Reid:2013:AAB, author = "Fergal Reid and Martin Harrigan", booktitle = "Security and Privacy in Social Networks", title = "An Analysis of Anonymity in the {Bitcoin} System", publisher = pub-SV, address = pub-SV:adr, pages = "197--223", year = "2013", DOI = "https://doi.org/10.1007/978-1-4614-4139-7_10", ISBN = "1-4614-4139-0", ISBN-13 = "978-1-4614-4139-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4614-4139-7_10", acknowledgement = ack-nhfb, } @Misc{Ro:2013:BTH, author = "Sam Ro", title = "A {Bloomberg TV} Host Gifted {Bitcoin} on Air and It Immediately Got Stolen", howpublished = "Business Insider article.", day = "23", month = dec, year = "2013", bibdate = "Sun Jan 21 08:14:26 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.businessinsider.com/bloomberg-matt-miller-bitcoin-gift-stolen-2013-12", acknowledgement = ack-nhfb, remark = "The Bitcoin gift certificate had an identifying QR code that was broadcast for 10 seconds, and an attacker was able to take it.", } @TechReport{Roio:2013:BET, author = "Denis Jaromil Roio", title = "{Bitcoin}, the end of the Taboo on Money", type = "Report", institution = "Dyne.org Digital Press", pages = "17", day = "6", month = apr, year = "2013", bibdate = "Tue Nov 26 08:00:27 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://files.dyne.org/readers/Bitcoin_end_of_taboo_on_money.pdf", abstract = "Bitcoin is a decentralized system of digital authentication that facilitates the circulation of value on the Internet without the presence of any intermediaries, a characteristic that has often gained it the definition of ``digital cash'' or ``crypto currency'', since it can be used as money for payments. This article consists in a technoetic inquiry into the origins of this technology and its evolution. This inquiry will take in consideration the biopolitical dynamics that govern the Bitcoin community as well specific characteristics of the technical realization, aiming to provide insights on the future of this technology as well a post-humanist interpretation of its emergence.", acknowledgement = ack-nhfb, keywords = "Bitcoin; Community; Crypto; Currency; Digital; Network; Technoetic", } @InProceedings{Ron:2013:QAF, author = "Dorit Ron and Adi Shamir", booktitle = "Financial Cryptography and Data Security", title = "Quantitative Analysis of the Full {Bitcoin} Transaction Graph", crossref = "Sadeghi:2013:FCD", pages = "6--24", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-39884-1_2", ISBN = "3-642-39884-7", ISBN-13 = "978-3-642-39884-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-39884-1_2", acknowledgement = ack-nhfb, } @Article{Santos:2013:OPB, author = "Nuno Santos and Andr{\'e} Schiper", title = "Optimizing {Paxos} with batching and pipelining", journal = j-THEOR-COMP-SCI, volume = "496", number = "??", pages = "170--183", day = "22", month = jul, year = "2013", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Mon Aug 26 16:17:27 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tcs2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0304397512009097", acknowledgement = ack-nhfb, fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975/", } @Misc{Schildbach:2013:BWR, author = "Andreas Schildbach", title = "{Bitcoin} wallet 2.4.1 released", howpublished = "Web document.", month = feb, year = "2013", bibdate = "Tue Jan 23 11:21:55 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcointalk.org/index.php?topic=146552.0", acknowledgement = ack-nhfb, } @InProceedings{Singh:2013:PCE, author = "P. Singh and B. R. Chandavarkar and S. Arora and N. Agrawal", booktitle = "2013 2nd International Conference on Advanced Computing, Networking and Security", title = "Performance Comparison of Executing Fast Transactions in {Bitcoin} Network Using Verifiable Code Execution", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "193--198", month = dec, year = "2013", DOI = "https://doi.org/10.1109/ADCONS.2013.42", ISSN = "2377-2506 (print), 2377-2514 (electronic)", ISSN-L = "2377-2514", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Approximation methods; Bit coin transactions; BTC network; Computational modeling; decentralized peer-to-peer payment system; Double spending; electronic cash transactions; electronic money; Fast transaction; fast transaction execution; mutual trust; Peer-to-peer computing; peer-to-peer computing; performance comparison; Pioneer model; proof-of-work; Protocols; Security; Simulation; Stock markets; Trust; trusted computing; two-party trust framework; verifiable code execution; {Bitcoin}; {Bitcoin} network", } @Misc{Sompolinsky:2013:ABT, author = "Yonatan Sompolinsky and Aviv Zohar", title = "Accelerating {Bitcoin}'s transaction processing: fast money grows on trees, not chains", howpublished = "Semantic Scholar Web blog.", year = "2013", bibdate = "Sun Jan 21 08:49:05 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.semanticscholar.org/paper/Accelerating-Bitcoin-s-Transaction-Processing-Fast-Sompolinsky-Zohar/401680ef12c04c247c50737b9114c169c660aab9", acknowledgement = ack-nhfb, remark = "May also be available in Cryptology ePrint Archive, Report 2013/881.", } @Article{Sorge:2013:BZZ, author = "Christoph Sorge and Artus Krohn-Grimberghe", title = "{Bitcoin --- das Zahlungsmittel der Zukunft?}. ({German}) [{Bitcoin} --- the currency of the future?]", journal = "{Wirtschaftsdienst}", volume = "93", number = "10", pages = "720--722", month = oct, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s10273-013-1589-y", ISSN = "0043-6275 (print), 1613-978X (electronic)", ISSN-L = "0043-6275", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10273-013-1589-y", acknowledgement = ack-nhfb, language = "German", } @Article{Southurst:2013:BPP, author = "Jon Southurst", title = "{Bitcoin} Payment Processor {BIPS} Attacked, Over \$1m Stolen", journal = "CoinDesk", volume = "??", number = "??", pages = "??--??", day = "25", month = nov, year = "2013", bibdate = "Mon Dec 04 07:29:11 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @TechReport{Sprankel:2013:TBD, author = "Simon Sprankel", title = "Technical Basis of Digital Currencies", institution = "Technische Universit{\"a}t Darmstadt", address = "Darmstadt, Germany", pages = "22", day = "2", month = aug, year = "2013", bibdate = "Tue Jan 23 07:38:38 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.coderblog.de/download/716/; https://www.coderblog.de/technical-basis-of-digital-currencies/", acknowledgement = ack-nhfb, } @InProceedings{Taylor:2013:BAB, author = "Michael Bedford Taylor", booktitle = "{Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems (CASES)}", title = "{Bitcoin} and the Age of Bespoke Silicon", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "16:1--16:10", year = "2013", DOI = "https://doi.org/10.1109/CASES.2013.6662520", ISBN = "1-4799-1400-2", ISBN-13 = "978-1-4799-1400-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CASES '13", URL = "http://cseweb.ucsd.edu/~mbtaylor/papers/bitcoin_taylor_cases_2013.pdf; http://dl.acm.org/citation.cfm?id=2555729.2555745", abstract = "Recently, the Bitcoin cryptocurrency has been an international sensation. This paper tells the story of Bitcoin hardware: how a group of early-adopters self-organized and financed the creation of an entire new industry, leading to the development of machines, including ASICs, that had orders of magnitude better performance than what Dell, Intel, NVidia, AMD or Xilinx could provide.\par We examine this story for clues as to how we can foster greater innovation in the semiconductor industry and enable this phenomenon to occur more broadly for more application areas, spawning a new age of hardware innovation tailored to emerging application domains an Age of Bespoke Silicon.", acknowledgement = ack-nhfb, acmid = "2555745", articleno = "16", keywords = "AMD; Application specific integrated circuits; ASIC; bespoke silicon; bitcoin cryptocurrency; bitcoin hardware; cryptography; Dark Silicon; Data mining; Dell; Exchange rates; Field programmable gate arrays; Graphics processing units; Hardware; hardware innovation; Intel; NVidia; semiconductor industry; Specialization; Technological innovation; Xilinx; {Bitcoin}", location = "Montreal, Quebec, Canada", pagecount = "10", } @InProceedings{Wen:2013:MPA, author = "Yuanfeng Wen and JongHyuk Lee and Ziyi Liu and Qingji Zheng and Weidong Shi and Shouhuai Xu and Taeweon Suh", editor = "Hubertus Franke", booktitle = "{Proceedings of the ACM International Conference on Computing Frontiers, CF' 13, Ischia, Italy. 14--16 May 2013}", title = "Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment", publisher = pub-ACM, address = pub-ACM:adr, pages = "25:1--25:10", year = "2013", DOI = "https://doi.org/10.1145/2482767.2482799", ISBN = "1-4503-2053-8", ISBN-13 = "978-1-4503-2053-5", LCCN = "QA75.5", bibdate = "Tue Jan 23 11:24:25 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "https://dl.acm.org/citation.cfm?id=2482799", abstract = "Virtualization is fundamental to cloud computing because it allows multiple operating systems to run simultaneously on a physical machine. However, it also brings a range of security/privacy problems. One particularly challenging and important problem is: how can we protect the Virtual Machines (VMs) from being attacked by Virtual Machine Monitors (VMMs) and/or by the cloud vendors when they are not trusted? In this paper, we propose an architectural solution to the above problem in multi-processor cloud environments. Our key idea is to exploit hardware mechanisms to enforce access control over the shared resources (e.g., memory spaces), while protecting VM memory integrity as well as inter-processor communications and data sharing. We evaluate the solution using full-system emulation and cycle-based architecture models. Experiments based on 20 benchmark applications show that the performance overhead is 1.5\%--10\% when access control is enforced, and 9\%--19\% when VM memory is encrypted.", acknowledgement = ack-nhfb, } @Misc{Willett:2013:MCS, author = "J. R. Willett", title = "{MasterCoin} Complete Specification", howpublished = "Unknown", year = "2013", bibdate = "Sun Jan 21 08:56:45 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "Version 1.1", URL = "https://fgallaire.github.io/ICO/white_papers/Omni/MasterCoin%20Specification%201.1.pdf; https://github.com/mastercoin-MSC/spec", acknowledgement = ack-nhfb, remark = "First URL no longer reachable on 22 January 2018", } @Article{Zetter:2013:HFT, author = "Kim Zetter", title = "How the Feds Took Down the {Silk Road} Drug Wonderland", journal = j-WIRED, volume = "??", number = "??", pages = "??--??", day = "18", month = nov, year = "2013", CODEN = "WREDEM", ISSN = "1059-1028 (print), 1078-3148 (electronic)", ISSN-L = "1059-1028", bibdate = "Mon Dec 04 07:33:40 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Wired", journal-URL = "http://www.wired.com", } @InProceedings{Alqassem:2014:TRA, author = "I. Alqassem and D. Svetinovic", booktitle = "2014 {IEEE} International Conference on Internet of Things {(iThings)}, and {IEEE} Green Computing and Communications {(GreenCom)} and {IEEE} Cyber, Physical and Social Computing {(CPSCom)}", title = "Towards Reference Architecture for Cryptocurrencies: {Bitcoin} Architectural Analysis", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "436--443", month = sep, year = "2014", DOI = "https://doi.org/10.1109/iThings.2014.78", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "APIs; Computer architecture; cryptocurrency reference architecture; cryptography; Cryptography; Databases; electronic money; financial system; IP networks; Online banking; payment system; Peer-to-peer computing; peer-to-peer currency; Protocols; up-to-date protocol specification; {Bitcoin} architectural analysis; {Bitcoin} libraries; {Bitcoin} protocol", } @Article{Andreessen:2014:WBM, author = "Marc Andreessen", title = "Why {Bitcoin} Matters", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "21", month = jan, year = "2014", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Mon Dec 04 06:35:04 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "The author is the co-founder of Netscape Communications, and the lead author of the Netscape browser.", } @InProceedings{Androulaki:2014:HTA, author = "Elli Androulaki and Ghassan O. Karame", booktitle = "Trust and Trustworthy Computing", title = "Hiding Transaction Amounts and Balances in {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "161--178", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-08593-7_11", ISBN = "3-319-08593-X", ISBN-13 = "978-3-319-08593-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-08593-7_11", acknowledgement = ack-nhfb, } @InProceedings{Andrychowicz:2014:FTP, author = "Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski {\L}ukasz Mazurek", title = "Fair Two-Party Computations via {Bitcoin} Deposits", crossref = "Christin:2014:FCD", pages = "105--121", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_8", ISBN = "3-662-44774-6 (paperback)", ISBN-13 = "978-3-662-44774-1 (paperback)", MRclass = "94-06 94A60 00B25", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_8", ZMnumber = "06469976; 1317.94001", acknowledgement = ack-nhfb, } @InProceedings{Andrychowicz:2014:MBC, author = "Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski {\L}ukasz Mazurek", booktitle = "Formal Modeling and Analysis of Timed Systems", title = "Modeling {Bitcoin} Contracts by Timed Automata", publisher = pub-SV, address = pub-SV:adr, pages = "7--22", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-10512-3_2", ISBN = "3-319-10512-4 (paperback)", ISBN-13 = "978-3-319-10512-3 (paperback)", MRclass = "68Qxx", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-10512-3_2", ZMnumber = "06471301", acknowledgement = ack-nhfb, } @InProceedings{Andrychowicz:2014:SMC, author = "M. Andrychowicz and S. Dziembowski and D. Malinowski and L. Mazurek", booktitle = "Proceedings of the 35th {IEEE} Symposium on Security and Privacy, 18--21 May 2014", title = "Secure Multiparty Computations on {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "443--458", month = may, year = "2014", DOI = "https://doi.org/10.1109/SP.2014.35", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; cryptographic protocols; Cryptography; decentralized digital currency; electronic money; emulation-based definition; Games; Internet; lottery; MPC; multiparty computations; Online banking; online gambling sites; Protocols; secure multiparty computation protocols; secure multiparty lotteries; Standards; timed commitments", } @Misc{Anonymous:2014:MYW, author = "Anonymous", title = "Mind your wallet: Why the underworld loves {Bitcoin}", howpublished = "Reuters news story.", year = "2014", bibdate = "Thu Nov 30 17:40:47 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.cnbc.com/2014/03/14/mind-your-wallet-why-the-underworld-loves-bitcoin.html.", acknowledgement = ack-nhfb, } @Book{Anonymous:2014:RBS, author = "Anonymous", title = "Regulation of {Bitcoin} in selected jurisdictions", publisher = "Law Library of Congress", address = "Washington, DC, USA", pages = "24", month = jan, year = "2014", LCCN = "K4431 .R44 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", URL = "http://hdl.loc.gov/LOC.LAW/LLGLRD.024", acknowledgement = ack-nhfb, remark = "Alderney (Channel Islands), Argentina, Australia, Belgium, Brazil, Canada, Chile, China, Croatia, Cyprus, Denmark, Estonia, European Union, Finland, France, Germany, Greece, Hong Kong, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan, Malaysia, Malta, Netherlands, New Zealand, Nicaragua, Poland, Portugal, Russia, Singapore, Slovenia, Spain, South Korea, Taiwan, Thailand, Turkey, United Kingdom.", subject = "Bitcoin; Money; Law and legislation; Electronic funds transfers; Electronic commerce", } @Article{Apeltsin:2014:CPH, author = "Leonard Apeltsin", title = "A {CryptoCubic} Protocol for Hacker-Proof Off-Chain Bitcoin Transactions", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1408.2824; https://dblp.org/db/journals/corr/corr1408.html#Apeltsin14", acknowledgement = ack-nhfb, dblp-key = "journals/corr/Apeltsin14", dblp-mdate = "2018-08-13", } @InCollection{Ateniese:2014:CB, author = "Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros", booktitle = "Applied cryptography and network security", title = "Certified {Bitcoins}", volume = "8479", publisher = pub-SV, address = pub-SV:adr, pages = "80--96", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-07536-5_6", MRclass = "94A60", MRnumber = "3218985", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, acknowledgement = ack-nhfb, } @InProceedings{Bamert:2014:BSB, author = "Tobias Bamert and Christian Decker and Roger Wattenhofer and Samuel Welten", booktitle = "Security and Trust Management", title = "{BlueWallet}: The Secure {Bitcoin} Wallet", publisher = pub-SV, address = pub-SV:adr, pages = "65--80", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-11851-2_5", ISBN = "3-319-11851-X", ISBN-13 = "978-3-319-11851-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-11851-2_5", acknowledgement = ack-nhfb, } @InProceedings{Barkatullah:2014:GCF, author = "J. Barkatullah and T. Hanke and R. Iyengar and R. Lewelling and J. O'Connor", booktitle = "2014 {IEEE} Hot Chips 26 Symposium {(HCS)}", title = "Goldstrike 1: {Cointerra}'s first generation crypto-currency processor for {Bitcoin} mining machines", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--16", month = aug, year = "2014", DOI = "https://doi.org/10.1109/HOTCHIPS.2014.7478824", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "bitcoin mining machines; CoinTerra Goldstrike 1; cryptography; Cryptography; electronic money; Finance; first generation crypto-currency processor; microprocessor chips; Online banking; performance evaluation; Phase locked loops; processing capabilities; Product design; Program processors; system design", } @Book{Barski:2014:BB, author = "Conrad Barski", title = "{Bitcoin} for the befuddled", publisher = pub-NO-STARCH, address = pub-NO-STARCH:adr, pages = "????", year = "2014", ISBN = "1-59327-573-0", ISBN-13 = "978-1-59327-573-0", LCCN = "????", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "This book is about Bitcoin, the game-changing digital currency, used by millions worldwide. It isn't just another way to buy stuff, it's an anonymous, revolutionary, cryptographically secure currency that functions without the oversight of a central authority or government. Learn what Bitcoin is, how it works, and how to acquire, store, and spend bitcoins safely and securely. Readers also will learn Bitcoin's underlying cryptographic principles, and how bitcoins are created; the history of Bitcoin and its potential impact on trade and commerce; about the blockchain, the public ledger of Bitcoin transactions; how to choose a bitcoin wallet that's safe and easy to use; how to accept bitcoins as payment in a physical store or on a website; and advanced topics, including Bitcoin mining and Bitcoin programming.", acknowledgement = ack-nhfb, shorttableofcontents = "What is bitcoin? \\ Bitcoin basics \\ Storing your bitcoins safely, securely, and conveniently \\ Buying bitcoins \\ Lost at sea: a cryptographic adventure \\ Why bitcoin is a big deal \\ The cryptography behind bitcoin \\ Bitcoin mining \\ The strange world of altcoins \\ Understanding the different types of bitcoin wallets \\ Bitcoin 2030 \\ Appendix A: Hello money! A simple JavaScript program \\ Appendix B: Bitcoin programming with BitcoinJ", tableofcontents = "1. What Is Bitcoin? \\ Why Bitcoin Now? \\ The Benefits of Using Bitcoin \\ The Complexity and Confusion of Bitcoin \\ What's in This Book? \\ 2. Bitcoin Basics \\ How Bitcoin Works in Simple Terms \\ Bitcoin Units \\ The Bitcoin Address \\ The Private Key \\ The Bitcoin Wallet \\ Creating Your First Bitcoin Wallet with Electrum \\ Acquiring Bitcoins in Your Wallet \\ Spending Bitcoins with Your Wallet \\ Bitcoin Addresses Generated by Your Bitcoin Wallet Program \\ The Blockchain \\ The Blockchain Lottery \\ Blockchain Forking \\ Transaction Confirmations, Double Spending, and Irreversibility \\ Mining Bitcoins \\ The Complexity of the Bitcoin System \\ 3. Storing Your Bitcoins Safely, Securely, and Conveniently \\ Storing Your Private Key(s) \\ Hot Storage vs. Cold Storage \\ Personal vs. Hosted Wallets \\ Safety, Security, and Convenience \\ Storing Small Amounts of Bitcoins \\ Online Hosted Wallet Services \\ Online Personal Wallet Services --Contents note continued: Personal Hot Wallet \\ Storing Large Amounts of Bitcoins \\ Paper Wallets \\ Encrypted Paper Wallets \\ Offline Transaction Signing \\ Fragmented Private Keys and Multi-Signature Addresses \\ Special Mention: The Bitcoin Hardware Wallet \\ Special Mention: The Bitcoin Brain Wallet \\ Choosing the Storage Method That's Right for You \\ 4. Buying Bitcoins \\ Why Not Just Mine Bitcoins? \\ Ways to Buy Bitcoins \\ Buying Bitcoins the Easy Way \\ Authentication Factors \\ The Hassle of Converting Dollars (or Other Currencies) into Bitcoins \\ Buying Bitcoins with Coinbase \\ Buying Bitcoins the Efficient Way \\ Buying Bitcoins from a Currency Exchange \\ Buying Bitcoins the Fun and Futuristic Way \\ Step 1 Finding Someone to Buy From \\ Step 2 Deciding on a Meeting Place \\ Step 3 Handing Over the Money and Getting Your Bitcoins \\ Satoshi Square \\ Still Don't See a Buying Option That Works for You? \\ 5. Lost At Sea: A Cryptographic Adventure \\ 6. Why Bitcoin Is A Big Deal \\ A Brief History of Digital Currencies \\ The Dawn of Bitcoin \\ Bitcoin's First Four Years \\ Bitcoin's Early Impact \\ The Future Potential of Bitcoin \\ What Are the Existential Risks to Bitcoin? \\ What Role Might Bitcoin Play in the Future? \\ The Dangers of Decentralized Digital Money \\ 7. The Cryptography Behind Bitcoin \\ A Brief Cryptography Overview \\ One-Way Functions \\ Cryptographic Hash Functions Verify Information \\ Public Key Cryptography \\ Digital Signatures \\ Using Digital Signatures \\ Why Bitcoin Needs Cryptography \\ Authorizing Transactions with Digital Signatures \\ Verifying the Validity of the Transaction History \\ Proof-of-Work in Bitcoin Mining \\ Extra Protection for Bitcoin Private Keys \\ Cryptographic Methods Used in Bitcoin \\ Cryptographic Hash Functions: SHA256 and RIPEMD160 \\ Crowley and the Unfortunate Jelly-Filled Donut Incident \\ Moving Around on a Line --Contents note continued: Elliptic Curve Digital Signature Algorithm (ECDSA) \\ Signing a Bitcoin Transaction Using ECDSA \\ The Security of Bitcoin's Cryptography \\ Pseudocode for Elliptic Point Summation and Point Multiplication \\ 8. Bitcoin Mining \\ Why Is Bitcoin Mining Needed? \\ A Parable of Two Generals \\ Applying the Parable to Bitcoin \\ Preventing Attacks with Mining \\ Distributing New Currency with Mining \\ How Does Bitcoin Mining Work? \\ How Miners Solve a Block \\ Anatomy of a Block \\ Pooled Mining \\ Bitcoin Mining for Profit \\ Theoretical Hash Rate Limits \\ Decentralization in Bitcoin Mining \\ 8.5. The Strange World Of Altcoins \\ 9. Understanding The Different Types Of Bitcoin Wallets \\ Wallet Software Design Fundamentals \\ Offline vs. Online Transaction Signing \\ Random Key Generation vs. Deterministic Key Generation (vs. Single Key Generation) \\ Full vs. Simplified Payment Verification \\ Other Common (and Not So Common) Bitcoin Wallet Features --Contents note continued: Future Wallets \\ Which Wallet Is Right for You? \\ Additional Wallet Considerations \\ 10. Bitcoin 2030 \\ What Will a Bitcoin Be Worth in 2030? \\ Bitcoin Mining in 2030 \\ A Day in the Life of a Bitcoiner in 2030 \\ The Bitcoin End Game \\ A. Hello Money! A Simple JavaScript Program \\ The Meaning of ``Easy'' \\ Three Ways to Write Bitcoin Software \\ General Security Notes on Bitcoin Programming \\ Some Upbeat Notes on Bitcoin Security \\ Writing Your First Bitcoin Program in JavaScript \\ Why Use JavaScript? \\ Bitcoin Core vs. Bitcoind \\ Preparing Your Machine for JavaScript Bitcoin Programming \\ Installing Node.js \\ Installing node-bitcoin \\ Starting Bitcoin Core \\ For Mac Hackers \\ For Linux Folks \\ Hello Money! \\ Part 1 Initializing the Connection with Bitcoin Core \\ Part 2 The Main Loop \\ The Bitcoin Core JSON-RPC API \\ Running the Hello Money! App \\ Limitations of Writing Bitcoin Programs That Use JSON-RPC --Contents note continued: B.BITCOIN PROGRAMMING WITH BITCOINJ \\ The Best Programming Language for Connecting to the Bitcoin Network \\ Installing Java, Maven, and the BitcoinJ Library \\ Step 1 Installing Java \\ Step 2 Installing Maven \\ Step 3 Installing Git \\ Step 4 Installing BitcoinJ \\ Creating a Starter Project for hello-money \\ Writing the Code for hello-money \\ Declarations at the Top of the Program \\ Initializing Our Java Objects \\ Connecting to the Bitcoin Network \\ Listening for New Money \\ Running and Testing the hello-money Java Program \\ Bye-Bye Money \\ Importing a Private Key \\ Sending the Money \\ Ensuring the Money Transmission \\ Running bye-bye-money \\ Gotchas When Using Wallets in BitcoinJ \\ Conclusion", } @Article{Becerra:2014:BP, author = "Armando Becerra", title = "Bitcoin y Privacidad 101", journal = "Res. Comput. Sci.", volume = "75", number = "??", pages = "87--90", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://rcs.cic.ipn.mx/2014_75/Bitcoin%20y%20Privacidad%20101.pdf; https://dblp.org/db/journals/rcs/rcs75.html#Becerra14", acknowledgement = ack-nhfb, dblp-key = "journals/rcs/Becerra14", dblp-mdate = "2020-03-12", } @InProceedings{Ben-Sasson:2014:ZDA, author = "Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza", editor = "{IEEE}", booktitle = "Proceedings of the 2014 {IEEE} Symposium on Security and Privacy, 18--21 May 2014", title = "{Zerocash}: Decentralized Anonymous Payments from {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "??--??", year = "2014", bibdate = "Mon Dec 04 06:39:56 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Bentov:2014:HUB, author = "Iddo Bentov and Ranjit Kumaresan", booktitle = "Advances in Cryptology {CRYPTO 2014}", title = "How to Use {Bitcoin} to Design Fair Protocols", publisher = pub-SV, address = pub-SV:adr, pages = "421--439", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44381-1_24", ISBN = "3-662-44380-5 (paperback), 3-662-44381-3 (e-book)", ISBN-13 = "978-3-662-44380-4 (paperback), 978-3-662-44381-1 (e-book)", MRclass = "94A60 68P25 68M12", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44381-1_24", ZMnumber = "06327743; 1335.94032", acknowledgement = ack-nhfb, } @Article{Bentov:2014:PAE, author = "Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld", title = "Proof of Activity: Extending {Bitcoin}'s Proof of Work via Proof of Stake [Extended Abstract]y", journal = j-SIGMETRICS, volume = "42", number = "3", pages = "34--37", month = dec, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2695533.2695545", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dblp.org/db/journals/sigmetrics/sigmetrics42.html#BentovLMR14; https://www.wikidata.org/entity/Q111687941", abstract = "We propose a new protocol for a cryptocurrency, that builds upon the Bitcoin protocol by combining its Proof of Work component with a Proof of Stake type of system. Our Proof of Activity protocol offers good security against possibly practical attacks on Bitcoin, and has a relatively low penalty in terms of network communication and storage space.", acknowledgement = ack-nhfb, dblp-key = "journals/sigmetrics/BentovLMR14", dblp-mdate = "2022-08-16", fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @Article{Bergstra:2014:BML, author = "Jan A. Bergstra and Peter Weijland", title = "Bitcoin: a Money-like Informational Commodity", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1402.4778; https://dblp.org/db/journals/corr/corr1402.html#BergstraW14", acknowledgement = ack-nhfb, dblp-key = "journals/corr/BergstraW14", dblp-mdate = "2018-08-13", } @InProceedings{Biryukov:2014:DCB, author = "Alex Biryukov and Dmitry Khovratovich and Ivan Pustogarov", booktitle = "{Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}", title = "Deanonymisation of Clients in {Bitcoin} {P2P} Network", publisher = pub-ACM, address = pub-ACM:adr, pages = "15--29", year = "2014", DOI = "https://doi.org/10.1145/2660267.2660379", ISBN = "1-4503-2957-8", ISBN-13 = "978-1-4503-2957-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '14", URL = "http://doi.acm.org/10.1145/2660267.2660379", acknowledgement = ack-nhfb, acmid = "2660379", keywords = "anonymity, Bitcoin, p2p, tor", location = "Scottsdale, Arizona, USA", pagecount = "15", } @InProceedings{Bissias:2014:SRM, author = "George Bissias and A. Pinar Ozisik and Brian N. Levine and Marc Liberatore", booktitle = "Proceedings of the 13th Workshop on Privacy in the Electronic Society", title = "{Sybil}-Resistant Mixing for {Bitcoin}", publisher = pub-ACM, address = pub-ACM:adr, pages = "149--158", year = "2014", DOI = "https://doi.org/10.1145/2665943.2665955", ISBN = "1-4503-3148-3", ISBN-13 = "978-1-4503-3148-7", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WPES '14", acknowledgement = ack-nhfb, acmid = "2665955", keywords = "measurement, security", location = "Scottsdale, Arizona, USA", pagecount = "10", } @InProceedings{Boehm:2014:BFL, author = "Franziska Boehm and Paulina Pesch", title = "{Bitcoin}: A First Legal Analysis", crossref = "Christin:2014:FCD", pages = "43--54", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_4", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_4", ZMnumber = "06469976", acknowledgement = ack-nhfb, } @InProceedings{Bohr:2014:WUB, author = "J. Bohr and M. Bashir", booktitle = "2014 Twelfth Annual International Conference on Privacy, Security and Trust", title = "Who Uses {Bitcoin}? {An} exploration of the {Bitcoin} community", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "94--101", month = jul, year = "2014", DOI = "https://doi.org/10.1109/PST.2014.6890928", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "age factor; Anonymity; Communities; cryptocurrencies; Cryptocurrency; Cryptography; cryptography; Data mining; Digital Money; financial data processing; geographic location factor; initial use time factor; mining status factor; Online banking; online discourse engagement factor; peer-to-peer computing; Peer-to-peer computing; peer-to-peer payment system; political orientation factor; Privacy; Standards; virtual currency; Virtual Currency; {Bitcoin}; {Bitcoin} community; {Bitcoin} wealth accumulation", } @InProceedings{Bonneau:2014:EPC, author = "Joseph Bonneau", editor = "????", booktitle = "Proceedings of the Financial Cryptography and Data Security, 18th International Conference (rump session), Bridgetown, Barbados, 4 March 2014", title = "Estimating the Power Consumption of {Bitcoin}", publisher = "????", address = "????", pages = "??--??", year = "2014", bibdate = "Mon Dec 04 06:45:33 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Bonneau:2014:MAB, author = "Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten", title = "{Mixcoin}: Anonymity for {Bitcoin} with Accountable Mixes", crossref = "Christin:2014:FCD", pages = "486--504", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-45472-5_31", ISBN = "3-662-45472-6", ISBN-13 = "978-3-662-45472-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-45472-5_31", acknowledgement = ack-nhfb, } @Misc{Bonneau:2014:WAM, author = "Joseph Bonneau", title = "Why {ASICs} may be good for {Bitcoin}", howpublished = "Web blog.", day = "12", month = dec, year = "2014", bibdate = "Sun Jan 21 07:31:40 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://freedomto-tinker.com/blog/jbonneau/why-asics-may-be-good-for-bitcoin/", abstract = "Bitcoin mining is now almost exclusively performed by Bitcoin-specific ASICs (application-specific integrated circuits). These chips are made by a few startup manufacturers and cannot be used for anything else besides mining Bitcoin or closely related cryptocurrencies. Because they are somewhere between a thousand and a million times more efficient at mining Bitcoin than a general-purpose computer that you can buy for the same price, they have quickly become the only game in town.", acknowledgement = ack-nhfb, } @Book{Combs:2014:BD, author = "Brett Combs and Tom Mitsoff", title = "{Bitcoin} decoded", publisher = "Propellerhead Marketing Group", address = "????, USA", pages = "iii + 86", year = "2014", ISBN = "0-615-95524-X", ISBN-13 = "978-0-615-95524-7", LCCN = "HG231 .C662 2014; HF5548.32 .C6537 2014", bibdate = "Mon Dec 4 08:50:51 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "Bitcoin: Is it a Boom or a Bubble? Hardly a day passes where Bitcoin isn't being discussed by the media. You need a high level of understanding and expertise to be able to swim safely in the Bitcoin pool. This book is the equivalent of the swimming lessons you took as a kid. Once finished, you'll be able to enter into the water safely, and be aware of both the potential dangers and thrills of the deep end. Bitcoin Decoded teaches you. What is Bitcoin How Bitcoin Works How You Get Bitcoin How to Make Money with Bitcoin How is Bitcoin created What is Bitcoin mining How can you daytrade Bitcoin and make a living doing it How can you become a certified Bitcoin expert and help others List of resources to find latest Bitcoin news and information online Don't worry about getting lost in technical terms. We are The Bitcoin Coaches and you will learn everything step by step in the only Bitcoin guide you will ever need. Bitcoin Decoded is packed with over 90 pages of up-to-date information about this new amazing way we pay for things and make money while doing it. Don't wait, order today at our special introductory price! Scroll up and click ``Buy Now'' to access your book in under a minute!.", acknowledgement = ack-nhfb, subject = "Electronic commerce; Electronic funds transfers; Banks and banking; Data processing; Currency question; Money; Electronic data interchange; Internet; Security measures; Data processing; Currency question; Electronic commerce; Electronic data interchange; Electronic funds transfers; Security measures; Money", tableofcontents = "Learn to swim safely in the deep end \\ What is Bitcoin? \\ History of Bitcoin \\ Cutting out the middleman \\ The Bitcoin rush \\ Three kinds of wallets \\ Bitcoin for business \\ Where to spend Bitcoins \\ How to earn or receive Bitcoins \\ How to make sure your Bitcoins are secure \\ The mainstreaming of Bitcoin \\ How to make Bitcoin and Altcoins work for you \\ Keys to Bitcoin's continued growth, and how you can get involved", } @InProceedings{Courtois:2014:CBT, author = "N. T. Courtois and P. Emirdag and D. A. Nagy", booktitle = "2014 11th International Conference on Security and Cryptography {(SECRYPT)}", title = "Could {Bitcoin} transactions be $ 100 \times $ faster?", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = aug, year = "2014", DOI = "", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; bitcoin transactions; Consumer electronics; cooperative robust decentralized transparent electronic systems; Crypto Currencies; crypto currency; cryptography; Cryptography; Decentralized Markets; digital notary service; distributed peer-to-peer financial system; distributed property register; Double-spending Attacks; electronic money; Electronic Payment; Equities Trading; Feeds; financial data processing; financial industry; financial institutions; High Frequency Trading; Internet; Internet of money; low latency transactions; Online banking; Peer-to-peer computing; peer-to-peer computing; Proof of Stake; real-time credit card transactions; Registers; Security Engineering; security policies; share ownership; Stock markets; Timestamps; trusted computing", } @Article{Courtois:2014:LCR, author = "Nicolas T. Courtois", title = "On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies", journal = "arXiv.org", volume = "??", number = "??", pages = "1--89", day = "2", month = may, year = "2014", bibdate = "Sun Jan 21 07:36:18 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1405.0534; http://dblp.org/rec/bib/journals/corr/Courtois14", abstract = "In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin crypto currency and its numerous clones. In particular we look at The Longest Chain Rule, the monetary supply policies and the exact mechanisms which implement them. We claim that these built-in properties are not as brilliant as they are sometimes claimed. A closer examination reveals that they are closer to being \ldots{} engineering mistakes which other crypto currencies have copied rather blindly. More precisely we show that the capacity of current crypto currencies to resist double spending attacks is poor and most current crypto currencies are highly vulnerable. Satoshi did not implement a timestamp for bitcoin transactions and the bitcoin software does not attempt to monitor double spending events. As a result major attacks involving hundreds of millions of dollars can occur and would not even be recorded. Hundreds of millions have been invested to pay for ASIC hashing infrastructure yet insufficient attention was paid to network neutrality and to insure that the protection layer it promises is effective and cannot be abused. In this paper we develop a theory of Programmed Self-Destruction of crypto currencies. We observe that most crypto currencies have mandated abrupt and sudden transitions. These affect their hash rate and therefore their protection against double spending attacks which we do not limit the to the notion of 51\% attacks which is highly misleading. In addition we show that smaller bitcoin competitors are substantially more vulnerable. In addition to small hash rate, many bitcoin competitors mandate incredibly important adjustments in miner reward. We exhibit examples of `alt-coins' which validate our theory and for which the process of programmed decline and rapid self-destruction has clearly already started.", acknowledgement = ack-nhfb, eprint = "1405.0534", } @InProceedings{Courtois:2014:OSB, author = "Nicolas T. Courtois and Marek Grajek and Rahul Naik", booktitle = "Cryptography and Security Systems", title = "Optimizing {SHA256} in {Bitcoin} Mining", publisher = pub-SV, address = pub-SV:adr, pages = "131--144", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44893-9_12", ISBN = "3-662-44893-9", ISBN-13 = "978-3-662-44893-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44893-9_12", acknowledgement = ack-nhfb, } @Article{Cusumano:2014:BE, author = "Michael A. Cusumano", title = "The {Bitcoin} Ecosystem", journal = j-CACM, volume = "57", number = "10", pages = "22--24", month = oct, year = "2014", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2661047", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "2661047", fjournal = "Communications of the ACM", journal-URL = "http://dl.acm.org/pub.cfm?id=J782", pagecount = "3", } @Article{Cusumano:2014:TSM, author = "Michael A. Cusumano", title = "Technology strategy and management: The {Bitcoin} ecosystem", journal = j-CACM, volume = "57", number = "10", pages = "22--24", month = oct, year = "2014", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2661047", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Oct 25 09:56:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "http://cacm.acm.org/magazines/2014/10/178782/fulltext", abstract = "Speculating on how the Bitcoin economy might evolve.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @InProceedings{deCarnavalet:2014:CIV, author = "Xavier de Carn{\'e} de Carnavalet and Mohammad Mannan", booktitle = "Proceedings of the 30th Annual Computer Security Applications Conference", title = "Challenges and Implications of Verifiable Builds for Security-critical Open-source Software", publisher = pub-ACM, address = pub-ACM:adr, pages = "16--25", year = "2014", DOI = "https://doi.org/10.1145/2664243.2664288", ISBN = "1-4503-3005-3", ISBN-13 = "978-1-4503-3005-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/gnu.bib", series = "ACSAC '14", acknowledgement = ack-nhfb, acmid = "2664288", keywords = "TrueCrypt, Bitcoin, Debian, deterministic build, reproducible build, Tor", location = "New Orleans, Louisiana, USA", pagecount = "10", } @Article{Decker:2014:BMS, author = "Christian Decker and Jochen Seidel and Roger Wattenhofer", title = "Bitcoin Meets Strong Consistency", journal = "CoRR", volume = "abs/1412.7935", number = "??", pages = "??--??", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1412.7935; https://dblp.org/db/journals/corr/corr1412.html#DeckerSW14", acknowledgement = ack-nhfb, dblp-key = "journals/corr/DeckerSW14", dblp-mdate = "2018-08-13", } @InProceedings{Decker:2014:BTM, author = "Christian Decker and Roger Wattenhofer", booktitle = "Computer Security --- {ESORICS 2014}", title = "{Bitcoin} Transaction Malleability and {MtGox}", publisher = pub-SV, address = pub-SV:adr, pages = "313--326", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-11212-1_18", ISBN = "3-319-11212-0", ISBN-13 = "978-3-319-11212-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-11212-1_18", acknowledgement = ack-nhfb, } @InProceedings{Dev:2014:BMA, author = "J. Anish Dev", booktitle = "2014 {IEEE 27th} Canadian Conference on Electrical and Computer Engineering {(CCECE)}", title = "{Bitcoin} mining acceleration and performance quantification", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = may, year = "2014", CODEN = "CCCEFV", DOI = "https://doi.org/10.1109/CCECE.2014.6900989", ISSN = "0840-7789", ISSN-L = "0840-7789", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "bitcoin mining acceleration; blockchain; BTC; cryptographic keys; cryptography; Cryptography; data mining; Data mining; digital crypto currency; financial data processing; Graphics processing units; Hardware; high valued currency units; Online banking; open source; peer to peer; peer-to-peer computing; Performance evaluation; performance quantification; public transaction log; Standards", } @InProceedings{Dmitrienko:2014:OPB, author = "Alexandra Dmitrienko and David Noack and Ahmad-Reza Sadeghi and Moti Yung", title = "On Offline Payments with {Bitcoin} (Poster Abstract)", crossref = "Christin:2014:FCD", pages = "159--160", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_11", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_11", acknowledgement = ack-nhfb, } @InProceedings{DonetDonet:2014:BPN, author = "Joan Antoni {Donet Donet} and Cristina P{\'e}rez-Sol{\`a} and Jordi Herrera-Joancomart{\'\i}", title = "The {Bitcoin} {P2P} Network", crossref = "Christin:2014:FCD", pages = "87--102", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_7", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_7", acknowledgement = ack-nhfb, } @Misc{dree12:2014:LMB, author = "dree12", title = "List of Major {Bitcoin} Heists, Thefts, Hacks, Scams, and Losses", howpublished = "Web blog", month = aug, year = "2014", bibdate = "Sun Jan 21 07:42:12 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcointalk.org/index.php?topic=576337; https://bitcointalk.org/index.php?topic=83794.0", acknowledgement = ack-nhfb, } @Misc{Dryja:2014:HBP, author = "Thaddeus Dryja", title = "{Hashimoto}: {I/O} bound proof of work", howpublished = "Web document.", year = "2014", bibdate = "Tue Jan 23 07:29:16 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://mirrorx.com/files/hashimoto.pdf", acknowledgement = ack-nhfb, } @Misc{Edelman:2014:CPM, author = "Benjamin Edelman", title = "Consumers Pay More When They Pay with {Bitcoin}", howpublished = "Web blog.", month = may, year = "2014", bibdate = "Sun Jan 21 07:15:28 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.pymnts.com/in-depth/2014/consumers-pay-more-when-they-pay-with-bitcoin/", acknowledgement = ack-nhfb, } @InProceedings{ElDefrawy:2014:FDC, author = "Karim {El Defrawy} and Joshua Lampkins", booktitle = "Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Founding Digital Currency on Secure Computation", publisher = pub-ACM, address = pub-ACM:adr, pages = "1--14", year = "2014", DOI = "https://doi.org/10.1145/2660267.2660293", ISBN = "1-4503-2957-8", ISBN-13 = "978-1-4503-2957-6", MRclass = "91B64 91B24 91B25 91G99 91B80", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '14", ZMnumber = "06489277; 1321.91089", acknowledgement = ack-nhfb, acmid = "2660293", keywords = "digital currency, proactive security, secret sharing, secure multiparty computation", location = "Scottsdale, Arizona, USA", pagecount = "14", } @TechReport{Evans:2014:EAB, author = "David S. Evans", title = "Economic Aspects of {Bitcoin} and Other Decentralized Public-Ledger Currency Platforms", type = "Working Paper", number = "685", institution = "Coase-Sandor Institute for Law and Economics", address = "????", month = apr, year = "2014", bibdate = "Mon Dec 04 06:51:18 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Misc{Eyal:2014:HDL, author = "Ittay Eyal and Emin G{\"u}n Sirer", title = "How to Disincentivize Large {Bitcoin} Mining Pools", howpublished = "Web blog", day = "18", month = jun, year = "2014", bibdate = "Sun Jan 21 08:47:54 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://hackingdistributed.com/2014/06/18/how-to-disincentivize-large-bitcoin-mining-pools/", abstract = "Recently, the GHash mining pool breached Bitcoin etiquette to become a 55\% miner for Bitcoin. This collapsed the key value proposition of Bitcoin, namely, its decentralization. In turn, there has been considerable criticism and backlash. Many people in the community, including us, have noted that etiquette or the good will of miners are not sufficient to keep monopolies at bay, and called for technical measures to disincentivize large mining pools.", acknowledgement = ack-nhfb, } @InProceedings{Eyal:2014:MEB, author = "Ittay Eyal and Emin G{\"u}n Sirer", title = "Majority is Not Enough: {Bitcoin} Mining is Vulnerable", crossref = "Christin:2014:FCD", volume = "8437", pages = "436--454", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-45472-5_28", ISBN = "3-662-45472-6", ISBN-13 = "978-3-662-45472-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-45472-5_28", acknowledgement = ack-nhfb, remark = "TO DO: Check volume and crossref: they mismatch!", } @Article{Feld:2014:ADB, author = "Sebastian Feld and Mirco Sch{\"o}nfeld and Martin Werner", title = "Analyzing the Deployment of {Bitcoin}'s {P2P} Network under an {AS}-level Perspective", journal = "Procedia Computer Science", volume = "32", number = "??", pages = "1121--1126", year = "2014", CODEN = "????", ISSN = "1877-0509", ISSN-L = "1877-0509", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S187705091400742X", acknowledgement = ack-nhfb, fjournal = "Procedia Computer Science", } @Book{Franco:2014:UBC, author = "Pedro Franco", title = "Understanding {Bitcoin}: Cryptography, Engineering and Economics", volume = "1", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xx + 268", year = "2014", ISBN = "1-119-01916-8 (hardcover), 1-119-01915-X (e-book), 1-119-01914-1 (e-book), 1-119-01913-3 (e-book)", ISBN-13 = "978-1-119-01916-9 (hardcover), 978-1-119-01915-2 (e-book), 978-1-119-01914-5 (e-book), 978-1-119-01913-8 (e-book)", LCCN = "TK5105.59", bibdate = "Mon Dec 4 08:55:39 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Wiley Finance Series", URL = "http://onlinelibrary.wiley.com/book/10.1002/9781119019138", abstract = "Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably one of the biggest developments in finance since the advent of fiat currency. With Understanding Bitcoin, expert author Pedro Franco provides finance professionals with a complete technical guide and resource to the cryptography, engineering and economic development of Bitcoin and other cryptocurrencies. This comprehensive, yet accessible work fully explores the supporting economic realities and technological advances of Bitcoin, and presents positive and negative arguments from various economic schools.", acknowledgement = ack-nhfb, subject = "Electronic commerce; Electronic funds transfers; Data encryption (Computer science); Currency question; Currency question; Data encryption (Computer science); Electronic commerce; Electronic funds transfers", tableofcontents = "Foundations \\ Technology (Introduction) \\ Economics \\ Business applications \\ Public key cryptography \\ Transactions \\ The blockchain \\ Wallets \\ Mining \\ The origins of bitcoin \\ Alt(ernative) coins \\ Contracts (the Internet of money or cryptocurrencies 2.0) \\ The privacy battle \\ Odds and ends", } @Book{Frisby:2014:BFM, author = "Dominic Frisby", title = "{Bitcoin}: the future of money", publisher = "Unbound", address = "London, UK", pages = "xxv + 269", year = "2014", ISBN = "1-78352-077-9 (paperback)", ISBN-13 = "978-1-78352-077-0 (paperback)", LCCN = "HG1710F742014", bibdate = "Mon Dec 4 08:43:09 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "In 2008, while the world was busy panicking about the global financial crisis, a computer programmer called Satoshi Nakamoto posted a message on an out-of-the-way mailing list. `I've been working on a new electronic cash system,' he said. `It might make sense to get some just in case it catches on.' Nobody seemed to care.", acknowledgement = ack-nhfb, subject = "Money; Electronic funds transfers; Electronic funds transfers; Money; Bitcoin; Elektronischer Zahlungsverkehr; W{\"a}hrung; W{\"a}hrungssystem", tableofcontents = "What is Bitcoin? \\ How is it made? \\ The anarchic computing subculture in which Bitcoin has its roots \\ The rise of Bitcoin and the disappearance of its maker \\ Nerds, squats and millionaires \\ How a computer nerd became the FBI's Most Wanted Drug Dealer \\ Who is Satoshi Nakamoto? \\ Why Bitcoin is the enemy of the state \\ How Bitcoin will change the world \\ A billion-dollar hedge fund manager and a super-smart mathematician forecast the future \\ Should you buy in? \\ The people's money", } @Article{Garcia:2014:DTB, author = "David Garc{\'\i}a and Claudio Juan Tessone and Pavlin Mavrodiev and Nicolas Perony", title = "The digital traces of bubbles: feedback cycles between socio-economic signals in the Bitcoin economy", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1408.1494; https://dblp.org/db/journals/corr/corr1408.html#GarciaTMP14", acknowledgement = ack-nhfb, dblp-key = "journals/corr/GarciaTMP14", dblp-mdate = "2018-08-20", } @Article{Gervais:2014:BDC, author = "Arthur Gervais and Ghassan O. Karame and Vedran {\v{C}}apkun and Srdjan {\v{C}}apkun", title = "Is {Bitcoin} a Decentralized Currency?", journal = j-IEEE-SEC-PRIV, volume = "12", number = "3", pages = "54--60", month = may # "\slash " # jun, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2014.49", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Sat Aug 9 08:53:26 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", keywords = "Bitcoin; Cryptography; decentralized currency; decentralized decision process; foreign exchange trading; Internet; low-cost virtual currency system; Online banking; Peer-to-peer computing; privacy; Proposals; security; {Bitcoin}", } @InProceedings{Gervais:2014:PPB, author = "Arthur Gervais and Srdjan {\v{C}}apkun and Ghassan O. Karame and Damian Gruber", booktitle = "Proceedings of the 30th Annual Computer Security Applications Conference", title = "On the Privacy Provisions of {Bloom} Filters in Lightweight {Bitcoin} Clients", publisher = pub-ACM, address = pub-ACM:adr, pages = "326--335", year = "2014", DOI = "https://doi.org/10.1145/2664243.2664267", ISBN = "1-4503-3005-3", ISBN-13 = "978-1-4503-3005-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ACSAC '14", acknowledgement = ack-nhfb, acmid = "2664267", location = "New Orleans, Louisiana, USA", pagecount = "10", } @InProceedings{Giaglis:2014:TAI, author = "George M. Giaglis and Kalliopi N. Kypriotaki", booktitle = "Business Information Systems Workshops", title = "Towards an Agenda for Information Systems Research on Digital Currencies and {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "3--13", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-11460-6_1", ISBN = "3-319-11460-3", ISBN-13 = "978-3-319-11460-6", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-11460-6_1", acknowledgement = ack-nhfb, } @InProceedings{Glaser:2014:BAC, author = "Florian Glaser and Kai Zimmermann and Martin Haferkorn and Moritz Christian Weber and Michael Siering", editor = "????", booktitle = "Proceedings of the 22nd European Conference on Information Systems, Tel Aviv, June 2014", title = "{Bitcoin} --- Asset or Currency? {Revealing} Users' Hidden Intentions", publisher = "????", address = "????", pages = "??--??", year = "2014", bibdate = "Mon Dec 04 06:59:09 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @TechReport{Goldfeder:2014:SBW, author = "Steven Goldfeder and Rosario Gennaro and Harry Kalodner and Joseph Bonneau and Edward W. Felten and Joshua A. Kroll and Arvind Narayanan", title = "Securing {Bitcoin} wallets via a new {DSA\slash ECDSA} threshold signature scheme", type = "Technical report", institution = "Princeton University", address = "Princeton, NJ, USA", pages = "23", year = "2014", bibdate = "Sun Jan 21 07:47:22 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.cs.princeton.edu/~stevenag/threshold_sigs.pdf", abstract = "The Bitcoin ecosystem has suffered frequent thefts and losses affecting both businesses and individuals. Due to the irreversibility, automation, and pseudonymity of transactions, Bitcoin currently lacks support for the sophisticated internal control systems deployed by modern businesses to deter fraud.\par To address this problem, we present the first threshold signature scheme compatible with Bitcoin's ECDSA signatures and show how distributed Bitcoin wallets can be built using this primitive. For businesses, we show how our distributed wallets can be used to systematically eliminate single points of failure at every stage of the flow of bitcoins through the system. For individuals, we design, implement, and evaluate a two-factor secure Bitcoin wallet", acknowledgement = ack-nhfb, } @InProceedings{Hernandez:2014:BUL, author = "Ivan Hernandez and Masooda Bashir and Gahyun Jeon and Jeremiah Bohr", booktitle = "{HCI} International 2014 --- Posters Extended Abstracts", title = "Are {Bitcoin} Users Less Sociable? {An} Analysis of Users Language and Social Connections on {Twitter}", publisher = pub-SV, address = pub-SV:adr, pages = "26--31", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-07854-0_5", ISBN = "3-319-07854-2", ISBN-13 = "978-3-319-07854-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-07854-0_5", acknowledgement = ack-nhfb, } @InProceedings{Hileman:2014:BBP, author = "Garrick Hileman", title = "From {Bitcoin} to the {Brixton} Pound: History and Prospects for Alternative Currencies (Poster Abstract)", crossref = "Christin:2014:FCD", pages = "163--165", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_13", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_13", acknowledgement = ack-nhfb, } @TechReport{Houy:2014:BMG, author = "Nicolas Houy", title = "The {Bitcoin} Mining Game", institution = "Groupe d'Analyse et de Th{\'e}orie Economique (GATE), Universit{\'e} de Lyon", address = "Lyon, France", year = "2014", bibdate = "Mon Dec 04 07:03:50 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ssrn.com/abstract=2407834", acknowledgement = ack-nhfb, } @TechReport{Houy:2014:EBT, author = "Nicolas Houy", title = "The Economics of {Bitcoin} Transaction Frees", type = "Working Paper", number = "1407", institution = "Groupe d'Analyse et de Th{\'e}orie Economique (GATE), Universit{\'e} de Lyon", address = "Lyon, France", year = "2014", bibdate = "Mon Dec 04 07:03:50 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ssrn.com/abstract=2400519", acknowledgement = ack-nhfb, } @InProceedings{Huang:2014:BMS, author = "Danny Yuxing Huang and Hitesh Dharmdasani and Sarah Meiklejohn and Vacha Dave and Chris Grier and Damon McCoy and Stefan Savage and Nicholas Weaver and Alex C. Snoeren and Kirill Levchenko", editor = "????", booktitle = "{Proceedings of the 2014 Network and Distributed System Security (NDSS'14) Symposium, 23--26 February 2014, San Diego, CA, USA}", title = "{Botcoin}: monetizing stolen cycles", publisher = "Internet Society", address = "Reston, VA, USA", pages = "??--??", year = "2014", ISBN = "1-891562-35-5", ISBN-13 = "978-1-891562-35-8", bibdate = "Sun Jan 21 07:50:42 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sysnet.ucsd.edu/~dhuang/static/ndss14-cr.pdf", acknowledgement = ack-nhfb, pagecount = "16", } @Article{Hurlburt:2014:BBC, author = "G. F. Hurlburt and I. Bojanova", title = "{Bitcoin}: Benefit or Curse?", journal = j-IT-PRO, volume = "16", number = "3", pages = "10--15", month = may, year = "2014", CODEN = "IPMAFM", DOI = "https://doi.org/10.1109/MITP.2014.28", ISSN = "1520-9202 (print), 1941-045x (electronic)", ISSN-L = "1520-9202", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", acknowledgement = ack-nhfb, fjournal = "{IT} Professional", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6294", keywords = "bitcoin crypto-currency model; bitcoin technology; cloud; cryptocurrency; Cryptography; Data mining; financial data processing; foreign exchange trading; information technology; Internet of Anything; Internet of Things; Internet/Web technologies; Market research; mobile; mobile commerce; Mobile communication; mobile devices; Online banking; virtual currency; Virtualization", } @Misc{IRS:2014:IVC, author = "{Internal Revenue Service}", title = "{IRS} Virtual Currency Guidance: Virtual Currency Is Treated as Property for {U.S. Federal} Tax Purposes; General Rules for Property Transactions Apply", howpublished = "News release about new U.S. Federal regulation.", day = "25", month = mar, year = "2014", bibdate = "Sun Jan 21 07:21:07 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.irs.gov/newsroom/irs-virtual-currency-guidance", acknowledgement = ack-nhfb, } @InProceedings{Jayasinghe:2014:OFE, author = "D. Jayasinghe and K. Markantonakis and K. Mayes", booktitle = "2014 {IEEE 11th} International Conference on e-Business Engineering", title = "Optimistic Fair-Exchange with Anonymity for {Bitcoin} Users", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "44--51", month = nov, year = "2014", DOI = "https://doi.org/10.1109/ICEBE.2014.20", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Anonymity; consumer anonymity; digital cash systems; Digital signatures; dispute resolution; e-commerce transactions; electronic money; Encryption; merchant anonymity; Online banking; optimistic fair-exchange; Optimistic Fair-Exchange; payment method; protocol; Protocols; Public key; public ledgers; Silicon carbide; transaction irreversibility; trusted third party; TTP; Zerocoin/Zerocash; {Bitcoin}", } @InProceedings{Johnson:2014:GTA, author = "Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore", title = "Game-Theoretic Analysis of {DDoS} Attacks Against {Bitcoin} Mining Pools", crossref = "Christin:2014:FCD", pages = "72--86", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_6", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_6", acknowledgement = ack-nhfb, } @Book{Kerscher:2014:BFR, author = "Daniel Kerscher", title = "{Bitcoin: Funktionsweise, Risiken und Chancen der digitalen W{\"a}hrung}. ({German}) [{Bitcoin}: Functioning, risks and opportunities of digital currency]", publisher = "Kemacon", address = "Dingolfing, Germany", edition = "Second", pages = "156", year = "2014", ISBN = "3-9816017-1-8", ISBN-13 = "978-3-9816017-1-8", LCCN = "????", bibdate = "Mon Dec 4 08:44:31 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", language = "German", } @InProceedings{Kitahara:2014:MDR, author = "Motoki Kitahara and Junpei Kawamoto and Kouichi Sakurai", booktitle = "Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication", title = "A Method of Digital Rights Management Based on {Bitcoin} Protocol", publisher = pub-ACM, address = pub-ACM:adr, pages = "84:1--84:6", year = "2014", DOI = "https://doi.org/10.1145/2557977.2558034", ISBN = "1-4503-2644-7", ISBN-13 = "978-1-4503-2644-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICUIMC '14", acknowledgement = ack-nhfb, acmid = "2558034", articleno = "84", keywords = "Bitcoin, P2P network, digital rights management", location = "Siem Reap, Cambodia", pagecount = "6", } @Article{Kondor:2014:IIB, author = "D{\'a}niel Kondor and Istv{\'a}n Csabai and J{\'a}nos Sz{\"u}le and M{\'a}rton P{\'o}sfai and G{\'a}bor Vattay", title = "Inferring the interplay between network structure and market effects in {Bitcoin}", journal = j-NEW-J-PHYS, volume = "16", number = "12", pages = "125003", month = dec, year = "2014", CODEN = "NJOPFM", DOI = "https://doi.org/10.1088/1367-2630/16/12/125003", ISSN = "1367-2630", bibdate = "Mon Dec 4 11:59:45 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "New Journal of Physics", journal-URL = "http://iopscience.iop.org/1367-2630", } @InProceedings{Koshy:2014:AAB, author = "Philip Koshy and Diana Koshy and Patrick McDaniel", title = "An Analysis of Anonymity in {Bitcoin} Using {P2P} Network Traffic", crossref = "Christin:2014:FCD", pages = "469--485", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-45472-5_30", ISBN = "3-662-45472-6", ISBN-13 = "978-3-662-45472-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-45472-5_30", acknowledgement = ack-nhfb, } @InProceedings{Kumaresan:2014:HUB, author = "Ranjit Kumaresan and Iddo Bentov", booktitle = "Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "How to Use {Bitcoin} to Incentivize Correct Computations", publisher = pub-ACM, address = pub-ACM:adr, pages = "30--41", year = "2014", DOI = "https://doi.org/10.1145/2660267.2660380", ISBN = "1-4503-2957-8", ISBN-13 = "978-1-4503-2957-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '14", acknowledgement = ack-nhfb, acmid = "2660380", keywords = "Bitcoin, bounties, fair exchange, secure computation, verifiable computation", location = "Scottsdale, Arizona, USA", pagecount = "12", } @TechReport{Kwon:2014:TCM, author = "Jae Kwon", title = "{TenderMint}: Consensus without Mining", institution = "Cornell University", address = "Ithaca, NY, USA", pages = "11", month = aug, year = "2014", bibdate = "Sun Jan 21 07:56:18 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://tendermint.com/static/docs/tendermint.pdf", abstract = "Cryptocurrencies such as Bitcoin enable users to submit payment transactions without going through a centralized trusted organization. Bitcoin relies on proof-of-work mining to secure consensus which is problematic; mining requires a massive expenditure of energy, confirmation of transactions is slow, and security is difficult to quantify. We propose a solution to the blockchain consensus problem that does not require mining by adapting an existing solution to the Byzantine Generals Problem.", acknowledgement = ack-nhfb, } @Misc{Lerner:2014:EFB, author = "Sergio Damian Lerner", title = "Even faster block-chains with the {DECOR} protocol", howpublished = "Web blog.", day = "2", month = may, year = "2014", bibdate = "Sun Jan 21 08:01:14 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitslog.wordpress.com/2014/05/02/decor/", acknowledgement = ack-nhfb, } @Misc{Lerner:2014:PAM, author = "Sergio Damian Lerner", title = "The {Private Automatic Miner Backbone Protocol (PAMBA)}", howpublished = "Web blog.", day = "19", month = apr, year = "2014", bibdate = "Sun Jan 21 08:02:01 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitslog.wordpress.com/2014/04/19/the-private-automatic-miner-backbone-protocol-pamba/", acknowledgement = ack-nhfb, } @PhdThesis{Li:2014:TDC, author = "Jianfu Li", title = "The {Tessera D\&R} computational environment: Designed experiments for {R-Hadoop} performance and {Bitcoin} analysis", school = "Purdue University", address = "West Lafayette, IN, USA", pages = "139", month = dec, year = "2014", ISBN = "1-321-67000-1", ISBN-13 = "978-1-321-67000-4", MRnumber = "3347085", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "Thesis (Ph.D.)--Purdue University", URL = "https://search.proquest.com/docview/1673895283", acknowledgement = ack-nhfb, } @PhdThesis{Li:2014:TDR, author = "Jianfu Li", title = "The {Tessera D\&R} computational environment: Designed experiments for {R-Hadoop} performance and {Bitcoin} analysis", type = "{Ph.D.}", school = "Purdue University", address = "West Lafayette, IN, USA", pages = "139", year = "2014", ISBN = "1-321-67000-1", ISBN-13 = "978-1-321-67000-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1673895283", abstract = "D\&R is a statistical framework for the analysis of large complex data that enables feasible and practical analysis of large complex data. The analyst selects a division method to divide the data into subsets, applies an analytic method of the analysis to each subset independently with no communication among subsets, selects a recombination method that is applied to the outputs across subsets to form a result of the analytic method for the entire data. The computational tasking of D\&R is nearly embarrassingly parallel, so D\&R can readily exploit distributed, parallel computational environments, such as our D\&R computational environment, Tessera. In the first part of this dissertation, I present a study of the performance of the Tessera D\&R computational environment through designed experiments. The base of the D\&R computational environment is RHIPE, the R and Hadoop Integrated Programming Environment. R is a widely used interactive language for data analysis. Hadoop is a distributed, parallel computational environment consisting of a distributed file system (HDFS) and distributed compute engine (MapReduce). RHIPE is a merger of R and Hadoop. The D\&R framework enables a fast embarrassingly parallel computation on a cluster for large complex data that can lead to a small computational elapsed times for the applications analytic methods to all of the data. However, the time depends on many factors. The system we study is very complex and the effects of factors are complex. There are interactions, but not well understood. So we run a full factorial experiment with replicates to enable an understanding. In the second part of this dissertation, I present an analysis of the Bitcoin transaction data utilizing the Tessera D\&R computational environment. Bitcoin is a de-centralized digital currency system. There is no central authority in the Bitcoin system to issue new money, or validate the transfer of money; both of these tasks are accomplished through the joint work of participants in the Bitcoin network. In the past two years, the Bitcoin system has become very popular, mostly due to its ease of use and embedded anonymity in the system. The ease of use of Bitcoin is straightforward. The anonymity of the Bitcoin system, on the other hand, is rather debatable and has drawn much attention in its user community as well as the research community. We admit that a certain level of anonymity exists in the Bitcoin system, but it might not be as invulnerable as one would hope. For one thing, the entire history of Bitcoin transactions is publicly available, which provides an opportunity for passive analysis of Bitcoin usage such as ours. I present here a study of the general statistical properties of the usage of Bitcoin transactions and the usage of Bitcoin addresses. We have also built profiles for a few groups of popular addresses among which the addresses share similar behavior. Furthermore, we provide a passive analysis of the anonymity of Bitcoin system by proposing a classification model to identify payment and change in majority of the Bitcoin transactions.", acknowledgement = ack-nhfb, advisor = "William S. Cleveland", keywords = "0463:Statistics; Bitcoin; Data analysis; Experiment; Hadoop; Pure sciences; Rhipe; Statistics; Tessera", ris-m1 = "3688399", } @InProceedings{Lim:2014:ACS, author = "Il-Kwon Lim and Young-Hyuk Kim and Jae-Gwang Lee and Jae-Pil Lee and Hyun Nam-Gung and Jae-Kwang Lee", booktitle = "Computational Science and Its Applications {ICCSA 2014}", title = "The Analysis and Countermeasures on Security Breach of {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "720--732", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-09147-1_52", ISBN = "3-319-09147-6", ISBN-13 = "978-3-319-09147-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-09147-1_52", acknowledgement = ack-nhfb, } @Misc{Litke:2014:CSM, author = "Pat Litke and Joe Stewart and Ben Small", title = "Cryptocurrency-stealing malware landscape", type = "Technical report", howpublished = "Web blog.", day = "26", month = feb, year = "2014", bibdate = "Sun Jan 21 08:02:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.secureworks.com/research/cryptocurrency-stealing-malware-landscape", acknowledgement = ack-nhfb, } @Book{Lyndell:2014:VCR, editor = "Kevin Lyndell", title = "Virtual currencies: regulatory and tax compliance issues", publisher = "Nova Publishers", address = "New York, NY, USA", pages = "ix + 128", year = "2014", ISBN = "1-63463-129-3 (hardcover)", ISBN-13 = "978-1-63463-129-7 (hardcover)", LCCN = "HG1710 .V56 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Government procedures and operations", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Tax administration and procedure; Electronic funds transfers; Tax administration and procedure", tableofcontents = "Virtual currencies: emerging regulatory, law enforcement, and consumer protection challenges \\ Virtual economies and currencies: additional IRS guidance could reduce tax compliance risks \\ Application of FinCEN's regulations to persons administering, exchanging, or using virtual currencies \\ Application of FinCEN's regulations to virtual currency mining operations \\ Application of FinCEN's regulations to virtual currency software development and certain investment activity \\ Application of money services business regulations to the rental of computer systems for mining virtual currency \\ Bitcoin: Questions, answers, and analysis of legal issues", } @Misc{Matonis:2014:BMA, author = "Joe Matonis", title = "The {Bitcoin} Mining Arms Race: {GHash.io} and the 51\% Issue", howpublished = "Web blog.", month = jul, year = "2014", bibdate = "Sun Jan 21 08:03:45 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.coindesk.com/bitcoin-mining-detente-ghash-io-51-issue/", acknowledgement = ack-nhfb, } @InProceedings{Michailaki:2014:MRT, author = "Anastasia Michailaki", booktitle = "E-Democracy, Security, Privacy and Trust in a Digital World", title = "Mixed Reality Through the {Internet of Things} and {Bitcoin}: How Laws Affect Them", publisher = pub-SV, address = pub-SV:adr, pages = "165--169", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-11710-2_15", ISBN = "3-319-11710-6", ISBN-13 = "978-3-319-11710-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-11710-2_15", acknowledgement = ack-nhfb, } @TechReport{Miller:2014:ABC, author = "Andrew Miller and Joseph J. {LaViola, Jr.}", title = "Anonymous {Byzantine} Consensus from Moderately-Hard Puzzles: A Model for {Bitcoin}", institution = "University of Central Florida", address = "Orlando, FL, USA", pages = "7", year = "2014", bibdate = "Sun Jan 21 08:05:59 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://socrates1024.s3.amazonaws.com/consensus.pdf", abstract = "We present a formal model of synchronous processes without distinct identifiers (i.e., {\em anonymous processes\/}) that communicate using one-way public broadcasts. Our main contribution is a proof that the Bitcoin protocol achieves consensus in this model, except for a {\em negligible probability}, when Byzantine faults make up less than half the network. The protocol is {\em scalable}, since the running time and message complexity are all independent of the size of the network, instead depending only on the relative computing power of the faulty processes. We also introduce a requirement that the protocol must tolerate an arbitrary number of passive clients that receive broadcasts but can not send. This leads to a tight $ 2 f + 1 $ resilience bound.", acknowledgement = ack-nhfb, } @TechReport{Miller:2014:NSP, author = "Andrew Miller and Ahmed Kosba and Jonathan Katz and Elaine Shi", title = "Nonoutsourceable Scratch-off Puzzles to Discourage {Bitcoin} Mining Coalitions", type = "Preprint", institution = "University of Maryland", address = "College Park, MD, USA", pages = "19", year = "2014", bibdate = "Sun Jan 21 08:06:54 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://soc1024.ece.illinois.edu/nonoutsourceable_full.pdf", abstract = "An implicit goal of Bitcoin's reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin's security claims rely on no single entity wielding a sufficiently large portion of the network's overall computational power. Unfortunately, rather than participating independently, most Bitcoin miners join coalitions called mining pools in which a central pool administrator largely directs the pool's activity, leading to a consolidation of power. Recently, the largest mining pool has accounted for more than half of network's total mining capacity. Relatedly, ``hosted mining'' service providers offer their clients the benefit of economies-of-scale, tempting them away from independent participation. We argue that the prevalence of mining coalitions is due to a limitation of the Bitcoin proof-of-work puzzle --- specifically, that it affords an effective mechanism for enforcing cooperation in a coalition. We present several definitions and constructions for ``nonoutsourceable'' puzzles that thwart such enforcement mechanisms, thereby deterring coalitions. We also provide an implementation and benchmark results for our schemes to show they are practical.", acknowledgement = ack-nhfb, } @InProceedings{Miller:2014:PRB, author = "A. Miller and A. Juels and E. Shi and B. Parno and J. Katz", booktitle = "2014 {IEEE} Symposium on Security and Privacy", title = "{Permacoin}: Repurposing {Bitcoin} Work for Data Preservation", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "475--490", month = may, year = "2014", DOI = "https://doi.org/10.1109/SP.2014.37", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "archival data; Bit coin mining; computational puzzles; computational resources; data mining; Data mining; data preservation; digital storage; distributed storage; e-cash system; electronic money; Investment; Online banking; Outsourcing; Peer-to-peer computing; Perm coin; Permacoin; proofs-of-retrievability; Public key; rational economic agents; scratch-off puzzle; {Bitcoin}", } @InProceedings{Moser:2014:TRS, author = "Malte M{\"o}ser and Rainer B{\"o}hme and Dominic Breuker", title = "Towards Risk Scoring of {Bitcoin} Transactions", crossref = "Christin:2014:FCD", pages = "16--32", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_2", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_2", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:BC, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "{Bitcoin} Challenges", publisher = pub-SV, address = pub-SV:adr, pages = "138--142", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_21", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_21", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:BD, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "{Bitcoin} Differences", publisher = pub-SV, address = pub-SV:adr, pages = "102--110", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_16", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_16", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:BDV, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "{Bitcoin} Decentralized Virtual Currency", publisher = pub-SV, address = pub-SV:adr, pages = "84--92", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_13", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_13", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:BM, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "{Bitcoin} Mining", publisher = pub-SV, address = pub-SV:adr, pages = "97--101", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_15", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_15", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:BMS, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "{Bitcoin} Merchant Services", publisher = pub-SV, address = pub-SV:adr, pages = "143--145", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_22", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_22", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:BO, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "{Bitcoin} Opportunity", publisher = pub-SV, address = pub-SV:adr, pages = "146--148", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_23", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_23", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:EB, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "Early {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "93--96", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_14", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_14", acknowledgement = ack-nhfb, } @InProceedings{Mullan:2014:GB, author = "P. Carl Mullan", booktitle = "The Digital Currency Challenge: Shaping Online Payment Systems through {US} Financial Regulations", title = "Global {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "131--137", year = "2014", DOI = "https://doi.org/10.1057/9781137382559_20", ISBN = "1-137-38255-4", ISBN-13 = "978-1-137-38255-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137382559_20", acknowledgement = ack-nhfb, } @Article{Noyen:2014:WML, author = "Kay Noyen and Dirk Volland and Dominic W{\"o}rner and Elgar Fleisch", title = "When Money Learns to Fly: Towards Sensing as a Service Applications Using Bitcoin", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1409.5841; https://dblp.org/db/journals/corr/corr1409.html#NoyenVWF14", acknowledgement = ack-nhfb, dblp-key = "journals/corr/NoyenVWF14", dblp-mdate = "2018-08-13", } @InProceedings{ODwyer:2014:BME, author = "K. J. O'Dwyer and D. Malone", booktitle = "25th {IET} Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies {(ISSC 2014/CIICT} 2014)", title = "{Bitcoin} mining and its energy footprint", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "280--285", month = jun, year = "2014", DOI = "https://doi.org/10.1049/cp.2014.0699", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; bitcoin concept; bitcoin mining; data mining; digital cryptocurrency; electricity consumption; electronic money; energy conservation; energy cost; energy footprint; Ireland; monetary transactions", } @Misc{Poelstra:2014:DCP, author = "Andrew Poelstra", title = "Distributed Consensus from Proof of Stake is Impossible", howpublished = "Web blog", day = "28", month = may, year = "2014", bibdate = "Sun Jan 21 08:10:26 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.smithandcrown.com/open-research/distributed-consensus-from-proof-of-stake-is-impossible/", abstract = "Proof-of-stake is frequently proposed as a mechanism for distributed consensus in non-Bitcoin cryptocurrencies (altcoins). However, this idea appears to be fundamentally flawed. We explore the history and motivation leading to Bitcoin's distributed consensus mechanism, which evades a impossibility result, and demonstrate that proof of stake does not work as a replacement", acknowledgement = ack-nhfb, } @Book{Province:2014:BRB, author = "Jay Province", title = "{Bitcoin} rising: beginner's guide to {Bitcoin}", publisher = "CreateSpace", address = "????, USA", pages = "33", year = "2014", ISBN = "1-4948-5944-0 (paperback)", ISBN-13 = "978-1-4948-5944-2 (paperback)", LCCN = "HF5548.32 .P76 2013", bibdate = "Mon Dec 4 08:49:05 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "You've heard that bitcoin is distributed freely over the web, but has somehow recently soared to over \$1000 per bitcoin. What? How is that possible? Virtual money? Cryptocurrency? Is it the currency of the future? You sense something important is going on, and you're having a hard time making any sense of it. Don't get caught waving from the platform while the train meant for you pulls away from the station. It's time to take action. Bitcoin Rising is the book for you, and it's the only bitcoin guide you'll ever need. Bitcoin Rising will get you up to speed with chapters chock-full of information. Bitcoin Rising is enjoyable reading, and explores the Bitcoin movement from both its serious and zany perspectives. At the same time it also answers your important questions: Who is behind the Bitcoin revolution? How does the Bitcoin system work? How do I get started with Bitcoin? Which Bitcoin exchanges are the safest? How do I set up a secure wallet safely? How can I protect my privacy and security? How do I get paid in bitcoin? What is the future of Bitcoin --- keep up with the times! You don't need to worry about technical terms like blockchain, wallet, private key or mining because you'll learn them step by step as you enjoy every page of reading. Bitcoin Rising is bitcoin prepared for you in bite-sized morsels. After years of market experience with stocks, bonds and Bitcoin, Province lays out a serious but entertaining step-by-step Bitcoin guide that will get you up-to-speed in the new economy.", acknowledgement = ack-nhfb, } @Article{Rao:2014:TBB, author = "Siddharth Prakash Rao", title = "Turning Bitcoins into the Best-coins", journal = "CoRR", volume = "abs/1412.7424", number = "??", pages = "??--??", month = "????", year = "2014", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1412.7424; https://dblp.org/db/journals/corr/corr1412.html#Rao14", acknowledgement = ack-nhfb, dblp-key = "journals/corr/Rao14", dblp-mdate = "2018-08-13", } @InProceedings{Ron:2014:HDD, author = "Dorit Ron and Adi Shamir", title = "How Did Dread Pirate {Roberts} Acquire and Protect his {Bitcoin} Wealth?", crossref = "Christin:2014:FCD", pages = "3--15", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_1", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_1", acknowledgement = ack-nhfb, } @InProceedings{Ruffing:2014:CPD, author = "Tim Ruffing and Pedro Moreno-Sanchez and Aniket Kate", booktitle = "Computer Security --- {ESORICS 2014}", title = "{CoinShuffle}: Practical Decentralized Coin Mixing for {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "345--364", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-11212-1_20", ISBN = "3-319-11212-0", ISBN-13 = "978-3-319-11212-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-11212-1_20", acknowledgement = ack-nhfb, } @Article{Sansonetti:2014:BOR, author = "Riccardo Sansonetti", title = "Le {Bitcoin}: opportunit{\'e}s et risques d'une monnaie virtuelle. ({French}) [{Bitcoin}: opportunities and risk of a virtual currency]", journal = "La vie {\'e}conomique (Berne)", volume = "87", number = "9", pages = "44--46", year = "2014", ISSN = "1011-386X", ISSN-L = "1011-386X", bibdate = "Mon Dec 04 08:51:54 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, language = "French", } @Article{Sansonetti:2014:BVW, author = "Riccardo Sansonetti", title = "{Bitcoin: virtuelle W{\"a}hrung mit Chancen und Risiken}. ({German}) [{Bitcoin}: virtual currency with opportunities and risks]", journal = "{Volkswirtschaft: wirtschaftliche, sozialstatistische und arbeitsrechtliche Mitteilungen}", volume = "87", number = "9", pages = "44--46", year = "2014", ISSN = "1011-386X", ISSN-L = "1011-386X", bibdate = "Mon Dec 04 08:39:40 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, language = "German", } @InProceedings{Sapuric:2014:BVI, author = "Svetlana Sapuric and Angelika Kokkinaki", booktitle = "Business Information Systems Workshops", title = "{Bitcoin} Is Volatile! {Isn}'t that Right?", publisher = pub-SV, address = pub-SV:adr, pages = "255--265", year = "2014", DOI = "https://doi.org/10.1007/978-3-319-11460-6_22", ISBN = "3-319-11460-3", ISBN-13 = "978-3-319-11460-6", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-11460-6_22", acknowledgement = ack-nhfb, } @InProceedings{Sasson:2014:ZDA, author = "E. B. Sasson and A. Chiesa and C. Garman and M. Green and I. Miers and E. Tromer and M. Virza", booktitle = "2014 {IEEE} Symposium on Security and Privacy", title = "{Zerocash}: Decentralized Anonymous Payments from {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "459--474", month = may, year = "2014", DOI = "https://doi.org/10.1109/SP.2014.36", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; DAP schemes; data privacy; decentralized anonymous payment schemes; decentralized anonymous payments; decentralized electronic cash; electronic money; full-fledged ledger-based digital currency; Logic gates; Online banking; payment transactions; Privacy; privacy guarantees; Protocols; public decentralized ledger; Public key; Zero cash; zero knowledge; zero-knowledge succinct noninteractive arguments of knowledge; Zerocash; zk-SNARKs", } @InProceedings{Saxena:2014:IAB, author = "Amitabh Saxena and Janardan Misra and Aritra Dhar", title = "Increasing Anonymity in {Bitcoin}", crossref = "Christin:2014:FCD", pages = "122--139", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_9", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_9", acknowledgement = ack-nhfb, } @Book{Schatt:2014:VBG, author = "Dan Schatt", title = "Virtual Banking: a Guide to Innovation and Partnering", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xxi + 216", year = "2014", ISBN = "1-118-74247-8 (hardcover), 1-118-74254-0 (ePDF), 1-118-74236-2 (ePub)", ISBN-13 = "978-1-118-74247-1 (hardcover), 978-1-118-74254-9 (ePDF), 978-1-118-74236-5 (ePub)", LCCN = "HG1601 .S3353 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", note = "Foreword by Renaud Laplanche.", series = "Wiley finance series", abstract = "Technology is permanently transforming the banking industry, and digital payments are the key. Electronic Payments, Mobile Commerce, and Virtual Banking: A Guide to Innovation, Partnering, and Regulation takes a hands-on approach to competing in the modern banking environment. Former PayPal Head of Financial Innovation Dan Schatt explores the reasons behind the massive consumer migration away from traditional banks, and provides clear, actionable guidance on beating new banking models at their own game. Digital payment is the hottest topic in banking today, and is set to define the future of the industry.Consumers are rapidly abandoning traditional banks in favor of institutions that are lower-cost and more consumer-centric. Between the pace of financial regulatory reform and the cloud computing revolution, the old banking model is on the fast track to extinction. Electronic Payments, Mobile Commerce, and Virtual Banking provides the information banks need to compete in this new environment, and details the integral implementation actions that will allow them to thrive. The book discusses real-world innovations from banks, non-banks, and up and comers, and the heavy competition from the new outsource bank model. Topics include: The changing POS landscape and the need for digital wallet partnerships Shifting gears to greenfield market opportunities versus non-profitable markets Digital channel best practices for superior customer experience When to outsource, and what capabilities to truly own Case studies including PayPal, Google, Square, Facebook, Twitter, and more illustrate acceleration of innovation through banking partnerships, as well as the mechanics behind banking's biggest, scariest threats. The trick to surviving the paradigm shift is to embody innovation while providing a superior customer proposition. Electronic Payments, Mobile Commerce, and Virtual Banking: A Guide to Innovation, Partnering, and Regulation provides the inside track on managing the shift and dominating the new marketplace.", acknowledgement = ack-nhfb, subject = "Banks and banking; Electronic funds transfers; BUSINESS and ECONOMICS / Banks and Banking.", tableofcontents = "Foreword / xiii \\ Preface / xv \\ Acknowledgments / xix \\ Introduction \\ Innovating through Scarcity / 1 \\ The Influence of Cloud on Innovation / 3 \\ The Influence of Smartphones / 4 \\ Big Data = Big Driver of Innovation / 4 \\ Taking a Cue from Retailing / 5 \\ The Enemy of My Enemy Is My Friend / 6 \\ Reconciling Innovation and Regulation / 6 \\ In Search of New Payment Revenue Streams / 8 \\ New Skill Sets for a New Era / 9 \\ A Road Map for This Book / 9 \\ Notes / 11 \\ 1 Consumer Empowerment Knocking at the Door / 13 \\ How Mobile Is Reshaping Consumer Expectations in Financial and Retail \\ How Mobile Is Changing Consumer Behavior / 15 \\ Mobile Is Blurring the Lines between Digital and Physical / 17 \\ Mobile Learnings from PayPal and Square / 19 \\ Mobile Commerce through Tokenization / 27 \\ The Mobile Camera --- It's Not Just for Pictures Anymore! / 29 \\ The Mobile Microphone --- Offers and Payments through Soundwaves! / 30 \\ NFC's Rebound and the Promise of Host Card Emulation / 31 \\ Apple's Passbook / 33 \\ The Apps Phenomenon / 35 \\ The Uber-ization of Mobile / 36 \\ ``Top of Wallet'' to ``Top of Mobile'' / 38 \\ The Case of Braintree and Simple / 39 \\ The QR Code / 40 \\ What Banks Can Learn from Starbucks / 41 \\ Leveling the Playing Field with LevelUp / 43 \\ From Mobile Banking to Tablet Banking / 45 \\ Mobile Models for the Emerging Markets / 47 \\ What's Next? More of the Same / 51 \\ Notes / 52 \\ 2 Social and Financial Services / 55 \\ Maintaining Relationships and Relevance through Social strategies \\ Digital, Data, and the Future of Banking / 58 \\ Social Media Experiences in Banking / 60 \\ Gamification / 62 \\ Personal Financial Relationship Mapping / 63 \\ Capitalizing on Social Banking / 65 \\ Moven: Delivering Banking through Social Context / 66 \\ Social Banking in Europe and Asia / 70 \\ Social Login, Sharing, and Top of Wallet / 71 \\ Peer-to-Peer Lending: Blending Social and Banking / 73 \\ Beyond the Hype: Partnering for the Future with Peer-to-Peer Lenders / 74 \\ Lending Club: A Win-Win for Banks and Their Customers / 75 \\ Takeaways for Banks / 79 \\ An Investor's Perspective on Social Banking and the Emergence of Bitcoin / 80 \\ Message To Banks: Be a Smaller Part of a Bigger Pie / 85 \\ Notes / 86 \\ 3 Connected Financial Commerce / 89 \\ Location-Based Services, Mobile Commerce, and Digital Wallets \\ The ``Local'' Digital Wallet / 91 \\ The New Retail Experience / 91 \\ Retail 2.0 and Its Effect on Payments / 93 \\ Entrepreneurs, Developers, and Financial Services / 95 \\ Context Banking: The Next Step / 96 \\ Low-Energy Bluetooth, Hardware, and the Future of Commerce / 97 \\ iBeacon and EasyPay: The Future of In-Store Payments? / 98 \\ PayPal's iBeacon: Proximity and Context / 100 \\ Google Glass for Finances / 101 \\ In Search of the Digital Wallet / 102 \\ Personal Financial Management / 103 \\ Coupons / 104 \\ Shopping Tools / 104 \\ Loyalty and Prepaid / 104 \\ Tickets and Passes / 105 \\ The Who's Who of Digital Wallets / 106 \\ Google / 107 \\ LifeLock (formerly Lemon Wallet) / 108 \\ PayPal / 109 \\ Carriers / 110 \\ Retailers / 111 \\ Square Wallet / 113 \\ What's Next? / 113 \\ Notes / 114 \\ 4 Innovating with Big Data and Open Platforms / 115 \\ Competing in a World of Unlimited Data and Storage \\ The Rise of Platform Services / 121 \\ Application Programming Interfaces (APIs) for Online and Mobile Commerce / 122 \\ Coping Strategies for Banks / 123 \\ PayPal's Bold Bet: Unleashing Innovation through an Open Platform / 125 \\ App Stores for Banks: Will It Work? / 133 \\ What's Next? / 139 \\ Notes / 141 \\ 5 Math-Based Currencies / 143 \\ How Bitcoin May Prove Transformational to the Financial Services Industry \\ Entering the Age of Context / 143 \\ Intro to Math-Based Currencies / 146 \\ Why ``Math-Based Currencies''? / 147 \\ MBCs Are a Reality / 147 \\ History of Digital Currencies / 148 \\ Math-Based Currency Characteristics / 148 \\ Bitcoin: The First MBC / 149 \\ Bitcoin's Brief History / 150 \\ Is It Bitcoin, bitcoin, or Just BTC / 150 \\ Bitcoin Is a Powerful Concept / 150 \\ How Bitcoin Works / 152 \\ Digging Bitcoin / 154 \\ Digital Push Payments / 156 \\ Counterfeiting No More / 156 \\ MBCs Enable Programmable Money / 156 \\ Completing the Bitcoin Ecosystem / 157 \\ Bitcoin Exchanges / 158 \\ Bitcoin Wallets --- Where to Store Your BTC / 159 \\ Mobile Wallets / 159 \\ Cloud-Based Wallets / 159 \\ Bitcoin Hardware Wallet / 160 \\ Bitcoin Vaults / 160 \\ Trading Platforms / 160 \\ Bitcoin Use Cases in Payments / 161 \\ MBCs as Payment Rails / 161 \\ B2B Payments --- The Known Counterparty / 162 \\ Bitcoin and Consumer Payments / 162 \\ Buy Me a Beer / 163 \\ E-Commerce and MBCs / 163 \\ Getting Harder: Music and Video / 164 \\ Challenges at the POS / 164 \\ Improving Bitcoin Processes / 164 \\ Improving the Bitcoin Protocol / 164 \\ Programming Bitcoin for a Special Case: Online Micropayments / 166 \\ Wallets / 167 \\ Ripple: The Second MBC / 167 \\ MBC Use Cases in Banking / 168 \\ International Remittance Rails / 168 \\ Interbank Settlement / 169 \\ Building Trust with MBCs / 170 \\ Automating Transaction Policies / 171 \\ Moving Ahead with MBCs / 172 \\ Conclusion / 174 \\ 6 / 177 \\ The Smart Pipe \\ Models that Will Survive the Next Generation The Prepaid Model / 178 \\ Prepaid Nation: Redefi ning What a Bank Can Be / 179 \\ The ``Underbanked'' and Opportunities for Innovation / 184 \\ Stockpile: An Example of Brokerage Innovation Through Partnering / 185 \\ MoneyGram: An Example of Innovation through Partnering / 186 \\ Innovative Ways to Expand Access --- PayNearMe / 189 \\ How Innovative Banks Are Partnering for Innovation / 190 \\ The CEO-CIO Relationship Driving the Innovation of ING DIRECT Canada / 190 \\ A Whole New Era / 193 \\ How Banks Can Compete in the Future / 194 \\ Three Imperatives to Partner for Innovation / 196 \\ A Venture Capitalist's Look at the Future of Banking / 198 \\ Technology as an Enabler and Partner / 205 \\ What the Next 50 Years Might Hold / 206 \\ Digital / 207 \\ Relationship Management / 207 \\ Platform and Identity Friendly / 208 \\ The Future Bank Bundle: Platform-Relationship-Utility / 208 \\ Notes / 209 \\ About the Author / 211 \\ Index / 213", } @Book{Schlichter:2014:PMC, author = "Detlev S. Schlichter", title = "Paper money collapse: the folly of elastic money", publisher = pub-WILEY, address = pub-WILEY:adr, edition = "Second", pages = "xviii + 318", year = "2014", ISBN = "1-118-87732-2 (hardcover), 1-118-87733-0", ISBN-13 = "978-1-118-87732-6 (hardcover), 978-1-118-87733-3", LCCN = "HG353 .S35 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "``Explore the inevitable collapse of the fiat monetary system: \booktitle{Paper Money Collapse: The Folly of Elastic Money and the Coming Monetary Breakdown}, Second Edition challenges the mainstream consensus on money and monetary policy. While it is today generally believed that the transition from 'hard' and inflexible commodity money (such as a gold standard) to entirely flexible and potentially unlimited fiat money under national central banks allows for superior economic stability, Paper Money Collapse shows that the opposite is true. Systems of highly elastic and constantly expanding money are not only unnecessary, even for growing economies, they are always extremely destabilizing. Over time, they must lead to substantial imbalances, including excessive levels of debt and distorted asset prices, that will require ever faster money production to sustain. Ultimately, however, there is no alternative to a complete liquidation of these distortions. Based on insights of many renowned economists and in particular of the Austrian School of Economics, the book explains through rigorous logic and in precise language why our system of flexible fiat money is incompatible with a market economy and therefore unsustainable. Paper money systems have always led to economic disintegration--without exception--throughout history. It will not be different for our system and we may be closer to the endgame than many think.The updated second edition incorporates: A new introduction and an extended outlook section that discusses various ''endgames`` Responses to criticisms, alternative views, and a critical assessment of solutions' Comments on recent policy trends, including attempts to exit the 'easy money' policy mode An evaluation of new crypto-currency Bitcoin Paper Money Collapse: The Folly of Elastic Money, Second Edition clarifies the problem of paper money clearly and eloquently, and proposes multiple routes to a solution''-- ``This book illustrates the underlying problems with elastic money''", acknowledgement = ack-nhfb, author-dates = "1964--", subject = "Paper money; Money supply; Currency question; Credit; BUSINESS and ECONOMICS / Economic Conditions; BUSINESS and ECONOMICS / Economics / General.", tableofcontents = "Foreword Acknowledgments Prologue: Contra the Mainstream Consensus --- What this book is about The Ruling Mainstream Consensus on Money The Growth-versus-inflation Trade Off What This Book Will Show Understanding Our Fiat Money System What is Different from the First Edition? Support from Eminent Economists Notes Part One: The Basics of Money Chapter 1 The Fundamentals of Money and Money Demand The Origin and Purpose of Money An Anthropologist's Challenge What Gives Money Value? (Almost) Any Quantity of Money Will Do The Demand for Money Are ``Sticky'' Prices a Problem? Other Functions of Money The Unique Position of the Paper Money Producer The Monetary Asset versus Other Goods Notes Chapter 2 The Fundamentals of Fractional-Reserve Banking The Origin and Basics of Fractional-Reserve Banking Who Owns ``Deposited'' Money? Exposing Misconceptions about Fractional-Reserve Banking ``Free Banking'' is Limited Banking Summary of Part One Notes Part Two: The Effects of Money Injections Chapter 3 Money Injections without Credit Markets Even, Instant, and Transparent Money Injection Even and Nontransparent Money Injection Uneven and Nontransparent Money Injection Notes Chapter 4 Money Injections via Credit Markets Consumption, Saving, and Investing Interest Interest Rates are Not Determined by Factor Productivity Money Injection via the Loan Market The Process in More Detail Policy Implications of the Austrian Theory Addendum: Gordon Tullock's Critique of the Austrian Business Cycle Theory and some words on ``forced saving'' An Example: U.S. Housing Boom and Bust Summary of Part Two Notes Part Three: Fallacies about the Price Level and Price Level Stabilization Chapter 5 Common Misconceptions Regarding the Price Level The Fallacy that a Stable Price Level Means ``Neutral'' Money The Fallacy that Hard Money is Unstable Money, Part 1 --- History The Fallacy that Hard Money is Unstable Money, Part 2 --- Theory Notes Chapter 6 The Policy of Stabilization Problems with Price Index Stabilization Addendum: The ``Free Bankers'' and the Theory of Immaculate Fractional-Reserve Banking Summary of Part Three Notes Part Four: A History of Paper Money and How We Got to Where We Are Now Chapter 7 A Legacy of Failure Paper Money Experiments 1914 --- 2014 --- A Century of Monetary Decay Notes Part Five: Beyond the Cycle --- Paper Money's Endgame and The Future of Money Chapter 8 The Beneficiaries of the Paper Money System Paper Money and the Banks Paper Money and the State Paper Money and the Professional Economist Notes Chapter 9 The Intellectual Superstructure of the Present System The Alternative View: Individualism and Laissez-Faire The Mainstream View: Collectivism and Interventionism The Political Appeal of Mainstream Macroeconomics The Myth That Everybody Benefits from ``Stimulus'' Monetarism as Monetary Interventionism The Savings Glut Theory and the Myth of Underconsumption and Underinvestment Inflationism and International Policy Coordination Notes Chapter 10 Endgames - Inflationary Meltdown or Return to Hard Money? Paper Money Collapse Alternatives: Return to Hard Money A Return to a Gold Standard The Separation of Money and State Bitcoin --- Money of No Authority Notes Epilogue: Money, Freedom, and Capitalism About the Author Index", } @Misc{Schwartz:2014:RPC, author = "D. Schwartz and N. Youngs and A. Britto", title = "The Ripple Protocol Consensus Algorithm", howpublished = "Whitepaper", month = sep, year = "2014", bibdate = "Sun Jan 21 08:46:28 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://ripple.com/consensus-whitepaper/", acknowledgement = ack-nhfb, remark = "URL no longer reachable on 22 January 2018.", } @InProceedings{Shah:2014:BRB, author = "D. Shah and K. Zhang", booktitle = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)", title = "{Bayesian} regression and {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "409--414", month = sep, year = "2014", DOI = "https://doi.org/10.1109/ALLERTON.2014.7028484", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bayes methods; Bayesian inference; Bayesian regression; binary classification; Cryptography; Estimation; investment; Investment; latent source model; Online banking; peer-to-peer computing; pricing; Random variables; regression analysis; Vectors; virtual cryptographic currency; {Bitcoin} price variation prediction", } @InProceedings{Shoshitaishvili:2014:DYF, author = "Yan Shoshitaishvili and Luca Invernizzi and Adam Doupe and Giovanni Vigna", booktitle = "Proceedings of the 29th Annual {ACM} Symposium on Applied Computing", title = "Do You Feel Lucky?: A Large-scale Analysis of Risk-rewards Trade-offs in Cyber Security", publisher = pub-ACM, address = pub-ACM:adr, pages = "1649--1656", year = "2014", DOI = "https://doi.org/10.1145/2554850.2554880", ISBN = "1-4503-2469-X", ISBN-13 = "978-1-4503-2469-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SAC '14", acknowledgement = ack-nhfb, acmid = "2554880", location = "Gyeongju, Republic of Korea", pagecount = "8", } @Article{Sidel:2014:OCS, author = "Robin Sidel", title = "Overstock {CEO} Sees {Bitcoin} Sales Rising More than Expected", journal = j-WALL-ST-J, volume = "??", number = "??", pages = "??--??", day = "4", month = mar, year = "2014", CODEN = "WSJOAF", ISSN = "0099-9660", bibdate = "Mon Dec 04 07:26:27 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Wall Street Journal", } @Article{Song:2014:RFB, author = "Sophie Song", title = "The Rise and Fall of {Bitcoin} in {China}: {Central Bank} Shuts Down All {Chinese} {Bitcoin} Exchanges", journal = "International Business Times", volume = "??", number = "??", pages = "??--??", day = "27", month = mar, year = "2014", bibdate = "Mon Dec 04 07:27:57 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ibtimes.com/rise-fall-bitcoin-china-central-bank-shuts-down-all-chinese-bitcoin-exchanges-1563826", abstract = "The official demise of bitcoin in China has arrived. The People's Bank of China is ordering banks to close by April 15 [2014] all accounts opened by operators of websites that trade the currency, essentially forcing all bitcoin exchanges in China to shut down.", acknowledgement = ack-nhfb, } @InProceedings{Spagnuolo:2014:BEI, author = "Michele Spagnuolo and Federico Maggi and Stefano Zanero", title = "{BitIodine}: Extracting Intelligence from the {Bitcoin} Network", crossref = "Christin:2014:FCD", pages = "457--468", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-45472-5_29", ISBN = "3-662-45472-6", ISBN-13 = "978-3-662-45472-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-45472-5_29", acknowledgement = ack-nhfb, } @InProceedings{Tromp:2014:CCMa, author = "John Tromp", booktitle = "Workshop on Bitcoin Research", title = "Cuckoo Cycle: a memory-hard proof-of-work system", publisher = "????", address = "????", pages = "??--??", day = "1", month = feb, year = "2014", bibdate = "Sun Jan 21 08:52:42 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.hashcash.org/papers/cuckoo.pdf", acknowledgement = ack-nhfb, pagecount = "8", } @Misc{Tromp:2014:CCMb, author = "John Tromp", title = "{Cuckoo Cycles}: a memory-hard proof-of-work system", howpublished = "Web site.", month = jan, year = "2014", bibdate = "Sun Jan 21 10:49:03 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://github.com/tromp/cuckoo", acknowledgement = ack-nhfb, } @Article{VanAlstyne:2014:WBV, author = "Marshall {Van Alstyne}", title = "Why {Bitcoin} has value", journal = j-CACM, volume = "57", number = "5", pages = "30--32", month = may, year = "2014", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2594288", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Wed May 21 10:20:12 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", abstract = "Evaluating the evolving controversial digital currency.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @InProceedings{vandenHooff:2014:VVC, author = "Jelle van den Hooff and M. Frans Kaashoek and Nickolai Zeldovich", booktitle = "{Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}", title = "{VerSum}: Verifiable Computations over Large Public Logs", publisher = pub-ACM, address = pub-ACM:adr, pages = "1304--1316", year = "2014", DOI = "https://doi.org/10.1145/2660267.2660327", ISBN = "1-4503-2957-8", ISBN-13 = "978-1-4503-2957-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '14", URL = "http://doi.acm.org/10.1145/2660267.2660327", acknowledgement = ack-nhfb, acmid = "2660327", keywords = "cloud computing; verifiable computation", location = "Scottsdale, Arizona, USA", pagecount = "13", } @InProceedings{Vandervort:2014:COA, author = "David Vandervort", title = "Challenges and Opportunities Associated with a {Bitcoin}-Based Transaction Rating System", crossref = "Christin:2014:FCD", pages = "33--42", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_3", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_3", acknowledgement = ack-nhfb, } @InProceedings{Vasek:2014:EAD, author = "Marie Vasek and Micah Thornton and Tyler Moore", title = "Empirical Analysis of Denial-of-Service Attacks in the {Bitcoin} Ecosystem", crossref = "Christin:2014:FCD", pages = "57--71", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1_5", ISBN = "3-662-44774-6", ISBN-13 = "978-3-662-44774-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-44774-1_5", acknowledgement = ack-nhfb, } @Misc{Wood:2014:ESD, author = "Gavin Wood", title = "{Ethereum}: A secure decentralized transaction ledger: {EIP-150} Revision", howpublished = "Web document.", pages = "32", year = "2014", bibdate = "Sun Jan 21 08:57:48 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://gavwood.com/paper.pdf", abstract = "The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, not least Bitcoin. Each such project can be seen as a simple application on a decentralised, but singleton, compute resource. We can call this paradigm a transactional singleton machine with shared-state.\par Ethereum implements this paradigm in a generalised manner. Furthermore it provides a plurality of such resources, each with a distinct state and operating code but able to interact through a message-passing framework with others. We discuss its design, implementation issues, the opportunities it provides and the future hurdles we envisage.", acknowledgement = ack-nhfb, } @InProceedings{Worner:2014:WYS, author = "Dominic W{\"o}rner and Thomas von Bomhard", booktitle = "Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication", title = "When Your Sensor Earns Money: Exchanging Data for Cash with {Bitcoin}", publisher = pub-ACM, address = pub-ACM:adr, pages = "295--298", year = "2014", DOI = "https://doi.org/10.1145/2638728.2638786", ISBN = "1-4503-3047-9", ISBN-13 = "978-1-4503-3047-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "UbiComp '14 Adjunct", acknowledgement = ack-nhfb, acmid = "2638786", keywords = "Bitcoin, data market, sensors", location = "Seattle, Washington", pagecount = "4", } @InProceedings{Alam:2015:NVI, author = "M. T. Alam and H. Li and A. Patidar", booktitle = "The 21st {IEEE} International Workshop on Local and Metropolitan Area Networks", title = "Notice of Violation of {IEEE} Publication Principles: {Bitcoin} for smart trading in smart grid", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--2", month = apr, year = "2015", DOI = "https://doi.org/10.1109/LANMAN.2015.7114742", ISSN = "1944-0367 (print), 1944-0375 (electronic)", ISSN-L = "1944-0375", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; bitcoin; Cryptography; data privacy; digital currency; Online banking; peer-to-peer computing; peer-to-peer electronic currency system; power engineering computing; Privacy; privacy; privacy aware; Renewable energy sources; Servers; smart grid; Smart grids; Smart meters; smart power grids; smart trading; trading", } @InProceedings{Ali:2015:BPUa, author = "Syed Taha Ali and Dylan Clarke and Patrick McCorry", booktitle = "Security Protocols {XXIII}", title = "{Bitcoin}: Perils of an Unregulated Global {P2P} Currency", publisher = pub-SV, address = pub-SV:adr, pages = "283--293", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-26096-9_29", ISBN = "3-319-26096-0", ISBN-13 = "978-3-319-26096-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-26096-9_29", acknowledgement = ack-nhfb, } @InProceedings{Ali:2015:BPUb, author = "Syed Taha Ali", booktitle = "Security Protocols {XXIII}", title = "{Bitcoin}: Perils of an Unregulated Global {P2P} Currency (Transcript of Discussion)", publisher = pub-SV, address = pub-SV:adr, pages = "294--306", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-26096-9_30", ISBN = "3-319-26096-0", ISBN-13 = "978-3-319-26096-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-26096-9_30", acknowledgement = ack-nhfb, } @InProceedings{Ali:2015:ZPN, author = "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen Lee and Feng Hao", title = "{ZombieCoin}: Powering Next-Generation Botnets with {Bitcoin}", crossref = "Brenner:2015:FCD", pages = "34--48", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_3", ISBN = "3-662-48050-6 (paperback), 3-662-48051-4 (e-book)", ISBN-13 = "978-3-662-48050-2 (paperback), 978-3-662-48051-9 (e-book)", MRclass = "94-06 94A60 00B25", MRnumber = "3440765", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_3", ZMnumber = "1321.94006", acknowledgement = ack-nhfb, } @InProceedings{Andrychowicz:2015:MBT, author = "Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and {\L}ukasz Mazurek", title = "On the Malleability of {Bitcoin} Transactions", crossref = "Brenner:2015:FCD", volume = "8976", pages = "1--18", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_1", MRclass = "94A60", MRnumber = "3440763", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_1", acknowledgement = ack-nhfb, } @Article{Angel:2015:EPP, author = "James J. Angel and Douglas McCabe", title = "The Ethics of Payments: Paper, Plastic, or {Bitcoin}?", journal = "Journal of Business Ethics", volume = "132", number = "3", pages = "603--611", month = sep, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s10551-014-2354-x", ISSN = "0167-4544 (print), 1573-0697 (electronic)", ISSN-L = "0167-4544", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10551-014-2354-x", acknowledgement = ack-nhfb, } @Article{Anonymous:2015:B, author = "Anonymous", title = "Bitcoinages", journal = j-IEEE-SPECTRUM, volume = "52", number = "12", pages = "26--26", month = dec, year = "2015", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2015.7335795", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Book{Anthopoulos:2015:ICT, editor = "Leonidas G. Anthopoulos and Christopher G. Reddick", title = "Information and communication technologies in public administration: innovations from developed countries", volume = "196", publisher = pub-CRC, address = pub-CRC:adr, pages = "xvii + 333", year = "2015", ISBN = "1-4822-3929-9 (hardcover)", ISBN-13 = "978-1-4822-3929-4 (hardcover)", LCCN = "JF1525.A8 I4674 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Public administration and public policy: a comprehensive publication program", abstract = "Examines global perspectives on public administration and IT innovations. This book illustrates the theoretical context of current policies, issues, and implementation. It highlights e-government success stories from developed regions such as the U.S., Europe, Asia, and Australia then presents future trends and innovation. It explores innovative solutions with added value and impact to your organization.-Provided by publisher.", acknowledgement = ack-nhfb, subject = "Communication in public administration; Technological innovations; Developed countries; Internet in public administration; Public administration; Information technology", tableofcontents = "Section I: Global Perspectives on Public Administration And Information Technology Innovations \\ 1. Open Government Data: A European Perspective / Carmen Caba Perez \\ 2. Best Practices In E-Governance: A Comparative Study Based On the Rutgers University Worldwide Digital Governance Survey / Yueping Zheng \\ 3. Does External Environment Affect E-Government? A Cross-Country Analysis / Aroon Manoharan \\ 4. Web-Based Participatory Democracy: Findings From Italy / Gianluca Sgueo \\ 5. Comparative Scientometric Analysis In Social Media: What Can We Learn? And What Is Next? / Laura Alcaide Munoz \\ 6. E-Government As An Innovative Product: Theories And Case Study / Nikolaos Mavridis \\ 7. Aligning Strategy and Information and Communication Technology in Public Organizations: A Critical Management Challenge / Joe McDonagh \\ Section II: Topical Issues In Public Administration And Information Technology Innovation \\ 8. An Analysis of Failure in a Government-to-Government E-Government Context via the Updated Delone and McLean Model / Joep Crompvoets \\ 9. The Discretionary Space of Geo-Information and Communication Technology Professionals in Public Sector Cooperation Programs / Walter Timo De Vries \\ 10. The Evolution of Virtual Currencies: Analyzing the Case of Bitcoin / Gabriel Manrique \\ 11. Gov 2.0, Mobility and Inclusion: A Critical Examination of Social Assistance Reform in Ontario, Canada / Jeffrey Roy \\ 12. SPCData: The Italian Public Administration Data Cloud / Francesco Tortorelli \\ 13. Coupling Public Sector Information and Public-Funded Research Data in Europe: A Vision of an Open Data Ecosystem / Andrea Perego \\ 14. How Public Administration Restructuring Can Contribute to Greek Educational Reform / James O'Kane", } @Book{Antonopoulos:2015:MB, author = "Andreas M. Antonopoulos", title = "Mastering {Bitcoin}", publisher = pub-ORA, address = pub-ORA:adr, pages = "xxi + 272", year = "2015", ISBN = "1-4493-7404-2, 1-4919-0260-4", ISBN-13 = "978-1-4493-7404-4, 978-1-4919-0260-8", LCCN = "HG1710 .A58 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ora.bib; z3950.loc.gov:7090/Voyager", abstract = "A broad introduction to bitcoin --- ideal for non-tech users, investors, and business executives; technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architects; details of the bitcoin decentralized network, peer-to-peer architecture, transaction lifecycle, and security principles; offshoots of the bitcoin and blockchain inventions, including alternative chains, currencies, and applications; user stories, elegant analogies, examples, and code snippets illustrating key technical concepts.", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Computer programs; Electronic commerce; Money; Electronic commerce", tableofcontents = "How bitcoin works \\ The bitcoin client \\ Keys, addresses, wallets \\ Transactions \\ The bitcoin network \\ The blockchain \\ Mining and concensus \\ Alternative chains, currencies, and applications \\ Bitcoin security", } @Article{Barguil:2015:SIS, author = "Jo{\~a}o M. M. Barguil and Paulo S. L. M. Barreto", title = "Security issues in {Sarkar}'s e-cash protocol", journal = j-INFO-PROC-LETT, volume = "115", number = "11", pages = "801--803", month = nov, year = "2015", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Sat Jul 25 09:11:21 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0020019015001039", acknowledgement = ack-nhfb, fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190/", } @Article{Barkatullah:2015:GCF, author = "Javed Barkatullah and Timo Hanke", title = "{Goldstrike 1}: {CoinTerra}'s First-Generation Cryptocurrency Mining Processor for {Bitcoin}", journal = j-IEEE-MICRO, volume = "35", number = "2", pages = "68--76", month = mar # "\slash " # apr, year = "2015", CODEN = "IEMIDZ", DOI = "https://doi.org/10.1109/MM.2015.13", ISSN = "0272-1732 (print), 1937-4143 (electronic)", ISSN-L = "0272-1732", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib", URL = "http://www.computer.org/csdl/mags/mi/2015/02/mmi2015020068-abs.html", abstract-URL = "http://www.computer.org/csdl/mags/mi/2015/02/mmi2015020068-abs.html", acknowledgement = ack-nhfb, fjournal = "IEEE Micro", journal-URL = "http://www.computer.org/csdl/mags/mi/index.html", keywords = "application specific integrated circuits; Application specific integrated circuits; Blockchain; CoinTerra; CoinTerra first-generation cryptocurrency mining processor; CoinTerra first-generation {Bitcoin} mining processor; Computer security; Cryptography; cryptography; custom ASIC processors; Data mining; data mining; electronic money; Energy efficiency; energy efficiency; GoldStrike; Goldstrike 1; Online banking; SHA-256; Terraminer IV; {Bitcoin}; {Bitcoin} ASIC; {Bitcoin} mining; {Bitcoin} mining appliances; {Bitcoin} mining machine", } @InProceedings{Battista:2015:BVF, author = "G. D. Battista and V. D. Donato and M. Patrignani and M. Pizzonia and V. Roselli and R. Tamassia", booktitle = "2015 {IEEE} Symposium on Visualization for Cyber Security {(VizSec)}", title = "{BitConeView}: visualization of flows in the {Bitcoin} transaction graph", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--8", month = oct, year = "2015", DOI = "https://doi.org/10.1109/VIZSEC.2015.7312773", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; BitConeView; blockchain; cryptocurrency; Cryptography; data visualisation; digital currency; directed graph; directed graphs; electronic money; flow visualization; fraud detection; graph representation; graph visualization; high-level metaphors; money flow; Online banking; Peer-to-peer computing; public ledger; Servers; Standards; User interfaces; visual analysis; Visualization; {Bitcoin} transaction graph", } @InProceedings{Baur:2015:CDE, author = "Aaron W. Baur and Julian B{\"u}hler and Markus Bick and Charlotte S. Bonorden", booktitle = "Open and Big Data Management and Innovation", title = "Cryptocurrencies as a Disruption? {Empirical} Findings on User Adoption and Future Potential of {Bitcoin and Co}", publisher = pub-SV, address = pub-SV:adr, pages = "63--80", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-25013-7_6", ISBN = "3-319-25013-2", ISBN-13 = "978-3-319-25013-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-25013-7_6", acknowledgement = ack-nhfb, } @InProceedings{Beikverdi:2015:TCB, author = "A. Beikverdi and J. Song", booktitle = "2015 {IEEE\slash} {ACIS 16th} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\slash Distributed Computing {(SNPD)}", title = "Trend of centralization in {Bitcoin}'s distributed network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = jun, year = "2015", DOI = "https://doi.org/10.1109/SNPD.2015.7176229", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Centralization; centralization factor; cryptography; data mining; Decentralized network; financial data processing; fully decentralized network; Market research; Mathematical model; Mining; Online banking; peer to peer crypto currency; Peer-to-peer computing; peer-to-peer computing; Protocols; Security; Servers; {Bitcoin} distributed network; {Bitcoin} mining pools; {Bitcoin} pool", } @Book{Berlatsky:2015:B, editor = "Noah Berlatsky", title = "{Bitcoin}", publisher = "Greenhaven Press, a part of Gale, Cengage Learning", address = "Farmington Hills, MI, USA", pages = "89", year = "2015", ISBN = "0-7377-7314-6 (hardcover), 0-7377-7315-4 (paperback)", ISBN-13 = "978-0-7377-7314-9 (hardcover), 978-0-7377-7315-6 (paperback)", LCCN = "HG221 .B5737 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "At issue series", acknowledgement = ack-nhfb, subject = "Money; Coinage, International; Tokens; Exchange; Electronic commerce; Virtual reality; Economic aspects", } @InProceedings{Biryukov:2015:BTI, author = "A. Biryukov and I. Pustogarov", booktitle = "2015 {IEEE} Symposium on Security and Privacy", title = "{Bitcoin} over {Tor} isn't a Good Idea", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "122--134", month = may, year = "2015", DOI = "https://doi.org/10.1109/SP.2015.15", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Anonymity; Bandwidth; Bit coin network; cryptocurrency; Databases; decentralized P2P digital currency; default Tor functionality; information flow; IP address; IP networks; low-resource attacker; Online banking; P2P; peer-to-peer computing; Peer-to-peer computing; peer-to-peer network; popular mobile SPV client; pseudonymity; random-looking Bit coin address; Relays; Security; security of data; Servers; Tor; user transactions; {Bitcoin}", } @Article{Bohme:2015:BET, author = "Rainer B{\"o}hme and Nicolas Christin and Benjamin Edelman and Tyler Moore", title = "{Bitcoin}: Economics, Technology, and Governance", journal = "The Journal of Economic Perspectives", volume = "29", number = "2", pages = "213--238", year = "2015", ISSN = "0895-3309 (print), 1944-7965 (electronic)", ISSN-L = "0895-3309", bibdate = "Fri Dec 1 13:54:57 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.jstor.org/stable/24292130", acknowledgement = ack-nhfb, fjournal = "The Journal of Economic Perspectives", } @InProceedings{Bonneau:2015:SRP, author = "Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten", booktitle = "2015 {IEEE} Symposium on Security and Privacy", title = "{SoK}: Research Perspectives and Challenges for {Bitcoin} and Cryptocurrencies", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "104--121", month = may, year = "2015", DOI = "https://doi.org/10.1109/SP.2015.14", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf", acknowledgement = ack-nhfb, keywords = "Bitcoin; Communities; computational puzzle; consensus mechanism; cryptocurrency; cryptographic currency; cryptography; Cryptography; currency allocation mechanism; data privacy; disinter mediation protocol; electronic money; financial data processing; key management tool; Online banking; Peer-to-peer computing; privacy-enhancing proposal; Proposals; protocols; Protocols", } @Book{Bracey:2015:RPD, author = "Earnest N. Bracey", title = "The role of politics in the development of virtual {Bitcoin} currency", publisher = "The Edwin Mellen Press", address = "Lewiston, New York", pages = "xviii + 223", year = "2015", ISBN = "1-4955-0353-4 (hardcover)", ISBN-13 = "978-1-4955-0353-5 (hardcover)", LCCN = "HG1710 .B7293 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Bitcoin; Banks and banking; Government policy; Monetary policy", } @Article{Bradbury:2015:BSB, author = "D. Bradbury", title = "In blocks [Security {Bitcoin}]", journal = "Engineering Technology", volume = "10", number = "2", pages = "68--71", month = mar, year = "2015", DOI = "https://doi.org/10.1049/et.2015.0208", ISSN = "1750-9637 (print), 1750-9645 (electronic)", ISSN-L = "1750-9637", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; blockchain; computer crime; cryptography; double spending; electronic money; interoperability; open systems; risk management; risk reduction; users funds security", } @Article{Briere:2015:VCT, author = "Marie Bri{\`e}re and Kim Oosterlinck and Ariane Szafarz", title = "Virtual currency, tangible return: Portfolio diversification with {Bitcoin}", journal = j-J-ASSET-MANAGE, volume = "16", number = "6", pages = "365--373", month = oct, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1057/jam.2015.5", ISSN = "1470-8272 (print), 1479-179X (electronic)", ISSN-L = "1470-8272", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1057/jam.2015.5; http://papers.ssrn.com/sol3/paper.cfm?abstract_id=2324780", acknowledgement = ack-nhfb, fjournal = "Journal of Asset Management", } @Book{Caetano:2015:LBE, author = "Richard Caetano", title = "Learning {Bitcoin}: embrace the new world of flance by leveraging the power of crypto-currencies using {Bitcoin} and Blockchain", publisher = pub-PACKT, address = pub-PACKT:adr, pages = "xi + 211", year = "2015", ISBN = "1-78528-730-3 (paperback), 1-78528-615-3 (e-book)", ISBN-13 = "978-1-78528-730-5 (paperback), 978-1-78528-615-5 (e-book)", LCCN = "HF5548.32 .C34 2015eb", bibdate = "Mon Dec 4 08:53:48 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Community experience distilled", abstract = "Embrace the new world of fiance by leveraging the power of crypto-currencies using Bitcoin and the Blockchain About This Book * Set up your own wallet, buy and sell Bitcoin, and execute custom transactions on the Blockchain * Leverage the power of Bitcoin to reduce transaction costs and eliminate fraud * A practical step-by-step guide to break down the Bitcoin technology to ensure safe transactions Who This Book Is For If you are familiar with online banking and want to expand your finances into a resilient and transparent currency, this book is ideal for you. A basic understanding of online wallets and financial systems will be highly beneficial to unravel the mysteries of Bitcoin. What You Will Learn * Set up your wallet and buy a Bitcoin in a flash while understanding the basics of addresses and transactions * Acquire the knack of buying, selling, and trading Bitcoins with online marketplaces * Secure and protect your Bitcoins from online theft using Brainwallets and cold storage * Understand how Bitcoin's underlying technology, the Blockchain, works with simple illustrations and explanations * Configure your own Bitcoin node and execute common operations on the network * Discover various aspects of mining Bitcoin and how to set up your own mining rig * Dive deeper into Bitcoin and write scripts and multi-signature transactions on the network * Explore the various alt-coins and get to know how to compare them and their value In Detail The financial crisis of 2008 raised attention to the need for transparency and accountability in the financial world. As banks and governments were scrambling to stay solvent while seeking a sustainable plan, a powerfully new and resilient technology emerged. Bitcoin, built on a fundamentally new technology called ``The Blockchain,'' offered the promise of a new financial system where transactions are sent directly between two parties without the need for central control. Bitcoin exists as an open and transparent financial system without banks, governments, or corporate support. Simply put, Bitcoin is ``programmable money'' that has the potential to change the world on the same scale as the Internet itself. This book arms you with immense knowledge of Bitcoin and helps you implement the technology in your money matters, enabling secure transactions. We first walk through the fundamentals of Bitcoin, illustrate how the technology works, and exemplify how to interact with this powerful and new financial technology. You will learn how to set up your online Bitcoin wallet, indulge in buying and selling of bitcoins, and manage their storage. We then get to grips with the most powerful algorithm of all times: the Blockchain, and learn how crypto-currencies can reduce the risk of fraud for e-commerce merchants and consumers. With a solid base of Blockchain, you will write and execute your own custom transactions. Most importantly, you will be able to protect and secure your Bitcoin with the help of effective solutions provided in the book. Packed with plenty of screenshots, Learning Bitcoin is a simple and painless guide to working with Bitcoin. Style and approach This is an easy-to-follow guide to working with Bitcoin and the Blockchain technology. This book is ideal for anyone who wants to learn the basics of Bitcoin and explore how to set up their own transactions.", acknowledgement = ack-nhfb, subject = "Betalingsformidling; Bitcoin; Electronic commerce; Electronic funds transfers; Exchange; M$^2$ntfod; Money", } @Book{Capaccioli:2015:CBU, author = "Stefano Capaccioli", title = "Criptovalute e {Bitcoin}: un'analisi giuridica. ({Italian}) [{Cryptocurrencies} and {Bitcoins}: a legal analysis]", volume = "4", publisher = "Giuffr{\`e} Editore", address = "Milano, Italy", pages = "xvi + 285", year = "2015", ISBN = "88-14-20698-8", ISBN-13 = "978-88-14-20698-6", LCCN = "KKH961 .C37 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Informatica giuridica", acknowledgement = ack-nhfb, language = "Italian", subject = "Electronic funds transfers; Law and legislation; Italy; Electronic commerce; Currency question; Bitcoin; Cryptography", } @InProceedings{Carmona:2015:BCF, author = "Anais Carmona", booktitle = "Evolution of Cyber Technologies and Operations to 2035", title = "The {Bitcoin}: The Currency of the Future, Fuel of Terror", publisher = pub-SV, address = pub-SV:adr, pages = "127--135", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-23585-1_9", ISBN = "3-319-23585-0", ISBN-13 = "978-3-319-23585-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-23585-1_9", acknowledgement = ack-nhfb, } @Article{Cheah:2015:SBB, author = "Eng-Tuck Cheah and John Fry", title = "Speculative bubbles in {Bitcoin} markets? {An} empirical investigation into the fundamental value of {Bitcoin}", journal = j-ECONOM-LETT, volume = "130", pages = "32--36", year = "2015", CODEN = "ECLEDS", DOI = "https://doi.org/10.1016/j.econlet.2015.02.029", ISSN = "0165-1765 (print), 1873-7374 (electronic)", ISSN-L = "0165-1765", MRclass = "91G80", MRnumber = "3336157", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Economics Letters", journal-URL = "https://www.sciencedirect.com/science/journal/01651765", } @Article{Churchill:2015:WSW, author = "Elizabeth F. Churchill", title = "Why Should We Care About {Bitcoin}?", journal = j-INTERACTIONS, volume = "22", number = "5", pages = "20--21", month = aug, year = "2015", CODEN = "IERAE3", DOI = "https://doi.org/10.1145/2810199", ISSN = "1072-5520 (print), 1558-3449 (electronic)", ISSN-L = "1072-5520", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "2810199", fjournal = "Interactions (New York, NY)", pagecount = "2", } @InProceedings{Courtois:2015:DBM, author = "N. T. Courtois and P. Emirdag and Z. Wang", booktitle = "2015 International Conference on Information Systems Security and Privacy {(ICISSP)}", title = "On detection of {Bitcoin} mining redirection attacks", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "98--105", month = feb, year = "2015", DOI = "", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Crypto Currencies; Cryptography; Double-spending attacks; e-Payment; Hash Functions; History; Man-In-the-Middle Attacks; Online banking; Peer-to-peer computing; Protocols; Stratum Protocol; Switches", } @Article{Crary:2015:PPA, author = "Karl Crary and Michael J. Sullivan", title = "Peer-to-peer affine commitment using {Bitcoin}", journal = j-SIGPLAN, volume = "50", number = "6", pages = "479--488", month = jun, year = "2015", CODEN = "SINODQ", DOI = "https://doi.org/10.1145/2813885.2737997", ISSN = "0362-1340 (print), 1523-2867 (print), 1558-1160 (electronic)", ISSN-L = "0362-1340", bibdate = "Tue Feb 16 12:01:41 MST 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib", abstract = "The power of linear and affine logic lies in their ability to model state change. However, in a trustless, peer-to-peer setting, it is difficult to force principals to commit to state changes. We show how to solve the peer-to-peer affine commitment problem using a generalization of Bitcoin in which transactions deal in types rather than numbers. This has applications to proof-carrying authorization and mechanically executable contracts. Importantly, our system can be---and is---implemented on top of the existing Bitcoin network, so there is no need to recruit computing power to a new protocol.", acknowledgement = ack-nhfb, fjournal = "ACM SIGPLAN Notices", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J706", remark = "PLDI '15 conference proceedings.", } @InProceedings{Dagher:2015:PPP, author = "Gaby G. Dagher and Benedikt B{\"u}nz and Joseph Bonneau and Jeremy Clark and Dan Boneh", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Provisions: Privacy-preserving Proofs of Solvency for {Bitcoin} Exchanges", publisher = pub-ACM, address = pub-ACM:adr, pages = "720--731", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813674", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813674", keywords = "Bitcoin, exchange services, solvency, zero knowledge", location = "Denver, Colorado, USA", pagecount = "12", } @InCollection{Decker:2015:FSP, author = "Christian Decker and Roger Wattenhofer", booktitle = "Stabilization, Safety, and Security of Distributed Systems", title = "A Fast and Scalable Payment Network with {Bitcoin} Duplex Micropayment Channels", volume = "9212", publisher = pub-SV, address = pub-SV:adr, pages = "3--18", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-21741-3_1", ISBN = "3-319-21741-0", ISBN-13 = "978-3-319-21741-3", MRclass = "68P30 (68M11)", MRnumber = "3420253", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-21741-3_1", acknowledgement = ack-nhfb, } @InProceedings{Decker:2015:MBE, author = "Christian Decker and James Guthrie and Jochen Seidel and Roger Wattenhofer", booktitle = "Computer Security --- {ESORICS 2015}", title = "Making {Bitcoin} Exchanges Transparent", publisher = pub-SV, address = pub-SV:adr, pages = "561--576", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-24177-7_28", ISBN = "3-319-24177-X", ISBN-13 = "978-3-319-24177-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-24177-7_28", acknowledgement = ack-nhfb, } @InProceedings{DuPont:2015:TAB, author = "Jules DuPont and Anna Cinzia Squicciarini", booktitle = "Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy", title = "Toward De-Anonymizing {Bitcoin} by Mapping Users Location", publisher = pub-ACM, address = pub-ACM:adr, pages = "139--141", year = "2015", DOI = "https://doi.org/10.1145/2699026.2699128", ISBN = "1-4503-3191-2", ISBN-13 = "978-1-4503-3191-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CODASPY '15", acknowledgement = ack-nhfb, acmid = "2699128", keywords = "bitcoin", location = "San Antonio, Texas, USA", pagecount = "3", } @InProceedings{Dziembowski:2015:IC, author = "Stefan Dziembowski", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Introduction to Cryptocurrencies", publisher = pub-ACM, address = pub-ACM:adr, pages = "1700--1701", year = "2015", DOI = "https://doi.org/10.1145/2810103.2812704", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2812704", keywords = "cryptocurrencies, distributed cryptography", location = "Denver, Colorado, USA", pagecount = "2", } @InProceedings{Easwaran:2015:BDI, author = "Soumya Easwaran and Manu Dixit and Sitabhra Sinha", booktitle = "Econophysics and Data Driven Modelling of Market Dynamics", title = "{Bitcoin} Dynamics: The {{\em Inverse Square Law\/}} of Price Fluctuations and Other Stylized Facts", publisher = pub-SV, address = pub-SV:adr, pages = "121--128", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-08473-2_4", ISBN = "3-319-08473-9", ISBN-13 = "978-3-319-08473-2", MRclass = "91B24 (91B84)", MRnumber = "3362952", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "New Econ. Windows", URL = "http://link.springer.com/chapter/10.1007/978-3-319-08473-2_4", acknowledgement = ack-nhfb, } @Article{Edwards:2015:FBP, author = "C. Edwards", title = "Finance --- {Bitcoin} price crash finds new victims", journal = "Engineering Technology", volume = "10", number = "2", pages = "19--19", month = mar, year = "2015", DOI = "https://doi.org/10.1049/et.2015.0220", ISSN = "1750-9637 (print), 1750-9645 (electronic)", ISSN-L = "1750-9637", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Eskandari:2015:FLU, author = "Shayan Eskandari and David Barrera and Elizabeth Stobert and Jeremy Clark", editor = "????", booktitle = "{Proceedings of the Workshop on Usable Security (USEC 15), 8 February 2015, San Diego, CA, USA}", title = "A first look at the usability of {Bitcoin} key management", publisher = "Internet Society", address = "Reston, VA, USA", pages = "??--??", year = "2015", DOI = "https://doi.org/10.14722/usec.2015.23015", ISBN = "1-891562-40-1", ISBN-13 = "978-1-891562-40-2", bibdate = "Sun Jan 21 07:43:46 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://users.encs.concordia.ca/~clark/papers/2015_usec.pdf", acknowledgement = ack-nhfb, } @Article{Extance:2015:FCB, author = "Andy Extance", title = "The future of cryptocurrencies: Bitcoin and beyond", journal = "Nat.", volume = "526", number = "7571", pages = "21--23", month = "????", year = "2015", CODEN = "????", DOI = "https://doi.org/10.1038/526021a", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/nature/nature526.html#Extance15; https://www.wikidata.org/entity/Q45871501", acknowledgement = ack-nhfb, dblp-key = "journals/nature/Extance15", dblp-mdate = "2020-06-08", } @Article{Eyal:2015:BNS, author = "Ittay Eyal and Adem Efe Gencer and Emin G{\"u}n Sirer and Robbert van Renesse", title = "{Bitcoin-NG}: a Scalable Blockchain Protocol", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2015", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1510.02037; https://dblp.org/db/journals/corr/corr1510.html#EyalGSR15", acknowledgement = ack-nhfb, dblp-key = "journals/corr/EyalGSR15", dblp-mdate = "2018-08-13", } @InProceedings{Eyal:2015:MD, author = "Ittay Eyal", editor = "{IEEE}", booktitle = "{2015 IEEE Symposium on Security and Privacy: Proceedings. 18--20 May, 2015, San Jose, California, USA}", title = "The Miner's Dilemma", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "89--103", year = "2015", DOI = "https://doi.org/10.1109/SP.2015.13", ISBN = "1-4673-6949-7", ISBN-13 = "978-1-4673-6949-7", ISSN = "1081-6011", bibdate = "Sun Jan 21 07:44:46 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Florian:2015:SRP, author = "Martin Florian and Johannes Walter and Ingmar Baumgart", booktitle = "Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic Society", title = "{Sybil}-Resistant Pseudonymization and Pseudonym Change Without Trusted Third Parties", publisher = pub-ACM, address = pub-ACM:adr, pages = "65--74", year = "2015", DOI = "https://doi.org/10.1145/2808138.2808145", ISBN = "1-4503-3820-8", ISBN-13 = "978-1-4503-3820-2", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WPES '15", acknowledgement = ack-nhfb, acmid = "2808145", keywords = "blacklisting, block chain, pseudonym, sybil attack", location = "Denver, Colorado, USA", pagecount = "10", } @InProceedings{Garay:2015:BBP, author = "Juan Garay and Aggelos Kiayias and Nikos Leonardos", title = "The {Bitcoin} backbone protocol: analysis and applications", crossref = "Oswald:2015:ACE", pages = "281--310", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-46803-6_10", MRclass = "94A60", MRnumber = "3344957", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-46803-6_10; https://eprint.iacr.org/2014/765.pdf", ZMnumber = "06487821; 1371.94636", acknowledgement = ack-nhfb, } @Article{Garcia:2015:SSA, author = "David Garcia and Frank Schweitzer", title = "Social signals and algorithmic trading of {Bitcoin}", journal = "Royal Society Open Science", volume = "2", pages = "150288", month = sep, year = "2015", DOI = "https://doi.org/10.1098/rsos.150288", ISSN = "2054-5703", MRclass = "68P99 (91B24 91D99)", MRnumber = "3420956", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, ajournal = "R. Soc. Open Sci.", fjournal = "Royal Society Open Science", pagecount = "13", } @InProceedings{Gervais:2015:TDB, author = "Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan {\v{C}}apkun", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Tampering with the Delivery of Blocks and Transactions in {Bitcoin}", publisher = pub-ACM, address = pub-ACM:adr, pages = "692--705", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813655", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813655", keywords = "Bitcoin, countermeasures., preventing object delivery", location = "Denver, Colorado, USA", pagecount = "14", } @InProceedings{Giaglis:2015:MIB, author = "G. Giaglis", booktitle = "2015 International Conference on Evaluation of Novel Approaches to Software Engineering {(ENASE)}", title = "Money-over-{IP} from {Bitcoin} to smart contracts and {M2M} money", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "IS-5--IS-5", month = apr, year = "2015", DOI = "", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Godsiff:2015:BBB, author = "Philip Godsiff", booktitle = "Agent and Multi-Agent Systems: Technologies and Applications", title = "{Bitcoin}: Bubble or Blockchain?", publisher = pub-SV, address = pub-SV:adr, pages = "191--203", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-19728-9_16", ISBN = "3-319-19728-2", ISBN-13 = "978-3-319-19728-9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-19728-9_16", acknowledgement = ack-nhfb, } @InProceedings{Gutoski:2015:HDB, author = "Gus Gutoski and Douglas Stebila", title = "Hierarchical Deterministic {Bitcoin} Wallets that Tolerate Key Leakage", crossref = "Brenner:2015:FCD", pages = "497--504", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-47854-7_31", ISBN = "3-662-47854-4", ISBN-13 = "978-3-662-47854-7", MRclass = "94A60", MRnumber = "3395040", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-47854-7_31", acknowledgement = ack-nhfb, } @InProceedings{Haferkorn:2015:SIW, author = "Martin Haferkorn and Josu{\'e} Manuel {Quintana Diaz}", booktitle = "Enterprise Applications and Services in the Finance Industry", title = "Seasonality and Interconnectivity Within Cryptocurrencies --- An Analysis on the Basis of {Bitcoin}, {Litecoin} and {Namecoin}", publisher = pub-SV, address = pub-SV:adr, pages = "106--120", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-28151-3_8", ISBN = "3-319-28151-8", ISBN-13 = "978-3-319-28151-3", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-28151-3_8", acknowledgement = ack-nhfb, } @InCollection{Hencic:2015:NAM, author = "Andrew Hencic and Christian Gouri{\'e}roux", booktitle = "Econometrics of Risk", title = "Noncausal Autoregressive Model in Application to {Bitcoin\slash USD} Exchange Rates", volume = "583", publisher = pub-SV, address = pub-SV:adr, pages = "17--40", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-13449-9_2", ISBN = "3-319-13449-3", ISBN-13 = "978-3-319-13449-9", MRclass = "91G80", MRnumber = "3330383", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Stud. Comput. Intell.", URL = "http://link.springer.com/chapter/10.1007/978-3-319-13449-9_2", acknowledgement = ack-nhfb, } @Book{HenriquezHerrera:2015:CNP, author = "Ian {Henr{\'i}quez Herrera} and Cristi{\'a}n Aedo", title = "La compraventa: nuevas perspectivas doctrinarias. ({Spanish}) [{The} sale: new doctrinal perspectives]", publisher = "Thomson Reuters", address = "Santiago, Chile", pages = "ii + 229", year = "2015", ISBN = "956-346-734-5", ISBN-13 = "978-956-346-734-5", LCCN = "KHF868 .C66 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Thomson Reuters La Ley. Monograf\'ias", acknowledgement = ack-nhfb, language = "Spanish", subject = "Sales; Chile; Vendors and purchasers", tableofcontents = "Cu{\'a}l es el contenido de la obligaci{\'o}n de entrega del vendedor en el Derecho Chileno? / Cristi{\'a}n Aedo Barrena \\ La obligaci{\'o}n esencial del vendedor es transferir el dominio / Jos{\'e} Joaqu{\'i}n Ugarte Godoy \\ Los requisitos del vicio redhibitorio en la compraventa seg{\'u}n el C{\'o}digo Civil Chileno / Jorge Oviedo Alb{\'a}n \\ Una mirada a la calidad de las cosas en la praxis judicial. Su evoluci{\'o}n desde los vicios redhibitorios hasta la inejecuci{\'o}n imprefecta de la obligaci{\'o}n de entrega / Francisca Mar{\'i}a Barrientos Camus \\ La resoluci{\'o}n por incumplimiento como medios de tutela anticipatorios del acreedor. Lectura desde los instrumentos de derecho contractual uniforme hacia la compraventa del C{\'o}digo Civil y de Comercio Chileno / Juan Ignacio Contardo Gonz{\'a}lez \\ La compraventa mediante contrato de confecci{\'o}n de obra material / Lilian C. San Mart{\'i}n Neira \\ Bitcoin --- De la Compraventa de Criptodivisas / {\'A}lvaro Espinosa V{\'a}squez", } @InProceedings{Herrera-Joancomarti:2015:RCB, author = "Jordi Herrera-Joancomart{\'\i}", booktitle = "Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance", title = "Research and Challenges on {Bitcoin} Anonymity", publisher = pub-SV, address = pub-SV:adr, pages = "3--16", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-17016-9_1", ISBN = "3-319-17016-3", ISBN-13 = "978-3-319-17016-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-17016-9_1", acknowledgement = ack-nhfb, } @InProceedings{Hileman:2015:BMP, author = "Garrick Hileman", title = "The {Bitcoin} Market Potential Index", crossref = "Brenner:2015:FCD", pages = "92--93", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_7", ISBN = "3-662-48051-4", ISBN-13 = "978-3-662-48051-9", MRclass = "94A60", MRnumber = "3440769", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_7", acknowledgement = ack-nhfb, } @Book{Hollander:2015:BNO, author = "Barbara Gottfried Hollander", title = "{Bitcoins}: navigating open source currency", publisher = "Rosen Publishing", address = "New York, NY, USA", pages = "48", year = "2015", ISBN = "1-4777-7930-2 (library bound), 1-4777-7931-0 (paperback), 1-4777-7932-9 (6pack)", ISBN-13 = "978-1-4777-7930-9 (library bound), 978-1-4777-7931-6 (paperback), 978-1-4777-7932-3 (6pack)", LCCN = "HG221.5 .H65 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/gnu.bib; z3950.loc.gov:7090/Voyager", series = "Digital and information literacy", acknowledgement = ack-nhfb, subject = "Money; Juvenile literature; Tokens; Exchange; Electronic commerce; Virtual reality; Economic aspects", tableofcontents = "Currency of the future \\ Bitcoins in action \\ Got bitcoin? \\ Bitcoin backers \\ Will the bubble burst?", } @Article{Karame:2015:MBS, author = "Ghassan O. Karame and Elli Androulaki and Marc Roeschlin and Arthur Gervais and Srdjan {\v{C}}apkun", title = "Misbehavior in {Bitcoin}: a Study of Double-Spending and Accountability", journal = j-TISSEC, volume = "18", number = "1", pages = "2:1--2:32", month = jun, year = "2015", CODEN = "ATISBQ", DOI = "https://doi.org/10.1145/2732196", ISSN = "1094-9224 (print), 1557-7406 (electronic)", ISSN-L = "1094-9224", bibdate = "Wed Jun 10 08:04:25 MDT 2015", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tissec.bib", abstract = "Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their order of execution are available to all Bitcoin users. Unavoidably, in such a setting, the security of transactions comes at odds with transaction privacy. Motivated by the fact that transaction confirmation in Bitcoin requires tens of minutes, we analyze the conditions for performing successful double-spending attacks against fast payments in Bitcoin, where the time between the exchange of currency and goods is short (in the order of a minute). We show that unless new detection techniques are integrated in the Bitcoin implementation, double-spending attacks on fast payments succeed with considerable probability and can be mounted at low cost. We propose a new and lightweight countermeasure that enables the detection of double-spending attacks in fast transactions. In light of such misbehavior, accountability becomes crucial. We show that in the specific case of Bitcoin, accountability complements privacy. To illustrate this tension, we provide accountability and privacy definition for Bitcoin, and we investigate analytically and empirically the privacy and accountability provisions in Bitcoin.", acknowledgement = ack-nhfb, articleno = "2", fjournal = "ACM Transactions on Information and System Security", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789", } @Book{Kelly:2015:BBB, author = "Brian Kelly", title = "The {Bitcoin} big bang: how alternative currencies are about to change the world", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xv + 224", year = "2015", ISBN = "1-118-96366-0 (hardcover), 1-118-96364-4 (ePDF), 1-118-96365-2 (ePub)", ISBN-13 = "978-1-118-96366-1 (hardcover), 978-1-118-96364-7 (ePDF), 978-1-118-96365-4 (ePub)", LCCN = "HF5548.32 .K447 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1971--", subject = "Electronic commerce; Electronic funds transfers; Money; Exchange; BUSINESS and ECONOMICS / Investments and Securities.", tableofcontents = "Preface / xi \\ Acknowledgments / xiii \\ About the Author / xv \\ Chapter 1 \\ Bitcoin Is a Bubble / 1 \\ The Quest to Buy Bitcoin / 3 \\ Bitcoin Enlightenment / 6 \\ Currencies Are a Matter of Trust / 8 \\ What Is Bitcoin? / 10 \\ Is It a Currency? / 13 \\ It's Revolutionary / / 17 \\ \\ Chapter 2 \\ Understanding the Digital Gold Rush / 19 \\ The Language of Bitcoin / 22 \\ How Do I Buy Bitcoin? / 26 \\ Who ``Gets'' It? / 30 \\ The Gold Rush Is Just Starting / 31 \\ Chapter 3 \\ Bitcoin Is More than Digital Gold / 33 \\ Searching for Satoshi / 34 \\ The Search / 37 \\ Why Is Satoshi a Genius? / 44 \\ Bigger than Satoshi / 46 \\ Chapter 4 \\ Byzantine Generals' Problem / 49 \\ How Does Bitcoin Solve the BGP? / 52 \\ / 51 \\ Percent Attack / 55 \\ An Elegant Solution / 57 \\ Chapter 5 \\ A Decentralized Financial System / 59 \\ Grand De-Central Station / 63 \\ What's at Stake? / 69 \\ Central Banks / 72 \\ Bitcoin Is the Catalyst / 73 \\ Chapter 6 \\ What Do You Call a Bitcoin Miner? A Banker / 75 \\ How Does a Bitcoin Transaction Work? / 77 \\ What Is Cryptography? / 78 \\ Still Want to Be a Miner? / 82 \\ Do We Need Another Bitcoin? / 88 \\ Chapter 7 \\ Nautiluscoin --- 0 to \$1 Million in 60 Days / 91 \\ Creating the Coin / 94 \\ Did It Work? / 104 \\ Chapter 8 \\ Building the Nautiluscoin Economy / 107 \\ Dynamic Proof-of-Stake / 110 \\ Other Policy Tools / 113 \\ Alternative to Gold / 115 \\ Money, Made Better / 116 \\ Financial Market Integration / 117 \\ Special Drawing Rights / 119 \\ Why NAUT? / 119 \\ Chapter 9 \\ Investing and Trading in Alternative Currencies / 121 \\ A New Investment Class / 123 \\ Valuation / 129 \\ Exchanges / 133 \\ Investment Vehicles / 134 \\ Asset Class Growth / 136 \\ Chapter 10 \\ Regulation / 139 \\ Regulatory Agencies / 140 \\ Challenges to Regulation / 147 \\ Pushing on a String / 147 \\ Chapter 11 \\ Smart Money: Set It and Forget It / 149 \\ Rules of the Road / 151 \\ Smart Contracts and Property / 152 \\ Ethereum / 155 \\ Cryptoequities: A New Type of Investment / 160 \\ Decentralized Autonomous Organizations / 161 \\ Professor Money / 162 \\ Chapter 12 \\ Everything You Know about Business Is Wrong / 163 \\ Cryptonomics / 166 \\ Growth Share Matrix / 169 \\ Learning Curve Effects / 171 \\ Porter's Three Generic Strategies / 172 \\ Human Resource Management / 173 \\ Fueling the Sharing Economy / 174 \\ The Future Just Might Work / 176 \\ Appendix 1 \\ Department of the Treasury Financial Crimes Enforcement Network Guidance FIN-20 / 13 \\ -G00 / 1 \\ Issued: March 18, / 2013 \\ Subject: Application of FinCEN's Regulations to Persons Administering, Exchanging, or Using Virtual Currencies / 179 \\ Currency vs. Virtual Currency / 180 \\ Background / 180 \\ Definitions of User, Exchanger, and Administrator / 181 \\ Users of Virtual Currency / 181 \\ Administrators and Exchangers of Virtual Currency / 182 \\ Providers and Sellers of Prepaid Access / 185 \\ Dealers in Foreign Exchange / 186 \\ Appendix 2 \\ New York State Department of Financial Services Proposed New York Codes, Rules and Regulations Title / 23 \\ Department of Financial Services Chapter I \\ Regulations of the Superintendent of Financial Services Part / 200 \\ Virtual Currencies / 187 \\ Section / 200 \\ 1 Introduction / 188 \\ Section / 200 \\ 2 Definitions / 188 \\ Section / 200 \\ 3 License / 190 \\ Section / 200 \\ 4 Application / 191 \\ Section / 200 \\ 5 Application Fees / 193 \\ Section / 200 \\ 6 Action by Superintendent / 193 \\ Section / 200 \\ 7 Compliance / 195 \\ Section / 200 \\ 8 Capital Requirements / 196 \\ Section / 200 \\ 9 Custody and Protection of Customer Assets / 197 \\ Section / 200 \\ 10 Material Change to Business / 197 \\ Section / 200 \\ 11 Change of Control; Mergers and Acquisitions / 198 \\ Section / 200 \\ 12 Books and Records / 200 \\ Section / 200 \\ 13 Examinations / 201 \\ Section / 200 \\ 14 Reports and Financial Disclosures / 202 \\ Section / 200 \\ 15 Anti-Money Laundering Program / 203 \\ Section / 200 \\ 16 Cyber Security Program / 207 \\ Section / 200 \\ 17 Business Continuity and Disaster Recovery / 210 \\ Section / 200 \\ 18 Advertising and Marketing / 211 \\ Section / 200 \\ 19 Consumer Protection / 212 \\ Section / 200 \\ 20 Complaints / 215 \\ Section / 200 \\ 21 Transitional Period / 215 \\ Index / 217", } @Article{Khan:2015:BPM, author = "Akif Khan", title = "{Bitcoin} --- payment method or fraud prevention tool?", journal = "Computer Fraud \& Security", volume = "2015", number = "5", pages = "16--19", day = "8", month = may, year = "2015", CODEN = "????", ISSN = "1361-3723 (print), 1873-7056 (electronic)", ISSN-L = "1361-3723", bibdate = "Fri Dec 1 12:04:29 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1361372315300385", acknowledgement = ack-nhfb, fjournal = "Computer Fraud \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/13613723", } @InProceedings{Kiayias:2015:TDS, author = "Aggelos Kiayias and Qiang Tang", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Traitor Deterring Schemes: Using {Bitcoin} As Collateral for Digital Content", publisher = pub-ACM, address = pub-ACM:adr, pages = "231--242", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813698", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813698", keywords = "Bitcoin, digital rights management, key management, public-key cryptography, self-enforcement", location = "Denver, Colorado, USA", pagecount = "12", } @InProceedings{Kong:2015:PSI, author = "Weize Kong and Rui Li and Jie Luo and Aston Zhang and Yi Chang and James Allan", booktitle = "Proceedings of the 38th International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval", title = "Predicting Search Intent Based on Pre-Search Context", publisher = pub-ACM, address = pub-ACM:adr, pages = "503--512", year = "2015", DOI = "https://doi.org/10.1145/2766462.2767757", ISBN = "1-4503-3621-3", ISBN-13 = "978-1-4503-3621-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SIGIR '15", acknowledgement = ack-nhfb, acmid = "2767757", keywords = "pre-search context, query auto-completion, query prediction, search context, search intent", location = "Santiago, Chile", pagecount = "10", } @Article{Kraft:2015:DCB, author = "Daniel Kraft", title = "Difficulty control for blockchain-based consensus systems", journal = "Peer-to-Peer Networking and Applications", volume = "9", number = "2", pages = "397--413", month = apr, year = "2015", DOI = "https://doi.org/10.1007/s12083-015-0347-x", ISSN = "1936-6442 (print), 1936-6450 (electronic)", ISSN-L = "1936-6442", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/12083", } @InProceedings{Kumaresan:2015:HUB, author = "Ranjit Kumaresan and Tal Moran and Iddo Bentov", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "How to Use {Bitcoin} to Play Decentralized Poker", publisher = pub-ACM, address = pub-ACM:adr, pages = "195--206", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813712", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813712", keywords = "Bitcoin, markets, poker, secure computation, smart contracts", location = "Denver, Colorado, USA", pagecount = "12", } @InProceedings{Laszka:2015:WBM, author = "Aron Laszka and Benjamin Johnson and Jens Grossklags", title = "When {Bitcoin} Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools", crossref = "Brenner:2015:FCD", pages = "63--77", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_5", ISBN = "3-662-48051-4", ISBN-13 = "978-3-662-48051-9", MRclass = "94A60", MRnumber = "3440767", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_5", acknowledgement = ack-nhfb, } @Article{Lazarus:2015:RE, author = "M. Lazarus", title = "Radar everywhere", journal = j-IEEE-SPECTRUM, volume = "52", number = "2", pages = "52--59", month = feb, year = "2015", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2015.7024512", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Aircraft; aircraft detection; app-based ride sharing; Command and control systems; cryptocurrencies; government regulators; History; innovation; innovation management; Military communications; modern industrial society; radar applications; radar speed guns; Radar tracking; technologies-including drones", } @Book{Lee:2015:HDC, editor = "David (David Kuo Chen) Lee", title = "Handbook of digital currency: {Bitcoin}, innovation, financial instruments, and big data", publisher = "Elsevier/ AP", address = "Amsterdam, The Netherlands", pages = "xxiv + 588", year = "2015", ISBN = "0-12-802117-9", ISBN-13 = "978-0-12-802117-0", LCCN = "HG1710 .H32 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Bitcoin; Electronic commerce", } @InProceedings{Lerner:2015:AUQ, author = "Adam Lerner and Alisha Saxena and Kirk Ouimet and Ben Turley and Anthony Vance and Tadayoshi Kohno and Franziska Roesner", booktitle = "Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services", title = "Analyzing the Use of Quick Response Codes in the Wild", publisher = pub-ACM, address = pub-ACM:adr, pages = "359--374", year = "2015", DOI = "https://doi.org/10.1145/2742647.2742650", ISBN = "1-4503-3494-6", ISBN-13 = "978-1-4503-3494-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "MobiSys '15", acknowledgement = ack-nhfb, acmid = "2742650", keywords = "barcodes, empirical studies, mobile computing, mobile malware, qr codes, ubiquitous computing", location = "Florence, Italy", pagecount = "16", } @InProceedings{Lewenberg:2015:BMP, author = "Yoad Lewenberg and Yoram Bachrach and Yonatan Sompolinsky and Aviv Zohar and Jeffrey S. Rosenschein", booktitle = "Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems", title = "{Bitcoin} Mining Pools: A Cooperative Game Theoretic Analysis", publisher = "International Foundation for Autonomous Agents and Multiagent Systems", address = "Richland, SC", pages = "919--927", year = "2015", ISBN = "1-4503-3413-X", ISBN-13 = "978-1-4503-3413-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "AAMAS '15", URL = "http://dl.acm.org/citation.cfm?id=2772879.2773270", acknowledgement = ack-nhfb, acmid = "2773270", keywords = "Bitcoin, cooperative game, game theory, mining pool", location = "Istanbul, Turkey", pagecount = "9", } @Book{Lewis:2015:UPS, author = "Mervyn K. Lewis", title = "Understanding {Ponzi} schemes: can better financial regulation prevent investors from being defrauded?", publisher = "Edward Elgar publishing", address = "Cheltenham, UK", pages = "ix + 190", year = "2015", ISBN = "1-78254-909-9", ISBN-13 = "978-1-78254-909-3", LCCN = "????", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "New horizons in money and finance", acknowledgement = ack-nhfb, tableofcontents = "1. An outline of the book \\ 2. How do Ponzi schemes work? Comparing them to other financial activities \\ 3. Charles Ponzi's scheme re-examined \\ 4. Bernard Madoff and the `mother of all Ponzi schemes' \\ 5. Allen Stanford: the cricketing impresario \\ 6. Five other case studies: from shaking down the FBI to bitcoin fraud \\ 7. Preying on the Amish \\ 8. What can behavioural finance tell us? \\ 9. What would psychologists say? \\ 10. What can be done about Ponzi schemes? \\ 11. Summary and conclusions", } @InProceedings{Lindley:2015:CHD, author = "Joseph Lindley", booktitle = "Proceedings of the 2015 {ACM} {SIGCHI} Conference on Creativity and Cognition", title = "Crypto Heater: A Design Fiction", publisher = pub-ACM, address = pub-ACM:adr, pages = "355--356", year = "2015", DOI = "https://doi.org/10.1145/2757226.2757367", ISBN = "1-4503-3598-5", ISBN-13 = "978-1-4503-3598-0", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "C \& C '15", acknowledgement = ack-nhfb, acmid = "2757367", keywords = "Bitcoin, design fiction, diegetic prototypes", location = "Glasgow, United Kingdom", pagecount = "2", } @InProceedings{Lustig:2015:AAC, author = "C. Lustig and B. Nardi", booktitle = "2015 48th Hawaii International Conference on System Sciences", title = "Algorithmic Authority: The Case of {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "743--752", month = jan, year = "2015", DOI = "https://doi.org/10.1109/HICSS.2015.95", ISSN = "1530-1605", ISSN-L = "1530-1605", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "algorithmic authority; authority; crypto-currency; Cryptocurrency; Cryptography; cryptography; cultural aspects; financial data processing; Government; Heuristic algorithms; Interviews; Online banking; payment platform; Software; Software algorithms; trust; trusted computing; user culture; {Bitcoin}", } @InProceedings{Luu:2015:DIC, author = "Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena", booktitle = "{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}", title = "Demystifying Incentives in the Consensus Computer", publisher = pub-ACM, address = pub-ACM:adr, pages = "706--719", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813659", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", URL = "http://doi.acm.org/10.1145/2810103.2813659", acknowledgement = ack-nhfb, acmid = "2813659", keywords = "Bitcoin, consensus computer, cryptocurrency, Ethereum, incentive compatibility, verifiable computation", location = "Denver, Colorado, USA", pagecount = "14", } @InProceedings{Luu:2015:PSG, author = "L. Luu and R. Saha and I. Parameshwaran and P. Saxena and A. Hobor", booktitle = "2015 {IEEE 28th} Computer Security Foundations Symposium", title = "On Power Splitting Games in Distributed Computation: The Case of {Bitcoin} Pooled Mining", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "397--411", month = jul, year = "2015", DOI = "https://doi.org/10.1109/CSF.2015.34", ISSN = "1063-6900 (print), 2377-5459 (electronic)", ISSN-L = "1063-6900", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Analytical models; attack strategy; bitcoin pooled mining; block withholding attack; competitive distributed computation; Computational modeling; computational power splitting game; Cryptocurrency; cryptographic protocols; Cryptography; data mining; desktop machine; Distributed computation; electronic money; financial reward; game theory; game-theoretic analysis; Games; Internet; mixed strategy; Online banking; pool protocol; Protocols; public pool; {Bitcoin}; {Bitcoin} crypto currency; {Bitcoin} network; {Bitcoin} pool", } @InProceedings{Mann:2015:TFA, author = "Christopher Mann and Daniel Loebenberger", booktitle = "Security and Trust Management", title = "Two-Factor Authentication for the {Bitcoin} Protocol", publisher = pub-SV, address = pub-SV:adr, pages = "155--171", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-24858-5_10", ISBN = "3-319-24858-8", ISBN-13 = "978-3-319-24858-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-24858-5_10", acknowledgement = ack-nhfb, } @InProceedings{Matl:2015:EMM, author = "Lubos Matl and Tomas Cerny and Michael J. Donahoo", booktitle = "Proceedings of the 30th Annual {ACM} Symposium on Applied Computing", title = "Effective Manycast Messaging for {Kademlia} Network", publisher = pub-ACM, address = pub-ACM:adr, pages = "646--652", year = "2015", DOI = "https://doi.org/10.1145/2695664.2695903", ISBN = "1-4503-3196-3", ISBN-13 = "978-1-4503-3196-8", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SAC '15", acknowledgement = ack-nhfb, acmid = "2695903", keywords = "DHT, P2P, communication, distributed systems, key-based search, performance", location = "Salamanca, Spain", pagecount = "7", } @InProceedings{Matta:2015:PIW, author = "M. Matta and I. Lunesu and M. Marchesi", booktitle = "2015 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management {(IC3K)}", title = "The predictor impact of {Web} search media on {Bitcoin} trading volumes", volume = "01", number = "", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "620--626", month = nov, year = "2015", DOI = "", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Correlation; Cross Correlation Analysis; Google; Google Trends; Market research; Media; Online banking; Search engines; Time series analysis; Web Search Media", } @InProceedings{Maxwell:2015:EIO, author = "Deborah Maxwell and Chris Speed and Dug Campbell", booktitle = "{Proceedings of the 2015 British HCI Conference}", title = "`{Effing}' the Ineffable: Opening Up Understandings of the Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "208--209", year = "2015", DOI = "https://doi.org/10.1145/2783446.2783593", ISBN = "1-4503-3643-4", ISBN-13 = "978-1-4503-3643-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "British HCI '15", URL = "http://doi.acm.org/10.1145/2783446.2783593", acknowledgement = ack-nhfb, acmid = "2783593", keywords = "Bitcoin, blockchain, creativity, design, making", location = "Lincoln, Lincolnshire, United Kingdom", pagecount = "2", } @InProceedings{McCorry:2015:AKE, author = "Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao", booktitle = "Security Standardisation Research", title = "Authenticated Key Exchange over {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "3--20", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-27152-1_1", ISBN = "3-319-27152-0", ISBN-13 = "978-3-319-27152-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-27152-1_1", acknowledgement = ack-nhfb, } @InProceedings{Meiklejohn:2015:PEO, author = "Sarah Meiklejohn and Claudio Orlandi", title = "Privacy-Enhancing Overlays in {Bitcoin}", crossref = "Brenner:2015:FCD", pages = "127--141", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_10", ISBN = "3-662-48051-4", ISBN-13 = "978-3-662-48051-9", MRclass = "94A60", MRnumber = "3440772", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_10", acknowledgement = ack-nhfb, } @InProceedings{Melara:2015:CBK, author = "Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman", editor = "{USENIX}", booktitle = "{Proceedings of the 24th Usenix Security Symposium, August 12--14, 2015, Washington, DC, 2015}", title = "{CONIKS}: Bringing key transparency to end users", publisher = pub-USENIX, address = pub-USENIX:adr, pages = "383--398", year = "2015", ISBN = "1-931971-23-4", ISBN-13 = "978-1-931971-23-2", bibdate = "Thu Nov 30 17:32:06 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf", acknowledgement = ack-nhfb, } @InProceedings{Miller:2015:NSP, author = "Andrew Miller and Ahmed Kosba and Jonathan Katz and Elaine Shi", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Nonoutsourceable Scratch-Off Puzzles to Discourage {Bitcoin} Mining Coalitions", publisher = pub-ACM, address = pub-ACM:adr, pages = "680--691", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813621", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813621", keywords = "Bitcoin, puzzles, zero knowledge", location = "Denver, Colorado, USA", pagecount = "12", } @Book{Miller:2015:UGB, author = "Michael Miller", title = "The ultimate guide to {Bitcoin}", publisher = pub-QUE, address = pub-QUE:adr, pages = "xii + 227", year = "2015", ISBN = "0-7897-5324-3 (paperback)", ISBN-13 = "978-0-7897-5324-3 (paperback)", LCCN = "HG221 .M6455 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1958--", subject = "Money; Electronic funds transfers; Electronic commerce; Electronic commerce; Electronic funds transfers; Money", } @Article{Miscione:2015:BBC, author = "Gianluca Miscione and Donncha Kavanagh", title = "{Bitcoin} and the Blockchain: A Coup d'{{\'E}}tat in Digital Heterotopia?", journal = "{SSRN} Electronic Journal", year = "2015", DOI = "https://doi.org/10.2139/ssrn.2624922", ISSN = "1556-5068", bibdate = "Sat Jan 20 16:45:42 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, remark = "Presented at \booktitle{Critical Management Studies Conference, Leicester (2015)}.", } @Book{Montalcini:2015:DTT, author = "Fabio Montalcini and Camillo Sacchetto", title = "Diritto tributario telematico", publisher = "G. Giappichelli Editore", address = "Torino", pages = "xxx + 276", year = "2015", ISBN = "88-348-5539-6", ISBN-13 = "978-88-348-5539-3", LCCN = "KKH3558 .M668 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Tax administration and procedure; Italy; Data processing; Electronic commerce; Taxation; Law and legislation; Electronic funds transfers; Telematics", tableofcontents = "Documento informatico, firme elettroniche e valore probatorio \\ Le firme elettroniche nei principali Paesi europei. La sottoscrizione elettronica in ambito tributario telematico \\ Fattura elettronica \\ Documenti doganali digitali \\ I principi di computer forensics e la prova digitale \\ Il domicilio informatico e l'accesso abusivo a sistema informatico \\ Privacy e accertamenti bancari \\ Stabile organizzazione ed e-commerce. Il peer to peer \\ Diritto Tributario Telematico e il ``Bitcoin'' \\ Diritto Tributario Telematico e il Crowdfunding \\ Posta Elettronica Certificata. Elementi essenziali e definizione \\ Posta Elettronica Certificata e notifica della cartella di pagamento \\ Il Processo Tributario Telematico \\ Appendice. Diagrammi applicativi Processo Tributario Telematico \\ Glossario tecnico-informatico e privacy", } @InProceedings{Moser:2015:TTT, author = "Malte M{\"o}ser and Rainer B{\"o}hme", title = "Trends, Tips, Tolls: A Longitudinal Study of {Bitcoin} Transaction Fees", crossref = "Brenner:2015:FCD", pages = "19--33", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_2", ISBN = "3-662-48051-4", ISBN-13 = "978-3-662-48051-9", MRclass = "94A60", MRnumber = "3440764", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_2; http://ssrn.com/abstract=2530843", ZMnumber = "06480534", acknowledgement = ack-nhfb, } @InProceedings{MR3678694, author = "Kaylash Chaudhary and Ansgar Fehnker and Jaco van de Pol and Marielle Stoelinga", booktitle = "Proceedings {Workshop} on {Models} for {Formal} {Analysis} of {Real} {Systems}", title = "Modeling and verification of the {Bitcoin} protocol", volume = "196", publisher = "EPTCS, [place of publication not identified]", pages = "46--60", year = "2015", MRclass = "68Q60", MRnumber = "3678694", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Electron. Proc. Theor. Comput. Sci. (EPTCS)", acknowledgement = ack-nhfb, } @InProceedings{Neudecker:2015:SMA, author = "T. Neudecker and P. Andelfinger and H. Hartenstein", booktitle = "{2015 IFIP\slash IEEE International Symposium on Integrated Network Management (IM)}", title = "A simulation model for analysis of attacks on the {Bitcoin} peer-to-peer network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1327--1332", month = may, year = "2015", DOI = "https://doi.org/10.1109/INM.2015.7140490", ISSN = "1573-0077", ISSN-L = "1573-0077", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Analytical models; attacking nodes; attacks analysis; bitcoin peer-to-peer network; bitcoin reference implementation; Computational modeling; computer network security; core segments; distributed electronic currency system; electronic money; IP networks; message propagation; Message systems; Network topology; Online banking; peer-to-peer computing; Peer-to-peer computing; simulation model; unmodified code", } @InProceedings{Norta:2015:CRL, author = "Alex Norta and Anis Ben Othman and Kuldar Taveter", booktitle = "{Proceedings of the 2015 2Nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia}", title = "Conflict-Resolution Lifecycles for Governed Decentralized Autonomous Organization Collaboration", publisher = pub-ACM, address = pub-ACM:adr, pages = "244--257", year = "2015", DOI = "https://doi.org/10.1145/2846012.2846052", ISBN = "1-4503-4070-9", ISBN-13 = "978-1-4503-4070-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "EGOSE '15", URL = "http://doi.acm.org/10.1145/2846012.2846052", acknowledgement = ack-nhfb, acmid = "2846052", keywords = "business process; conflict resolution; Decentralized autonomous organization; e-governance; Industry 4.0; open cloud ecosystem; service orientation; smart contract", location = "St. Petersburg, Russian Federation", pagecount = "14", } @InProceedings{Pass:2015:MDC, author = "Rafael Pass and abhi shelat", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Micropayments for Decentralized Currencies", publisher = pub-ACM, address = pub-ACM:adr, pages = "207--218", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813713", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813713", keywords = "crypto-currency, micropayments", location = "Denver, Colorado, USA", pagecount = "12", } @Article{Peck:2015:BNG, author = "M. E. Peck", title = "{Bitcoin} needs to get its act together [News]", journal = j-IEEE-SPECTRUM, volume = "52", number = "11", pages = "9--11", month = nov, year = "2015", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2015.7335883", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "banks; bitcoin; financial data processing; governments; payment processors; peer-to-peer computing", } @Article{Polasik:2015:PFU, author = "Michal Polasik and Anna Iwona Piotrowska and Tomasz Piotr Wisniewski and Radoslaw Kotkowski and Geoffrey Lightfoot", title = "Price Fluctuations and the Use of Bitcoin: an Empirical Inquiry", journal = "Int. J. Electron. Commer.", volume = "20", number = "1", pages = "9--49", month = "????", year = "2015", CODEN = "????", DOI = "https://doi.org/10.1080/10864415.2016.1061413", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijecommerce/ijecommerce20.html#PolasikPWKL15; https://www.wikidata.org/entity/Q111689225", acknowledgement = ack-nhfb, dblp-key = "journals/ijecommerce/PolasikPWKL15", dblp-mdate = "2022-10-02", } @Book{Popper:2015:DGB, author = "Nathaniel Popper", title = "Digital gold: {Bitcoin} and the inside story of the misfits and millionaires trying to reinvent money", publisher = "Harper", address = "New York, NY", pages = "xv + 398", year = "2015", ISBN = "0-06-236249-6 (hardcover)", ISBN-13 = "978-0-06-236249-0 (hardcover)", LCCN = "HG1710 .P68 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "``A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.Digital Gold is New York Times reporter Nathaniel Popper's brilliant and engrossing history of Bitcoin, the landmark digital money and financial technology that has spawned a global social movement.The notion of a new currency, maintained by the computers of users around the world, has been the butt of many jokes, but that has not stopped it from growing into a technology worth billions of dollars, supported by the hordes of followers who have come to view it as the most important new idea since the creation of the Internet. Believers from Beijing to Buenos Aires see the potential for a financial system free from banks and governments. More than just a tech industry fad, Bitcoin has threatened to decentralize some of society's most basic institutions.An unusual tale of group invention, Digital Gold charts the rise of the Bitcoin technology through the eyes of the movement's colorful central characters, including a British anarchist, an Argentinian millionaire, a Chinese entrepreneur, Tyler and Cameron Winklevoss, and Bitcoin's elusive creator, Satoshi Nakamoto. Already, Bitcoin has led to untold riches for some, and prison terms for others.Digital Gold includes 16 pages of black-and-white photos''", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Money; Credit; Electronic commerce; BUSINESS and ECONOMICS / E-Commerce / General (see also COMPUTERS / Electronic Commerce); BUSINESS and ECONOMICS / Corporate and Business History; HISTORY / Modern / 21st Century.", } @InProceedings{Rajput:2015:SYE, author = "Ubaidullah Rajput and Fizza Abbas and Rasheed Hussain and Hasoo Eun and Heekuck Oh", booktitle = "Information Security Applications", title = "A Simple Yet Efficient Approach to Combat Transaction Malleability in {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "27--37", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-15087-1_3", ISBN = "3-319-15087-1", ISBN-13 = "978-3-319-15087-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-15087-1_3", acknowledgement = ack-nhfb, } @Article{Ramachandran:2015:BMT, author = "Hari Krishnan Ramachandran and Sai Saketh and Marichetty Venkata Teja Vaibhav", title = "Bitcoin Mining: Transition to Cloud", journal = "Int. J. Cloud Appl. Comput.", volume = "5", number = "4", pages = "56--87", month = "????", year = "2015", CODEN = "????", DOI = "https://doi.org/10.4018/IJCAC.2015100104", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijcac/ijcac5.html#RamachandranSV15", acknowledgement = ack-nhfb, dblp-key = "journals/ijcac/RamachandranSV15", dblp-mdate = "2020-03-31", } @InProceedings{Ruffing:2015:LLC, author = "Tim Ruffing and Aniket Kate and Dominique Schr{\"o}der", booktitle = "Proceedings of the {22Nd} {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of {Bitcoins}", publisher = pub-ACM, address = pub-ACM:adr, pages = "219--230", year = "2015", DOI = "https://doi.org/10.1145/2810103.2813686", ISBN = "1-4503-3832-1", ISBN-13 = "978-1-4503-3832-5", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '15", acknowledgement = ack-nhfb, acmid = "2813686", keywords = "accountability, append-only logs, Bitcoin, crypto-currencies, double-spending, equivocation, payment channels", location = "Denver, Colorado, USA", pagecount = "12", } @InProceedings{Sas:2015:ETB, author = "Corina Sas and Irni Eliana Khairuddin", booktitle = "Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction", title = "Exploring Trust in {Bitcoin} Technology: A Framework for {HCI} Research", publisher = pub-ACM, address = pub-ACM:adr, pages = "338--342", year = "2015", DOI = "https://doi.org/10.1145/2838739.2838821", ISBN = "1-4503-3673-6", ISBN-13 = "978-1-4503-3673-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "OzCHI '15", acknowledgement = ack-nhfb, acmid = "2838821", keywords = "Bitcoin technology, trust", location = "Parkville, VIC, Australia", pagecount = "5", } @InProceedings{Sleiman:2015:BMD, author = "M. D. Sleiman and A. P. Lauf and R. Yampolskiy", booktitle = "2015 International Conference on Cyberworlds {(CW)}", title = "{Bitcoin} Message: Data Insertion on a Proof-of-Work Cryptocurrency System", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "332--336", month = oct, year = "2015", DOI = "https://doi.org/10.1109/CW.2015.56", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "arithmetic coding; C++; Computers; Cryptography; cryptography; data insertion; Decoding; electronic money; Encoding; financial management; Internet; message; Online banking; open source; Peer-to-peer computing; proof-of-work cryptocurrency system; {Bitcoin}; {Bitcoin} block chain; {Bitcoin} currency; {Bitcoin} message; {Bitcoin}-Qt v0.7.2 application", } @InProceedings{Sompolinsky:2015:SHR, author = "Yonatan Sompolinsky and Aviv Zohar", title = "Secure High-Rate Transaction Processing in {Bitcoin}", crossref = "Brenner:2015:FCD", pages = "507--527", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-47854-7_32", ISBN = "3-662-47854-4", ISBN-13 = "978-3-662-47854-7", MRclass = "94A60", MRnumber = "3395041", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-47854-7_32", acknowledgement = ack-nhfb, } @Book{Swan:2015:BBNa, author = "Melanie Swan", title = "{Bitcoin}: A Blueprint for a New World Currency", publisher = pub-ORA, address = pub-ORA:adr, pages = "120", year = "2015", ISBN = "1-4919-2049-1", ISBN-13 = "978-1-4919-2049-7", LCCN = "????", bibdate = "Sat Feb 28 11:36:04 MST 2015", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ora.bib", URL = "http://deposit.d-nb.de/cgi-bin/dokserv?id=5125084&prov=M&dok_var=1&dok_ext=htm", acknowledgement = ack-nhfb, } @Book{Swan:2015:BBNb, author = "Melanie Swan", title = "{Blockchain}: blueprint for a new economy", publisher = pub-ORA-MEDIA, address = pub-ORA-MEDIA:adr, pages = "xviii + 130", year = "2015", ISBN = "1-4919-2049-1, 1-4919-2045-9 (e-book), 1-4919-2047-5 (e-book)", ISBN-13 = "978-1-4919-2049-7, 978-1-4919-2045-9 (e-book), 978-1-4919-2047-3 (e-book)", LCCN = "HG1710 .S93 2015", bibdate = "Sat Feb 28 11:36:04 MST 2015", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ora.bib", URL = "http://proquest.safaribooksonline.com/?fpi=9781491920480", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Security measures; Data encryption (Computer science); Electronic commerce", } @Article{Timme:2015:FNE, author = "Marc Timme and Ljupco Kocarev and Dirk Witthaut", title = "Focus on networks, energy and the economy", journal = j-NEW-J-PHYS, volume = "17", number = "11", pages = "110201", month = nov, year = "2015", CODEN = "NJOPFM", DOI = "https://doi.org/10.1088/1367-2630/17/11/110201", ISSN = "1367-2630", bibdate = "Mon Dec 4 11:59:45 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "New Journal of Physics", journal-URL = "http://iopscience.iop.org/1367-2630", keywords = "Bitcoin", } @Misc{Tromp:2015:BHP, author = "John Tromp", title = "Beyond the {Hashcash} Proof-of-Work (there's more to mining than hashing)", howpublished = "Web blog", day = "7", month = sep, year = "2015", bibdate = "Mon Jan 22 07:26:14 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://cryptorials.io/beyond-hashcash-proof-work-theres-mining-hashing/", acknowledgement = ack-nhfb, } @TechReport{Tromp:2015:CCMb, author = "John Tromp", title = "Cuckoo Cycle: a memory bound graph-theoretic proof-of-work", type = "Report", institution = "????", address = "????", pages = "13", day = "24", month = jul, year = "2015", bibdate = "Mon Jan 22 07:27:21 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://github.com/tromp/cuckoo/blob/master/doc/cuckoo.pdf?raw=true", abstract = "We introduce the first graph-theoretic proof-of-work system, based on finding small cycles or other structures in large random graphs. Such problems are trivially verifiable and arbitrarily scalable, presumably requiring memory linear in graph size to solve efficiently. Our cycle finding algorithm uses one bit per edge, and up to one bit per node. Runtime is linear in graph size and dominated by random access latency, ideal properties for a memory bound proof-of-work. We exhibit two alternative algorithms that allow for a memory-time trade-off (TMTO)-decreased memory usage, by a factor $k$, coupled with increased runtime, by a factor $ \Omega (k)$. The constant implied in $ \Omega ()$ gives a notion of memory-hardness, which is shown to be dependent on cycle length, guiding the latter's choice. Our algorithms are shown to parallelize reasonably well.", acknowledgement = ack-nhfb, } @InProceedings{Valenta:2015:BBA, author = "Luke Valenta and Brendan Rowan", title = "{Blindcoin}: Blinded, Accountable Mixes for {Bitcoin}", crossref = "Brenner:2015:FCD", pages = "112--126", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_9", ISBN = "3-662-48051-4", ISBN-13 = "978-3-662-48051-9", MRclass = "94A60", MRnumber = "3440771", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_9", acknowledgement = ack-nhfb, } @InProceedings{Vandervort:2015:IDB, author = "David Vandervort and Dale Gaucas and Robert St Jacques", title = "Issues in Designing a {Bitcoin}-like Community Currency", crossref = "Brenner:2015:FCD", pages = "78--91", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9_6", ISBN = "3-662-48051-4", ISBN-13 = "978-3-662-48051-9", MRclass = "94A60", MRnumber = "3440768", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-48051-9_6", acknowledgement = ack-nhfb, } @Article{VanRenesse:2015:PMM, author = "Robbert {Van Renesse} and Deniz Altinbuken", title = "{Paxos} Made Moderately Complex", journal = j-COMP-SURV, volume = "47", number = "3", pages = "42:1--42:36", month = apr, year = "2015", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/2673577", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Thu Apr 16 18:47:49 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", abstract = "This article explains the full reconfigurable multidecree Paxos (or multi-Paxos) protocol. Paxos is by no means a simple protocol, even though it is based on relatively simple invariants. We provide pseudocode and explain it guided by invariants. We initially avoid optimizations that complicate comprehension. Next we discuss liveness, list various optimizations that make the protocol practical, and present variants of the protocol.", acknowledgement = ack-nhfb, articleno = "42", fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @InProceedings{Vasek:2015:TNF, author = "Marie Vasek and Tyler Moore", title = "There's No Free Lunch, Even Using {Bitcoin}: Tracking the Popularity and Profits of Virtual Currency Scams", crossref = "Brenner:2015:FCD", pages = "44--61", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-47854-7_4", ISBN = "3-662-47854-4", ISBN-13 = "978-3-662-47854-7", MRclass = "94A60", MRnumber = "3395013", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-47854-7_4", acknowledgement = ack-nhfb, } @Book{Vigna:2015:ACH, author = "Paul Vigna and Michael J. Casey", title = "The age of cryptocurrency: how {Bitcoin} and digital money are challenging the global economic order", publisher = pub-ST-MARTINS, address = pub-ST-MARTINS:adr, pages = "357", year = "2015", ISBN = "1-250-06563-1 (hardcover), 1-4668-7306-X (e-book)", ISBN-13 = "978-1-250-06563-6 (hardcover), 978-1-4668-7306-3 (e-book)", LCCN = "HF5548.32 .V54 2015", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "Bitcoin became a buzzword overnight. A cyber-enigma with an enthusiastic following, it pops up in headlines and fuels endless media debate. You can apparently use it to buy anything from coffee to cars, yet few people seem to truly understand what it is. This raises the question: Why should anyone care about bitcoin? In \booktitle{The Age of Cryptocurrency}, Wall Street journalists Paul Vigna and Michael J. Casey deliver the definitive answer to this question. Cybermoney is poised to launch a revolution, one that could reinvent traditional financial and social structures while bringing the world's billions of ''unbanked`` individuals into a new global economy. Cryptocurrency holds the promise of a financial system without a middleman, one owned by the people who use it and one safeguarded from the devastation of a 2008-type crash. But Bitcoin, the most famous of the cybermonies, carries a reputation for instability, wild fluctuation, and illicit business; some fear it has the power to eliminate jobs and to upend the concept of a nation-state. It implies, above all, monumental and wide-reaching change--for better and for worse. But it is here to stay, and you ignore it at your peril.Vigna and Casey demystify cryptocurrency--its origins, its function, and what you need to know to navigate a cyber-economy. The digital currency world will look very different from the paper currency world; \booktitle{The Age of Cryptocurrency} will teach you how to be ready.", acknowledgement = ack-nhfb, subject = "Electronic commerce; Electronic funds transfers; Currency question; BUSINESS and ECONOMICS / E-Commerce / Internet Marketing.", } @Article{Vigna:2015:BCT, author = "Paul Vigna", title = "{BitBeat}: {CoinDesk} Trims Down But {Bitcoin} Rises at {SXSW}", journal = j-WALL-ST-J, volume = "??", number = "??", pages = "??--??", day = "17", month = mar, year = "2015", CODEN = "WSJOAF", ISSN = "0099-9660", bibdate = "Mon Dec 04 15:16:17 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Wall Street Journal", } @Book{Vigna:2015:CHB, author = "Paul Vigna and Michael J. Casey", title = "Cryptocurrency: how {Bitcoin} and digital money are challenging the global economic order", publisher = "The Bodley Head", address = "London, UK", pages = "357", year = "2015", ISBN = "1-84792-344-5 (hardcover)", ISBN-13 = "978-1-84792-344-8 (hardcover), 978-1-4735-2115-5 (ePub ebook)", LCCN = "HF5548.32 .V54 2015b", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Electronic commerce; Electronic funds transfers; Currency question", } @InProceedings{Wang:2015:EME, author = "Luqin Wang and Yong Liu", booktitle = "Passive and Active Measurement", title = "Exploring Miner Evolution in {Bitcoin} Network", publisher = pub-SV, address = pub-SV:adr, pages = "290--302", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-15509-8_22", ISBN = "3-319-15509-1", ISBN-13 = "978-3-319-15509-8", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-15509-8_22", acknowledgement = ack-nhfb, } @Article{Watkins:2015:UNT, author = "Lanier Watkins and William H. Robinson and Raheem Beyah", title = "Using Network Traffic to Infer Hardware State: a Kernel-Level Investigation", journal = j-TECS, volume = "14", number = "3", pages = "55:1--55:??", month = may, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2700094", ISSN = "1539-9087 (print), 1558-3465 (electronic)", ISSN-L = "1539-9087", bibdate = "Sat Dec 9 08:08:56 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tecs.bib", abstract = "In this article, we illustrate that the boundary of a general-purpose node can be extended into the network by extracting information from network traffic generated by that general-purpose node to infer the state of its hardware components. This information is represented in a delay signature latent within the network traffic. In contrast, the traditional approach to determine the internal state of a node's resources meant that a software application with internal processes had to be resident on the node. The aforementioned delay signature is the keystone that provides a correlation between network traffic and the internal state of the source node. We characterize this delay signature by (1) identifying the different types of assembly language instructions that source this delay and (2) describing how architectural techniques, such as instruction pipelining and caching, give rise to this delay signature. In theory, highly utilized nodes (due to multiple threads) will contain excessive context switching and contention for shared resources. One important shared resource is main memory, and excessive use of this resource by applications and internal processes eventually leads to a decrease in cache efficiency that eventually stalls the instruction pipeline. Our results support this theory; specifically, we have observed that excessive context switching in active applications increases the effective memory access time and wastes precious CPU cycles, thus adding additional delay to the execution of load, store, and other instructions. Because the operating system (OS) kernel accesses memory to send network packets, the delay signature is induced into network traffic in situations where user-level utilization is high. We demonstrate this theory in two case studies: (1) resource discovery in cluster grids and (2) network-based detection of bitcoin mining on compromised nodes.", acknowledgement = ack-nhfb, acmid = "2700094", articleno = "55", fjournal = "ACM Transactions on Embedded Computing Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J840", keywords = "LEON4 processor, clusters assembly language instructions, grid computing, passive resource discovery", pagecount = "22", } @Article{Wilson:2015:PGGa, author = "Duane Wilson and Giuseppe Ateniese", title = "From Pretty Good To Great: Enhancing {PGP} using Bitcoin and the Blockchain", journal = "CoRR", volume = "abs/1508.04868", number = "??", pages = "??--??", month = "????", year = "2015", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1508.04868; https://dblp.org/db/journals/corr/corr1508.html#WilsonA15", acknowledgement = ack-nhfb, dblp-key = "journals/corr/WilsonA15", dblp-mdate = "2018-08-13", } @InCollection{Wilson:2015:PGGb, author = "Duane Wilson and Giuseppe Ateniese", booktitle = "Network and System Security", title = "From Pretty Good to Great: Enhancing {PGP} Using {Bitcoin} and the Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "368--375", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-25645-0_25", ISBN = "3-319-25645-9", ISBN-13 = "978-3-319-25645-0", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-25645-0_25", acknowledgement = ack-nhfb, } @InProceedings{Yang:2015:BMR, author = "S. Y. Yang and J. Kim", booktitle = "2015 {IEEE} Symposium Series on Computational Intelligence", title = "{Bitcoin} Market Return and Volatility Forecasting Using Transaction Network Flow Properties", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1778--1785", month = dec, year = "2015", DOI = "https://doi.org/10.1109/SSCI.2015.248", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "bit coin market volatility; bit coin transaction flow networks; bitcoin market return; Complexity theory; comprehensive bit coin transaction dataset; computational complexity; cryptography; economic forecasting; Economics; electronic commerce; foreign exchange trading; network theory; network theory (graphs); Online banking; Peer-to-peer computing; price movement; pricing; secure electronic payment system; Time measurement; transaction network flow property; volatility forecasting; Weight measurement", } @Misc{Yeow:2015:GBN, author = "Andy Yeow", title = "Global {Bitcoin} Nodes Distribution", howpublished = "Web document", year = "2015", bibdate = "Mon Dec 04 07:32:06 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://getaddr.bitnodes.io/", acknowledgement = ack-nhfb, lastaccessed = "20 March 2015", } @InProceedings{Zhang:2015:IEB, author = "Y. Zhang and J. Wen", booktitle = "2015 18th International Conference on Intelligence in Next Generation Networks", title = "An {IoT} electric business model based on the protocol of {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "184--191", month = feb, year = "2015", DOI = "https://doi.org/10.1109/ICIN.2015.7073830", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; bitcoin protocol; Blockchain; Companies; contracts; Cryptography; Data models; e-business activities; E-business model; electronic commerce; electronic money; Internet; Internet of Things; Internet of things; IoT electric business model; P2P trade; paid data; peer-to-peer computing; Proposals; Protocols; smart contract; smart property", } @InProceedings{Zhao:2015:GBI, author = "Chen Zhao and Yong Guan", booktitle = "Advances in Digital Forensics {XI}", title = "A Graph-Based Investigation of {Bitcoin} Transactions", publisher = pub-SV, address = pub-SV:adr, pages = "79--95", year = "2015", DOI = "https://doi.org/10.1007/978-3-319-24123-4_5", ISBN = "3-319-24123-0", ISBN-13 = "978-3-319-24123-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-24123-4_5", acknowledgement = ack-nhfb, } @InProceedings{Ziegeldorf:2015:CSM, author = "Jan Henrik Ziegeldorf and Fred Grossmann and Martin Henze and Nicolas Inden and Klaus Wehrle", booktitle = "{Proceedings of the 5th ACM Conference on Data and Application Security and Privacy}", title = "{CoinParty}: Secure Multi-Party Mixing of {Bitcoins}", publisher = pub-ACM, address = pub-ACM:adr, pages = "75--86", year = "2015", DOI = "https://doi.org/10.1145/2699026.2699100", ISBN = "1-4503-3191-2", ISBN-13 = "978-1-4503-3191-3", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CODASPY '15", URL = "http://doi.acm.org/10.1145/2699026.2699100", acknowledgement = ack-nhfb, acmid = "2699100", keywords = "anonymity, Bitcoin, secure multi-party computation", location = "San Antonio, Texas, USA", pagecount = "12", } @Article{Zohar:2015:BUH, author = "Aviv Zohar", title = "{Bitcoin}: under the hood", journal = j-CACM, volume = "58", number = "9", pages = "104--113", month = sep, year = "2015", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2701411", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Aug 27 19:08:25 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "http://cacm.acm.org/magazines/2015/9/191170/fulltext", abstract = "The myths, the hype, and the true worth of bitcoins.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @InProceedings{Allan:2016:ASC, author = "Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom", booktitle = "Proceedings of the {32Nd} Annual Conference on Computer Security Applications", title = "Amplifying Side Channels Through Performance Degradation", publisher = pub-ACM, address = pub-ACM:adr, pages = "422--435", year = "2016", DOI = "https://doi.org/10.1145/2991079.2991084", ISBN = "1-4503-4771-1", ISBN-13 = "978-1-4503-4771-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ACSAC '16", acknowledgement = ack-nhfb, acmid = "2991084", location = "Los Angeles, California, USA", pagecount = "14", } @Book{Amato:2016:PPB, author = "Massimo Amato and Luca Fantacci", title = "Per un pugno di {Bitcoin}: rischi e opportunit{\`a} delle monete virtuali. ({Italian}) [{For} a handful of {Bitcoins}: risks and opportunities of virtual currency]", publisher = "Egea, Universit{\`a} Bocconi editore", address = "Milano, Italy", pages = "viii + 190", year = "2016", ISBN = "88-8350-229-9", ISBN-13 = "978-88-8350-229-3", LCCN = "HG1710 .P47 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", price = "16.50 EUR", series = "Itinerari", URL = "http://www.loc.gov/catdir/toc/casalini15/3022729.pdf", acknowledgement = ack-nhfb, language = "Italian", subject = "Electronic funds transfers; Bitcoin", } @InProceedings{Amin:2016:SFL, author = "Maitri Amin", booktitle = "Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies", title = "A Survey of Financial Losses Due to Malware", publisher = pub-ACM, address = pub-ACM:adr, pages = "145:1--145:4", year = "2016", DOI = "https://doi.org/10.1145/2905055.2905362", ISBN = "1-4503-3962-X", ISBN-13 = "978-1-4503-3962-9", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICTCS '16", acknowledgement = ack-nhfb, acmid = "2905362", articleno = "145", keywords = "API, Malware, Survey, financial losses", location = "Udaipur, India", pagecount = "4", } @InProceedings{Anceaume:2016:SAB, author = "E. Anceaume and T. Lajoie-Mazenc and R. Ludinard and B. Sericola", booktitle = "2016 {IEEE 15th} International Symposium on Network Computing and Applications {(NCA)}", title = "Safety analysis of {Bitcoin} improvement proposals", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "318--325", month = oct, year = "2016", DOI = "https://doi.org/10.1109/NCA.2016.7778636", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Analytical Performance Evaluation; bitcoin actors; bitcoin improvement proposals; blockchain forks; blockchain-based protocols; cryptographic protocols; cryptography; Cryptography; decentralized cryptocurrency systems; double spending attacks; Ecosystems; electronic money; miners; Online banking; Peer-to-peer computing; Peer-to-Peer Systems; probabilistic analysis; probability; Protocols; public distributed ledger; Safety; safety analysis; transient inconsistencies; {Bitcoin}", } @Article{Andrychowicz:2016:SMC, author = "Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and {\L}ukasz Mazurek", title = "Secure multiparty computations on {Bitcoin}", journal = j-CACM, volume = "59", number = "4", pages = "76--84", month = apr, year = "2016", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2896386", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Apr 15 14:58:10 MDT 2016", bibsource = "http://www.acm.org/pubs/contents/journals/cacm/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://cacm.acm.org/magazines/2016/4/200175/fulltext", abstract = "Is it possible to design an online protocol for playing a lottery, in a completely decentralized way, that is, without relying on a trusted third party? Or can one construct a fully decentralized protocol for selling secret information, so that neither the seller nor the buyer can cheat in it? Until recently, it seemed that every online protocol that has financial consequences for the participants needs to rely on some sort of a trusted server that ensures that the money is transferred between them. In this work, we propose to use Bitcoin (a digital currency, introduced in 2008) to design such fully decentralized protocols that are secure even if no trusted third party is available. As an instantiation of this idea, we construct protocols for secure multiparty lotteries using the Bitcoin currency, without relying on a trusted authority. Our protocols guarantee fairness for the honest parties no matter how the loser behaves. For example, if one party interrupts the protocol, then her money is transferred to the honest participants. Our protocols are practical (to demonstrate it, we performed their transactions in the actual Bitcoin system) and in principle could be used in real life as a replacement for the online gambling sites.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Anonymous:2016:BDS, author = "Anonymous", title = "The blockchain has a dark side [News]", journal = j-IEEE-SPECTRUM, volume = "53", number = "6", pages = "12--13", month = jun, year = "2016", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2016.7473136", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Article{Anonymous:2016:BRBa, author = "Anonymous", title = "Book Review: {{\booktitle{Bitcoin and Cryptocurrency Technologies}}, Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder}", journal = j-NETWORK-SECURITY, volume = "2016", number = "8", pages = "4--4", month = aug, year = "2016", CODEN = "NTSCF5", DOI = "https://doi.org/10.1016/S1353-4858(16)30074-5", ISSN = "1353-4858 (print), 1872-9371 (electronic)", ISSN-L = "1353-4858", bibdate = "Mon Dec 4 17:01:35 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/network-security.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1353485816300745", acknowledgement = ack-nhfb, fjournal = "Network Security", journal-URL = "https://www.sciencedirect.com/journal/network-security", } @Article{Anonymous:2016:BRG, author = "Anonymous", title = "{Blockchain und Recht}. ({German}) [{Blockchain} and law]", journal = j-INFORMATIK-SPEKTRUM, volume = "39", number = "5", pages = "402--410", month = aug, year = "2016", CODEN = "INSKDW", DOI = "https://doi.org/10.1007/s00287-016-0991-4", ISSN = "0170-6012 (print), 1432-122X (electronic)", ISSN-L = "0170-6012", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s00287-016-0991-4", acknowledgement = ack-nhfb, fjournal = "Informatik Spektrum", journal-URL = "http://link.springer.com/journal/287", language = "German", } @Book{Antonia:2016:BD, author = "Cameron Antonia", title = "{Bitcoin} for dummies", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "????", year = "2016", ISBN = "1-119-07613-7 (paperback)", ISBN-13 = "978-1-119-07613-1 (paperback)", LCCN = "????", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, } @Article{Aste:2016:FCB, author = "Tomaso Aste", title = "The Fair Cost of {Bitcoin} Proof of Work", journal = "{SSRN} Electronic Journal", pages = "??--??", day = "27", month = jun, year = "2016", DOI = "https://doi.org/10.2139/ssrn.2801048", ISSN = "1556-5068", bibdate = "Sat Jan 20 16:42:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, pagecount = "3", } @InProceedings{Azriel:2016:USS, author = "Leonid Azriel and Ran Ginosar and Shay Gueron and Avi Mendelson", booktitle = "Proceedings of the Hardware and Architectural Support for Security and Privacy 2016", title = "Using Scan Side Channel for Detecting {IP} Theft", publisher = pub-ACM, address = pub-ACM:adr, pages = "1:1--1:8", year = "2016", DOI = "https://doi.org/10.1145/2948618.2948619", ISBN = "1-4503-4769-X", ISBN-13 = "978-1-4503-4769-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "HASP 2016", acknowledgement = ack-nhfb, acmid = "2948619", articleno = "1", location = "Seoul, Republic of Korea", pagecount = "8", } @InProceedings{Bag:2016:YAN, author = "Samiran Bag and Kouichi Sakurai", booktitle = "Information Security", title = "Yet Another Note on Block Withholding Attack on {Bitcoin} Mining Pools", publisher = pub-SV, address = pub-SV:adr, pages = "167--180", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-45871-7_11", ISBN = "3-319-45871-X", ISBN-13 = "978-3-319-45871-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-45871-7_11", acknowledgement = ack-nhfb, } @InProceedings{Baqer:2016:SBS, author = "Khaled Baqer and Danny Yuxing Huang and Damon McCoy and Nicholas Weaver", title = "Stressing Out: {Bitcoin} Stress Testing", crossref = "Clark:2016:FCD", pages = "3--18", year = "2016", DOI = "https://doi.org/10.1007/978-3-662-53357-4_1", ISBN = "3-662-53357-X", ISBN-13 = "978-3-662-53357-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-53357-4_1", acknowledgement = ack-nhfb, } @MastersThesis{Bargar:2016:EBS, author = "Dylan Bargar", title = "The economics of the blockchain: a study of its engineering and transaction services marketplace", type = "{M.A.}", school = "Clemson University", address = "Clemson, SC, USA", pages = "49", year = "2016", ISBN = "1-339-80505-7", ISBN-13 = "978-1-339-80505-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1805168683", abstract = "The purpose of this document is to discuss the origins, developments, and economic issues of blockchain technology as well as the industry opportunities presented by different forms of distributed ledger systems. The engineering of digital currencies' blockchains are presented beginning with bitcoin and its blockchain. Afterwards, specific areas of contention within the engineering innovations and their interaction with the economics of blockchain transaction services with respect to the consensus process are discussed. Finally, industry opportunities are presented and specific organizations' applications are described.", acknowledgement = ack-nhfb, advisor = "Gerald Dwyer", keywords = "0501:Economics; Bitcoin; Blockchain; Economics; Ethereum; Social sciences; Transaction services", ris-m1 = "10119255", } @InProceedings{Bashir:2016:WMP, author = "Masooda Bashir and Beth Strickland and Jeremiah Bohr", booktitle = "Social Informatics", title = "What Motivates People to Use {Bitcoin}?", publisher = pub-SV, address = pub-SV:adr, pages = "347--367", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-47874-6_25", ISBN = "3-319-47874-5", ISBN-13 = "978-3-319-47874-6", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-47874-6_25", acknowledgement = ack-nhfb, } @Article{Beekman:2016:DSA, author = "Jethro G. Beekman", title = "A {Denial of Service} attack against fair computations using {Bitcoin} deposits", journal = j-INFO-PROC-LETT, volume = "116", number = "2", pages = "144--146", month = feb, year = "2016", CODEN = "IFPLAT", DOI = "https://doi.org/10.1016/j.ipl.2015.09.009", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60", MRnumber = "3426462", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0020019015001647", ZMnumber = "06515013; 1346.94091", acknowledgement = ack-nhfb, fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", } @InProceedings{Bhargavan:2016:FVS, author = "Karthikeyan Bhargavan and Antoine Delignat-Lavaud and C{\'e}dric Fournet and Anitha Gollamudi and Georges Gonthier and Nadim Kobeissi and Natalia Kulatova and Aseem Rastogi and Thomas Sibut-Pinote and Nikhil Swamy and Santiago Zanella-B{\'e}guelin", booktitle = "{Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security}", title = "Formal Verification of Smart Contracts: Short Paper", publisher = pub-ACM, address = pub-ACM:adr, pages = "91--96", year = "2016", DOI = "https://doi.org/10.1145/2993600.2993611", ISBN = "1-4503-4574-3", ISBN-13 = "978-1-4503-4574-3", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PLAS '16", URL = "http://doi.acm.org/10.1145/2993600.2993611", acknowledgement = ack-nhfb, acmid = "2993611", keywords = "Ethereum; EVM; formal verification; smart contracts; solidity", location = "Vienna, Austria", pagecount = "6", } @InProceedings{Bikowski:2016:AML, author = "Kamil Bikowski", booktitle = "Machine Intelligence and Big Data in Industry", title = "Application of Machine Learning Algorithms for {Bitcoin} Automated Trading", publisher = pub-SV, address = pub-SV:adr, pages = "161--168", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-30315-4_14", ISBN = "3-319-30315-5", ISBN-13 = "978-3-319-30315-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-30315-4_14", acknowledgement = ack-nhfb, } @Book{Bishop:2016:ABT, editor = "Ryan Bishop and Kristoffer Gansing and Jussi Parikka and Elvia Wilk", title = "Across and beyond: a transmediale reader on post-digital practices, concepts, and institutions", publisher = "Sternberg Press", address = "Berlin, Germany", pages = "348", year = "2016", ISBN = "3-95679-289-0", ISBN-13 = "978-3-95679-289-2 (paperback)", LCCN = "N7433.92 .A37 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "This collection of art and theory analyzes today?s post-digital conditions for critical media practices?across and beyond the analog and the digital, the human and the nonhuman. The contributions also look across and beyond the field of media art, staking out new paths for understanding and working in the transversal territories between theory, technology, and art. The concept of the post-digital is a way to critically take account of, contextualize, and shift the coordinates of new technologies as part of contemporary culture. The post-digital condition is not merely a theoretical issue but also a situation that affects conceptual and practice-based work.0The program of the transmediale festival in Berlin, celebrating its thirtieth year in 2017, has reflected these changes, and this book gathers new contributions from leading international theorists and artists of media and art who have taken part in the festival program over its past five editions. Divided into the thematic sections Imaginaries, Interventions, and Ecologies, this book is not a document of the festival itself, it is rather a stand-alone exploration of the ongoing themes of transmediale in a book format.", acknowledgement = ack-nhfb, remark = "This collection of art and theory related to the annual transmediale festival in Berlin analyzes today's post-digital conditions for critical media practices --- moving across and beyond the analog and the digital, the human and the nonhuman. The contributions also look across and beyond the field of media art, staking out new paths for understanding and working on the transversal territories between theory, technology anad art. --- Preliminaries. Design: The Laboratory of Manuel B{\"u}rger, Stefanie Ackermann, Manuel B{\"u}rger.", subject = "Multimedia (Art); Art and technology; Computer art; Information technology; Digital media; Mass media and culture; Art festivals; Germany; Berlin", tableofcontents = "1995: the year the future began, or multimedia as the vanishing point of the net / Kristoffer Gansing \\ Whatever happened to media art? / Dieter Daniels \\ Evil Media Distribution Center / Matsuko Yokokoji and Graham Hardood \\ The lab imaginary: speculative practices in situ / Jussi Parikka \\ OCTO C7P-1 / Baruch Gottlieb and Dmytri Kleiner \\ The touching charm of print / Alessandro Ludovico \\ Elegy for the collapse of PAL (2010-2012) / Rosa Menkman \\ When Claire Bishop woke up in the drone wars: art and technology, the nth time / Florian Cramer \\ Nor art and tech / Olia Lialina \\ A year-round festival program / Tatiana Bazzichelli \\ Beyond powerlessness / Geoffroy de Lagasnerie \\ Think you know me / Erica Scourti \\ What is left to subvert?: artistic methodologies for a post-digital world / Daphne Dragona \\ Quarantined / Julian Oliver and Danja Vasiliev \\ Red stack attack!: algorithms, capital and the automation of the common / Tiziana Terranova \\ Geraldine Ju\'arez Hello Bitcoin: it's probably time to start lighting things on fire / Jamie Allen \\ Things that shouldn't always work / Keller Easterling \\ Critical infrastructure / Jamie Allen and David Gauthier \\ Sovereign media, critical infrastructures, and political subjectivity / Ned Rossiter and Clemens Apprich \\ Lettres du voyant / Louise Henderson \\ The protean munus and nomos of the political subject in polyscalar autonomous remote sending systems / Ryan Bishop \\ Can the bot speak?: the paranoid voice in conversational UI / Benjamin H. Bratton \\ The 3D additivist manifesto / Morehshin Allahyari and Daniel Rourke \\ Technological macrobiome: media art and technology as matter / Olga Goriunova", } @InProceedings{Bogner:2016:DSA, author = "Andreas Bogner and Mathieu Chanson and Arne Meeuw", booktitle = "{Proceedings of the 6th International Conference on the Internet of Things}", title = "A Decentralised Sharing App Running a Smart Contract on the {Ethereum} Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "177--178", year = "2016", DOI = "https://doi.org/10.1145/2991561.2998465", ISBN = "1-4503-4814-9", ISBN-13 = "978-1-4503-4814-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoT'16", URL = "http://doi.acm.org/10.1145/2991561.2998465", acknowledgement = ack-nhfb, acmid = "2998465", keywords = "Blockchain; Decentralised App (DAPP); Ethereum; privacy protection; Sharing; Sharing Economy; Smart Contract", location = "Stuttgart, Germany", pagecount = "2", } @InProceedings{Bolici:2016:MGD, author = "Francesco Bolici and Sara Della Rosa", booktitle = "Empowering Organizations", title = "{Mt.Gox} Is Dead, Long Live {Bitcoin}!", publisher = pub-SV, address = pub-SV:adr, pages = "285--296", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-23784-8_22", ISBN = "3-319-23784-5", ISBN-13 = "978-3-319-23784-8", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-23784-8_22", acknowledgement = ack-nhfb, } @InProceedings{Bonaiuti:2016:EIM, author = "Gianni Bonaiuti", booktitle = "{Bitcoin} and Mobile Payments", title = "Economic Issues on {M}-Payments and {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "27--51", year = "2016", DOI = "https://doi.org/10.1057/978-1-137-57512-8_2", ISBN = "1-137-57512-3", ISBN-13 = "978-1-137-57512-8", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/978-1-137-57512-8_2", acknowledgement = ack-nhfb, } @InProceedings{Bonneau:2016:EUE, author = "Joseph Bonneau", booktitle = "{Financial Cryptography and Data Security}", title = "{EthIKS}: Using {Ethereum} to Audit a {CONIKS} Key Transparency Log", publisher = pub-SV, address = pub-SV:adr, pages = "95--105", year = "2016", DOI = "https://doi.org/10.1007/978-3-662-53357-4_7", ISBN = "3-662-53357-X", ISBN-13 = "978-3-662-53357-4", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-53357-4_7", acknowledgement = ack-nhfb, } @InCollection{Boyd:2016:FCP, author = "Colin Boyd and Christopher Carr", booktitle = "Information Security and Privacy", title = "Fair Client Puzzles from the {Bitcoin} Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "161--177", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-40253-6_10", ISBN = "3-319-40252-8 (paperback), 3-319-40253-6 (e-book)", ISBN-13 = "978-3-319-40252-9 (paperback), 978-3-319-40253-6 (e-book)", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-40253-6_10", ZMnumber = "06620897", acknowledgement = ack-nhfb, } @Book{Brito:2016:BPP, author = "Jerry Brito and Andrea M. Castillo", title = "{Bitcoin}: a primer for policymakers", publisher = "Mercatus Center, George Mason University", address = "Arlington, VA, USA", pages = "109", year = "2016", ISBN = "1-942951-16-7 (paperback), 1-942951-17-5", ISBN-13 = "978-1-942951-16-2 (paperback), 978-1-942951-17-9", LCCN = "HG1710 .B75 2016", bibdate = "Mon Dec 4 08:41:47 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Bitcoin; Electronic funds transfers; Money; Law and legislation; Finance", tableofcontents = "Introduction \\ What is bitcoin? \\ Benefits \\ Challenges \\ Regulation \\ Policy recommendations \\ Conclusion", } @Article{Cai:2016:FDO, author = "Yuanfeng Cai and Dan Zhu", title = "Fraud detections for online businesses: a perspective from blockchain technology", journal = "Financial Innovation", volume = "2", number = "1", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0039-4", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0039-4", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @InProceedings{Cankaya:2016:IBE, author = "Ebru Celikel Cankaya and Luke Daniel Carr", booktitle = "Information Technology: New Generations", title = "Implementing a {Bitcoin} Exchange with Enhanced Security", publisher = pub-SV, address = pub-SV:adr, pages = "257--266", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-32467-8_24", ISBN = "3-319-32467-5", ISBN-13 = "978-3-319-32467-8", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-32467-8_24", acknowledgement = ack-nhfb, } @InProceedings{Carlsten:2016:IBB, author = "Miles Carlsten and Harry Kalodner and S. Matthew Weinberg and Arvind Narayanan", booktitle = "Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "On the Instability of {Bitcoin} Without the Block Reward", publisher = pub-ACM, address = pub-ACM:adr, pages = "154--167", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978408", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://randomwalker.info/publications/mining_CCS.pdf", acknowledgement = ack-nhfb, acmid = "2978408", keywords = "Bitcoin, cryptocurrencies, equilibrium, game theory, learning, selfish mining, simulator", location = "Vienna, Austria", pagecount = "14", remark = "The PDF file in the URL contains an 11-page appendix that may be absent from the conference proceedings (or perhaps made available as an online resource).", } @TechReport{Catalini:2016:SSE, author = "C. Catalini and J. S. Gans", title = "Some Simple Economics of the Blockchain", type = "Working Paper", number = "2874598", institution = "Rotman School of Management, University of Toronto", address = "Toronto, ON, Canada", year = "2016", bibdate = "Sat Jan 20 16:53:12 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2874598", acknowledgement = ack-nhfb, } @InProceedings{Chase:2016:TOA, author = "Melissa Chase and Sarah Meiklejohn", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "Transparency Overlays and Applications", publisher = pub-ACM, address = pub-ACM:adr, pages = "168--179", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978404", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978404", acknowledgement = ack-nhfb, acmid = "2978404", keywords = "accountability, Bitcoin, transparency", location = "Vienna, Austria", pagecount = "12", } @InProceedings{Chatzopoulos:2016:LAH, author = "Dimitris Chatzopoulos and Sujit Gujar and Boi Faltings and Pan Hui", booktitle = "Proceedings of the 17th {ACM} International Symposium on Mobile Ad Hoc Networking and Computing", title = "{LocalCoin}: An Ad-hoc Payment Scheme for Areas with High Connectivity: Poster", publisher = pub-ACM, address = pub-ACM:adr, pages = "365--366", year = "2016", DOI = "https://doi.org/10.1145/2942358.2947401", ISBN = "1-4503-4184-5", ISBN-13 = "978-1-4503-4184-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "MobiHoc '16", acknowledgement = ack-nhfb, acmid = "2947401", location = "Paderborn, Germany", pagecount = "2", } @InProceedings{Chavez:2016:AHA, author = "J. J. G. Ch{\'a}vez and C. {Kleber da Silva Rodrigues}", booktitle = "2016 {XXI} Symposium on Signal Processing, Images and Artificial Vision {(STSIVA)}", title = "Automatic hopping among pools and distributed applications in the {Bitcoin} network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--7", month = aug, year = "2016", DOI = "https://doi.org/10.1109/STSIVA.2016.7743340", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Algorithm design and analysis; automatic hopping; bitcoin generation; Block; Blockchain; cryptography; Data mining; distributed applications; financial data processing; Hopping among pools; Measurement; mining networks; Mining pool; mining pools; Online banking; Peer-to-peer computing; peer-to-peer computing; Protocols; Standards; {Bitcoin}; {Bitcoin} network", } @Article{Ciaian:2016:DAV, author = "Pavel Ciaian and Miroslava Rajcaniova and d'Artis Kancs", title = "The digital agenda of virtual currencies: Can {BitCoin} become a global currency?", journal = "Information Systems and e-Business Management", volume = "14", number = "4", pages = "883--919", month = feb, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s10257-016-0304-0", ISSN = "1617-9846 (print), 1617-9854 (electronic)", ISSN-L = "1617-9846", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10257-016-0304-0", acknowledgement = ack-nhfb, } @Article{Coeckelbergh:2016:CNT, author = "Mark Coeckelbergh and Wessel Reijers", title = "Cryptocurrencies As Narrative Technologies", journal = j-ACM-SIGCAS-COMPUT-SOC, volume = "45", number = "3", pages = "172--178", month = jan, year = "2016", CODEN = "CMSCD3", DOI = "https://doi.org/10.1145/2874239.2874264", ISSN = "0095-2737 (print), 2167-3055 (electronic)", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://doi.acm.org/10.1145/2874239.2874264", acknowledgement = ack-nhfb, acmid = "2874264", ajournal = "SIGCAS Comput. Soc.", fjournal = "ACM SIGCAS Computers and Society", journal-URL = "http://dl.acm.org/citation.cfm?id=J198", keywords = "Bitcoin, cryptocurrencies, mediation, money, narrative, ricoeur, searle, technology", pagecount = "7", } @InProceedings{Courtois:2016:FBS, author = "Nicolas T. Courtois", booktitle = "Banking Beyond Banks and Money", title = "Features or Bugs: The Seven Sins of Current {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "97--120", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42448-4_6", ISBN = "3-319-42448-3", ISBN-13 = "978-3-319-42448-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-42448-4_6", acknowledgement = ack-nhfb, } @Article{Courtois:2016:SOB, author = "Nicolas Courtois and Guangyan Song and Ryan Castellucci", title = "Speed optimizations in {Bitcoin} key recovery attacks", journal = "Tatra Mountains Mathematical Publications", volume = "67", pages = "55--68", year = "2016", DOI = "https://doi.org/10.1515/tmmp-2016-0030", ISSN = "1210-3195 (print), 1338-9750 (electronic)", ISSN-L = "1210-3195", MRclass = "94A60", MRnumber = "3632502", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, ajournal = "Tatra Mt. Math. Publ.", fjournal = "Tatra Mountains Mathematical Publications", } @InProceedings{Croman:2016:SDB, author = "Kyle Croman and Christian Decker and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin G{\"u}n Sirer and Dawn Song and Roger Wattenhofer", title = "On Scaling Decentralized Blockchains", crossref = "Clark:2016:FCD", pages = "106--125", year = "2016", DOI = "https://doi.org/10.1007/978-3-662-53357-4_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-53357-4_8", acknowledgement = ack-nhfb, } @InProceedings{Decker:2016:BMS, author = "Christian Decker and Jochen Seidel and Roger Wattenhofer", booktitle = "{Proceedings of the 17th International Conference on Distributed Computing and Networking}", title = "{Bitcoin} Meets Strong Consistency", publisher = pub-ACM, address = pub-ACM:adr, pages = "13:1--13:10", year = "2016", DOI = "https://doi.org/10.1145/2833312.2833321", ISBN = "1-4503-4032-6", ISBN-13 = "978-1-4503-4032-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICDCN '16", URL = "http://doi.acm.org/10.1145/2833312.2833321", acknowledgement = ack-nhfb, acmid = "2833321", articleno = "13", keywords = "Bitcoin, blockchain, Byzantine agreement", location = "Singapore, Singapore", pagecount = "10", } @InProceedings{Delfin-Vidal:2016:FNB, author = "Rafael Delfin-Vidal and Guillermo Romero-Mel{\'e}ndez", booktitle = "Trends in Mathematical Economics", title = "The Fractal Nature of {Bitcoin}: Evidence from Wavelet Power Spectra", publisher = pub-SV, address = pub-SV:adr, pages = "73--98", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-32543-9_5", ISBN = "3-319-32543-4", ISBN-13 = "978-3-319-32543-9", MRclass = "91G80 (91G70)", MRnumber = "3587239", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-32543-9_5", acknowledgement = ack-nhfb, } @Article{Donier:2016:WAC, author = "J. Donier and J-P Bouchaud", title = "From {Walras}' auctioneer to continuous time double auctions: a general dynamic theory of supply and demand", journal = "Journal of Statistical Mechanics: Theory and Experiment", volume = "2016", number = "12", pages = "123406", month = dec, year = "2016", DOI = "https://doi.org/10.1088/1742-5468/aa4e8e", ISSN = "1742-5468", ISSN-L = "1742-5468", bibdate = "Mon Dec 4 11:59:45 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin", } @Article{Dubey:2016:WHP, author = "Ayush Dubey and Greg D. Hill and Robert Escriva and Emin G{\"u}n Sirer", title = "{Weaver}: A High-performance, Transactional Graph Database Based on Refinable Timestamps", journal = j-PROC-VLDB-ENDOWMENT, volume = "9", number = "11", pages = "852--863", month = jul, year = "2016", DOI = "https://doi.org/10.14778/2983200.2983202", ISSN = "2150-8097", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "2983202", ajournal = "Proc. VLDB Endow.", fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/toc.cfm?id=J869", pagecount = "12", } @InProceedings{Ekblaw:2016:BMD, author = "A. Ekblaw and C. Barabas and J. Harvey-Buschel and A. Lippman", booktitle = "2016 {IEEE 1st} International Workshops on Foundations and Applications of Self* Systems {(FAS*W)}", title = "{Bitcoin} and the Myth of Decentralization: Socio-technical Proposals for Restoring Network Integrity", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "18--23", month = sep, year = "2016", DOI = "https://doi.org/10.1109/FAS-W.2016.18", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "adaptive algorithms; cryptographic protocols; Cryptography; Cypherpunks mailing list; digital currency space; distributed information systems; electricity management modifications; electronic money; Hardware; multi-agent systems; myth of decentralization; network integrity restoration; Online banking; peer-to-peer computing; Peer-to-peer computing; peer-to-peer electronic cash system; peer-to-peer node consolidation; progressive cryptography; Proposals; Protocols; public domain software; self-organizing distributed system; socio-inspired design; socio-technical limits; Software; {Bitcoin} core protocol; {Bitcoin} open-source software project", } @InCollection{ElBansarkhani:2016:ELB, author = "Rachid {El Bansarkhani} and Jan Sturm", booktitle = "Cryptology and network security", title = "An efficient lattice-based multisignature scheme with applications to {Bitcoins}", volume = "10052", publisher = pub-SV, address = pub-SV:adr, pages = "140--155", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-48965-0_9", MRclass = "94A60", MRnumber = "3596283", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, acknowledgement = ack-nhfb, } @InProceedings{Eskandari:2016:BYC, author = "S. Eskandari and J. Clark and A. Hamou-Lhadj", booktitle = "2016 International {IEEE} Conferences on Ubiquitous Intelligence Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress {(UIC\slash} {ATC\slash} {ScalCom\slash} {CBDCom\slash} {IoP\slash} {SmartWorld)}", title = "Buy Your Coffee with {Bitcoin}: Real-World Deployment of a {Bitcoin} Point of Sale Terminal", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "382--389", month = jul, year = "2016", DOI = "https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0073", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Aunja PoS; Business; cryptographic currency; cryptography; deployability criteria; e-cash; electronic money; formal specification; formal verification; Hardware; Online banking; open source system; point of sale system; point of sale systems; point of sale terminal; Privacy; requirements engineering; Security; security; small business; small-value transactions; systems analysis; Usability; usability; {Bitcoin}; {Bitcoin} payments", } @InProceedings{Fadhil:2016:BME, author = "M. Fadhil and G. Owenson and M. Adda", booktitle = "2016 {IEEE} Intl Conference on Computational Science and Engineering {(CSE)} and {IEEE} Intl Conference on Embedded and Ubiquitous Computing {(EUC)} and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering {(DCABES)}", title = "A {Bitcoin} Model for Evaluation of Clustering to Improve Propagation Delay in {Bitcoin} Network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "468--475", month = aug, year = "2016", DOI = "https://doi.org/10.1109/CSE-EUC-DCABES.2016.226", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "BCBSN protocol; clustering evaluation; Clustering Evaluation; clustering protocol; Computational modeling; digital currency; event based simulation; financial data processing; information propagation; pattern clustering; Peer-to-peer computing; peer-to-peer computing; Propagation delay; Propagation Delay; Protocols; simulation model; Simulation Validation; Solid modeling; transaction propagation delay; {Bitcoin}; {Bitcoin} clustering based super node protocol; {Bitcoin} peer-to-peer network", } @InProceedings{Faisca:2016:DSI, author = "Jos{\'e} G. Fa{\'{}\i}sca and Jos{\'e} Q. Rogado", booktitle = "{Proceedings of the 12th International Conference on Semantic Systems}", title = "Decentralized Semantic Identity", publisher = pub-ACM, address = pub-ACM:adr, pages = "177--180", year = "2016", DOI = "https://doi.org/10.1145/2993318.2993348", ISBN = "1-4503-4752-5", ISBN-13 = "978-1-4503-4752-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SEMANTiCS 2016", URL = "http://doi.acm.org/10.1145/2993318.2993348", acknowledgement = ack-nhfb, acmid = "2993348", keywords = "authentication; blockchain; decentralization; DNS; identity; json web tokens; P2P file system; semantic web; WebID", location = "Leipzig, Germany", pagecount = "4", } @InProceedings{Frey:2016:BSB, author = "Davide Frey and Marc X. Makkes and Pierre-Louis Roman and Fran{\c{c}}ois Ta{\"{}\i}ani and Spyros Voulgaris", booktitle = "{Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware}", title = "Bringing Secure {Bitcoin} Transactions to Your Smartphone", publisher = pub-ACM, address = pub-ACM:adr, pages = "3:1--3:6", year = "2016", DOI = "https://doi.org/10.1145/3008167.3008170", ISBN = "1-4503-4662-6", ISBN-13 = "978-1-4503-4662-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ARM 2016", URL = "http://doi.acm.org/10.1145/3008167.3008170", acknowledgement = ack-nhfb, acmid = "3008170", articleno = "3", keywords = "Bitcoin; Blockchain; Distributed hash table; Sharding", location = "Trento, Italy", pagecount = "6", } @InProceedings{Fuenfrocken:2016:HAS, author = "M. Fuenfrocken and W. H. Schulz", booktitle = "2016 Workshop on Automotive {Systems/Software} Architectures {(WASA)}", title = "How Automotive Software Architectures could Benefit from {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "14--17", month = apr, year = "2016", DOI = "https://doi.org/10.1109/WASA.2016.11", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "automotive engineering; Automotive engineering; Business; Computer architecture; cooperative ITS; distributed automotive software architectures; economic considerations; economics; Economics; Online banking; Peer-to-peer computing; software architecture; Software architecture; software architecture; {Bitcoin}; {Bitcoin} crypto-currency", } @InProceedings{Gao:2016:TMM, author = "Xianyi Gao and Gradeigh D. Clark and Janne Lindqvist", booktitle = "Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems", title = "Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of {Bitcoin} Across Users and Non-Users", publisher = pub-ACM, address = pub-ACM:adr, pages = "1656--1668", year = "2016", DOI = "https://doi.org/10.1145/2858036.2858049", ISBN = "1-4503-3362-1", ISBN-13 = "978-1-4503-3362-7", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CHI '16", acknowledgement = ack-nhfb, acmid = "2858049", keywords = "Bitcoin, crypto-currency, digital currency, interview study", location = "San Jose, California, USA", pagecount = "13", } @Book{Geissinger:2016:VBG, author = "Eric Geissinger", title = "Virtual billions: the genius, the drug lord, and the {Ivy League} twins behind the rise of {Bitcoin}", publisher = pub-PROMETHEUS-BOOKS, address = pub-PROMETHEUS-BOOKS:adr, pages = "319", year = "2016", ISBN = "1-63388-144-X (hardcover), 1-63388-145-8", ISBN-13 = "978-1-63388-144-0 (hardcover), 978-1-63388-145-7", LCCN = "HG1710 .G45 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "``Bitcoin, the digital currency, was introduced in 2009 with little fanfare; five years later, shocking the world, it was worth \$14 billion. This book explores the cyber currency by focusing on the remarkable stories and intriguing personalities ofthose responsible for its sudden success: Satoshi Nakamoto, the reclusive and anonymous genius who created Bitcoin; Ross Ulbricht, aka the Dread Pirate Roberts, administrator of the largest and most successful Dark Web drug superstore, using Bitcoin to fuel online sale of drugs, hacking services, counterfeit money, and assassinations; and Cameron and Tyler Winklevoss, Harvard graduates, successful litigants vs. Facebook, world-class Olympic rowers, and Bitcoin entrepreneurs who own 1 percent of all bitcoins in existence. Equal parts The Social Network, Sherlock Holmes, and Breaking Bad, this absorbing narrative tells the stories of the reclusive geniuswho waged a one-man war against the global banking system (and he's winning); the quiet and affable computer geek who, until his arrest, profited handsomely from Silk Road, his online drug superstore; and the multitalented Harvard twins, who made a fortune from an intellectual-property suit against Mark Zuckerberg, and now are the chief promoters of Bitcoin as ''the next big thing.`` Bitcoin has introduced us to coke-fueled coding gurus, anger-crazed hitmen-hiring millionaires, and canny ''Bitcoin miners`` avidly adding processing power to their chilly Icelandic server farms to generate millions of dollars every month. Absurd and almost unbelievable stories abound, and sweep the reader along through the living and breathing, passionate and paranoid insiders who made it all happen''-- ``A colorful narrative that brings to life the extraordinary personalities behind Bitcoin, showing the enormous potential of this online currency for good and bad''", acknowledgement = ack-nhfb, author-dates = "1968--", subject = "Electronic funds transfers; Bitcoin; Electronic commerce; History; BIOGRAPHY and AUTOBIOGRAPHY / Business; BUSINESS and ECONOMICS / E-Commerce / General (see also COMPUTERS / Electronic Commerce); BUSINESS and ECONOMICS / Money and Monetary Policy.", } @InCollection{Gennaro:2016:TOD, author = "Rosario Gennaro and Steven Goldfeder and Arvind Narayanan", booktitle = "Applied Cryptography and Network Security", title = "Threshold-Optimal {DSA\slash ECDSA} Signatures and an Application to {Bitcoin} Wallet Security", volume = "9696", publisher = pub-SV, address = pub-SV:adr, pages = "156--174", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-39555-5_9", ISBN = "3-319-39554-8 (paperback), 3-319-39555-6 (e-book)", ISBN-13 = "978-3-319-39554-8 (paperback), 978-3-319-39555-5 (e-book)", MRclass = "94A62 94A60", MRnumber = "3533940", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-39555-5_9", ZMnumber = "06632515; 1346.94143", acknowledgement = ack-nhfb, } @InCollection{Gerstl:2016:LBB, author = "David S. Gerstl", booktitle = "{Software Business}", title = "Leveraging {Bitcoin} Blockchain Technology to Modernize Security Perfection Under the {Uniform Commercial Code}", publisher = pub-SV, address = pub-SV:adr, pages = "109--123", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-40515-5_8", ISBN = "3-319-40515-2", ISBN-13 = "978-3-319-40515-5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Lecture Notes in Business Information Processing", URL = "http://link.springer.com/chapter/10.1007/978-3-319-40515-5_8", acknowledgement = ack-nhfb, } @InProceedings{Gervais:2016:SPP, author = "Arthur Gervais and Ghassan O. Karame and Karl W{\"u}st and Vasileios Glykantzis and Hubert Ritzdorf and Srdjan {\v{C}}apkun", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "On the Security and Performance of Proof of Work Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "3--16", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978341", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978341", acknowledgement = ack-nhfb, acmid = "2978341", keywords = "Bitcoin, blockchain, performance, security", location = "Vienna, Austria", pagecount = "14", } @InProceedings{Geva:2016:MPB, author = "Benjamin Geva", booktitle = "{Bitcoin} and Mobile Payments", title = "Mobile Payments and {Bitcoin}: Concluding Reflections on the Digital Upheaval in Payments", publisher = pub-SV, address = pub-SV:adr, pages = "271--287", year = "2016", DOI = "https://doi.org/10.1057/978-1-137-57512-8_12", ISBN = "1-137-57512-3", ISBN-13 = "978-1-137-57512-8", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/978-1-137-57512-8_12", acknowledgement = ack-nhfb, } @InProceedings{Giechaskiel:2016:BSP, author = "Ilias Giechaskiel and Cas Cremers and Kasper B. Rasmussen", booktitle = "Computer Security {ESORICS 2016}", title = "On {Bitcoin} Security in the Presence of Broken Cryptographic Primitives", publisher = pub-SV, address = pub-SV:adr, pages = "201--222", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-45741-3_11", ISBN = "3-319-45741-1", ISBN-13 = "978-3-319-45741-3", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-45741-3_11", acknowledgement = ack-nhfb, } @Book{Gimigliano:2016:BMP, editor = "Gabriella Gimigliano", title = "{Bitcoin} and mobile payments: constructing a {European Union} framework", publisher = "Palgrave Macmillan", address = "London, UK", pages = "xxix + 314", year = "2016", DOI = "https://doi.org/10.1057/978-1-137-57512-8c", ISBN = "1-137-57511-5, 1-137-57512-3 (electronic)", ISBN-13 = "978-1-137-57511-1, 978-1-137-57512-8 (electronic)", LCCN = "????", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Palgrave studies in financial services technology", URL = "http://link.springer.com/book/10.1057/978-1-137-57512-8", acknowledgement = ack-nhfb, tableofcontents = "Part I Institutional Strategies and Economic Background / 1 \\ 1 The Regulatory Machine: An Institutional Approach to Innovative Payments in Europe / Gino Giambelluca and Paola Masi / 3 \\ 2 Economic Issues on M-Payments and Bitcoin / Gianni Bonaiuti/ 27 \\ Part II The Framework: A European and Comparative Outline / 53 \\ 3 Bit by Bit: Assessing the Legal Nature of Virtual Currencies / Noah Vardi / 55 \\ 4 Mobilizing Payments Within the European Union Framework: A Legal Analysis / Gabriella Gimigliano / 73 \\ 5 A Fuzzy Set in the Legal Domain: Bitcoins According to US Legal Formants / Andrea Borroni / 89 \\ 6 M-Payments: How Much Regulation Is Appropriate? Learning firom the Global Experience / Elisabetta Cervone / 121 \\ Part III The Challenges / 143 \\ 7 Security Issues of New Innovative Payments and Their Regulatory Challenges / Safari Kasiyanto / 145 \\ 8 EU Data Protection and Future Payment Services / Gloria Gonzalez Fuster / 181 \\ 9 The Classification of Virtual Currencies and Mobile Payments in Terms of the Old and New European Anti-Money Laundering Frameworks / Carolin Kaiser / 203 \\ 10 Virtual Currencies, M-Payments and VAT: Ready for the Future? / Redmar A. Wolf / 231 \\ 11 Mobile Payments and Merger Regulation: A Gase Law Analysis / Daniele D'Alvia / 251 \\ Part IV Conclusions / 269 \\ 12 Mobile Payments and Bitcoin: Concluding Reflections on the Digital Upheaval in Payments / Benjamin Geva / 271 \\ Ihe Regulatory Challenges Ahead / 289 \\ Bibliography / 293 \\ Index / 309", } @InProceedings{Gjermundrod:2016:GBC, author = "Harald Gjermundr{\o}d and Konstantinos Chalkias and Ioanna Dionysiou", booktitle = "{Proceedings of the 20th Pan-Hellenic Conference on Informatics}", title = "Going Beyond the {Coinbase} Transaction Fee: Alternative Reward Schemes for Miners in Blockchain Systems", publisher = pub-ACM, address = pub-ACM:adr, pages = "35:1--35:4", year = "2016", DOI = "https://doi.org/10.1145/3003733.3003773", ISBN = "1-4503-4789-4", ISBN-13 = "978-1-4503-4789-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PCI '16", URL = "http://doi.acm.org/10.1145/3003733.3003773", acknowledgement = ack-nhfb, acmid = "3003773", articleno = "35", keywords = "Blockchain Technology; Cryptocurrency; Miner Reward", location = "Patras, Greece", pagecount = "4", } @Article{Gobel:2016:BBD, author = "Johannes G{\"o}bel and Holger Paul Keeler and Anthony E. Krzesinski and Peter G. Taylor", title = "Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay", journal = "Perform. Evaluation", volume = "104", number = "??", pages = "23--41", month = "????", year = "2016", CODEN = "????", DOI = "https://doi.org/10.1016/j.peva.2016.07.001", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/pe/pe104.html#GobelKKT16; https://www.wikidata.org/entity/Q58645393", acknowledgement = ack-nhfb, dblp-key = "journals/pe/GobelKKT16", dblp-mdate = "2020-02-22", } @Book{Gomzin:2016:BNE, author = "Slava Gomzin", title = "{Bitcoin} for nonmathematicians: exploring the foundations of Crypto Payments", publisher = "Universal Publishers", address = "Boca Raton, Florida", pages = "xv + 137", year = "2016", ISBN = "1-62734-071-8 paperback", ISBN-13 = "978-1-62734-071-7 paperback", LCCN = "????", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, } @Article{Guo:2016:BAO, author = "Ye Guo and Chen Liang", title = "Blockchain application and outlook in the banking industry", journal = "Financial Innovation", volume = "2", number = "1", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0034-9", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0034-9", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @Book{Halaburda:2016:BB, author = "Hanna Halaburda and Miklos Sarvary", title = "Beyond {Bitcoin}", publisher = "Palgrave Macmillan", address = "New York City, NY", pages = "viii + 186", year = "2016", DOI = "https://doi.org/10.1057/9781137506429", ISBN = "1-349-55435-9 (paperback), 1-137-50642-3 (e-book), 1-137-50641-5", ISBN-13 = "978-1-349-55435-5 (paperback), 978-1-137-50642-9 (e-book), 978-1-137-50641-2", LCCN = "HB172.5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/book/10.1057/9781137506429", abstract = "Digital currencies are a fairly new phenomenon brought about by the spectacular rise of the internet. While Bitcoin is the most famous, there are numerous other digital currencies --- from Amazon Coin to Zetacoin. Beyond Bitcoin explores the economic forces underlying the design of their features and their potential. Halaburda and Sarvary argue that digital currencies are best understood by considering the economic incentives driving their creators and users. The authors present a framework that will allow systemic analysis of this dynamic environment and support further discussion of the design of digital currencies' features and the competition in the market.", acknowledgement = ack-nhfb, tableofcontents = "Introduction \\ Means of exchange: ever present competition \\ Platform-based currencies \\ Cryptocurrencies \\ Conclusions", } @Book{Halaburda:2016:BBE, author = "Hanna Halaburda and M. (Miklos) Sarvary", title = "Beyond {Bitcoin}: the economics of digital currencies", publisher = "Palgrave Macmillan", address = "New York City, NY, USA", pages = "viii + 186", year = "2016", ISBN = "1-137-50641-5 (hardcover)", ISBN-13 = "978-1-137-50641-2 (hardcover)", LCCN = "HG1710 .H275 2016", bibdate = "Mon Dec 4 08:54:50 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Bitcoin; Foreign exchange", tableofcontents = "Introduction \\ Means of exchange: ever present competition \\ Platform-based currencies \\ Cryptocurrencies \\ Conclusions", } @InProceedings{Hardjono:2016:CBC, author = "Thomas Hardjono and Ned Smith", booktitle = "{Proceedings of the 2Nd ACM International Workshop on IoT Privacy, Trust, and Security}", title = "Cloud-Based Commissioning of Constrained Devices Using Permissioned Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "29--36", year = "2016", DOI = "https://doi.org/10.1145/2899007.2899012", ISBN = "1-4503-4283-3", ISBN-13 = "978-1-4503-4283-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoTPTS '16", URL = "http://doi.acm.org/10.1145/2899007.2899012", acknowledgement = ack-nhfb, acmid = "2899012", keywords = "blockchains; identity management; internet of things; privacy; security", location = "Xi'an, China", pagecount = "8", } @InProceedings{Hari:2016:IBD, author = "Adiseshu Hari and T. V. Lakshman", booktitle = "{Proceedings of the 15th ACM Workshop on Hot Topics in Networks}", title = "The {Internet} Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the {Internet}", publisher = pub-ACM, address = pub-ACM:adr, pages = "204--210", year = "2016", DOI = "https://doi.org/10.1145/3005745.3005771", ISBN = "1-4503-4661-8", ISBN-13 = "978-1-4503-4661-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "HotNets '16", URL = "http://doi.acm.org/10.1145/3005745.3005771", acknowledgement = ack-nhfb, acmid = "3005771", keywords = "BGPSec; Blockchain; DNSSEC; Security", location = "Atlanta, GA, USA", pagecount = "7", } @InProceedings{Heilman:2016:BSC, author = "Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg", title = "Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain {Bitcoin} Transactions", crossref = "Clark:2016:FCD", pages = "43--60", year = "2016", DOI = "https://doi.org/10.1007/978-3-662-53357-4_4", ISBN = "3-662-53357-X", ISBN-13 = "978-3-662-53357-4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-53357-4_4", acknowledgement = ack-nhfb, } @InProceedings{Heitzenrater:2016:CES, author = "Chad Heitzenrater and Andrew Simpson", booktitle = "Proceedings of the 2016 New Security Paradigms Workshop", title = "A Case for the Economics of Secure Software Development", publisher = pub-ACM, address = pub-ACM:adr, pages = "92--105", year = "2016", DOI = "https://doi.org/10.1145/3011883.3011884", ISBN = "1-4503-4813-0", ISBN-13 = "978-1-4503-4813-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "NSPW '16", acknowledgement = ack-nhfb, acmid = "3011884", keywords = "information security investment, secure software engineering, software security economics", location = "Granby, Colorado, USA", pagecount = "14", } @InProceedings{Herlihy:2016:BLA, author = "Maurice Herlihy and Mark Moir", booktitle = "{Proceedings of the 31st Annual ACM\slash IEEE Symposium on Logic in Computer Science}", title = "Blockchains and the Logic of Accountability: Keynote Address", publisher = pub-ACM, address = pub-ACM:adr, pages = "27--30", year = "2016", DOI = "https://doi.org/10.1145/2933575.2934579", ISBN = "1-4503-4391-0", ISBN-13 = "978-1-4503-4391-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "LICS '16", URL = "http://doi.acm.org/10.1145/2933575.2934579", acknowledgement = ack-nhfb, acmid = "2934579", location = "New York, NY, USA", pagecount = "4", } @InCollection{Herrera-Joancomarti:2016:PBT, author = "Jordi Herrera-Joancomart{\'\i} and Cristina P{\'e}rez-Sol{\`a}", booktitle = "Modeling Decisions for Artificial Intelligence", title = "Privacy in {Bitcoin} Transactions: New Challenges from Blockchain Scalability Solutions", volume = "9880", publisher = pub-SV, address = pub-SV:adr, pages = "26--44", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-45656-0_3", ISBN = "3-319-45656-3", ISBN-13 = "978-3-319-45656-0", MRclass = "68P30 (91B99)", MRnumber = "3577800", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-45656-0_3", acknowledgement = ack-nhfb, } @Article{Huckle:2016:SB, author = "Steve Huckle and Martin White", title = "Socialism and the Blockchain", journal = j-FUTURE-INTERNET, volume = "8", number = "4", pages = "49", day = "18", month = oct, year = "2016", CODEN = "????", DOI = "https://doi.org/10.3390/fi8040049", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:50:56 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/8/4/49", abstract = "Bitcoin (BTC) is often cited as Libertarian. However, the technology underpinning Bitcoin, blockchain, has properties that make it ideally suited to Socialist paradigms. Current literature supports the Libertarian viewpoint by focusing on the ability of Bitcoin to bypass central authority and provide anonymity; rarely is there an examination of blockchain technology's capacity for decentralised transparency and auditability in support of a Socialist model. This paper conducts a review of the blockchain, Libertarianism, and Socialist philosophies. It then explores Socialist models of public ownership and looks at the unique cooperative properties of blockchain that make the technology ideal for supporting Socialist societies. In summary, this paper argues that blockchain technologies are not just a Libertarian tool, they also enhance Socialist forms of governance.", acknowledgement = ack-nhfb, remark = "Special Issue Future Intelligent Systems and Networks.", } @Article{Hurlburt:2016:MBO, author = "G. Hurlburt", title = "Might the Blockchain Outlive {Bitcoin}?", journal = j-IT-PRO, volume = "18", number = "2", pages = "12--16", month = mar, year = "2016", CODEN = "IPMAFM", DOI = "https://doi.org/10.1109/MITP.2016.21", ISSN = "1520-9202 (print), 1941-045x (electronic)", ISSN-L = "1520-9202", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{IT} Professional", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6294", keywords = "Bitcoin; blockchain; blockchain Outlive {Bitcoin}; crypto-currency; Cryptography; cryptography; Internet technologies; Market research; mathematical hashing process; Online banking; open source; public domain software; Roads; Sensors; World Wide Web", } @InCollection{Idelberger:2016:ELB, author = "Florian Idelberger and Guido Governatori and R{\'e}gis Riveret and Giovanni Sartor", booktitle = "Rule Technologies. {Research}, Tools, and Applications", title = "Evaluation of Logic-Based Smart Contracts for Blockchain Systems", publisher = pub-SV, address = pub-SV:adr, pages = "167--183", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42019-6_11", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-42019-6_11", acknowledgement = ack-nhfb, } @InProceedings{Ingram:2016:AMB, author = "C. Ingram and M. Morisse", booktitle = "2016 49th Hawaii International Conference on System Sciences {(HICSS)}", title = "Almost an {MNC}: {Bitcoin} Entrepreneurs' Use of Collective Resources and Decoupling to Build Legitimacy", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "4083--4092", month = jan, year = "2016", DOI = "https://doi.org/10.1109/HICSS.2016.507", ISSN = "1530-1605", ISSN-L = "1530-1605", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; broader {Bitcoin} community; Context; cryptocurrencies; Cryptography; digital community; electronic money; Europe; larger decentralised community act; legislation; legitimacy; local entrepreneur seeking mainstream legitimacy; MNC; Online banking; open source community; organisational aspects; Protocols; Stakeholders; {Bitcoin} entrepreneur", } @InProceedings{Jacynycz:2016:BDB, author = "Viktor Jacynycz and Adrian Calvo and Samer Hassan and Antonio A. S{\'a}nchez-Ruiz", booktitle = "{Distributed Computing and Artificial Intelligence, 13th International Conference}", title = "{Betfunding}: A Distributed Bounty-Based Crowdfunding Platform over {Ethereum}", publisher = pub-SV, address = pub-SV:adr, pages = "403--411", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-40162-1_44", ISBN = "3-319-40162-9", ISBN-13 = "978-3-319-40162-1", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-40162-1_44", acknowledgement = ack-nhfb, } @InProceedings{Jarecki:2016:HEC, author = "S. Jarecki and A. Kiayias and H. Krawczyk and J. Xu", booktitle = "2016 {IEEE} European Symposium on Security and Privacy {(EuroSP)}", title = "Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your {Bitcoin} Wallet Online)", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "276--291", month = mar, year = "2016", DOI = "https://doi.org/10.1109/EuroSP.2016.30", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Authentication; authentication; central primitive; communication channels; communication complexity; composable password-protected secret sharing; Cryptography; Electronic mail; Logic gates; memorizable password; oblivious PRF; oblivious pseudorandom function; online storing; password; PKI; PPSS schemes; Protocols; secret-sharing; secure channels; security of data; Servers; single password; UC formalism; UC model; UC-based definition; universally composable model; valuable secrets; verifiable OPRF; {Bitcoin} wallet online", } @InProceedings{Judmayer:2016:CCCa, author = "Aljosha Judmayer and Edgar Weippl", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "Condensed Cryptographic Currencies Crash Course ({C5})", publisher = pub-ACM, address = pub-ACM:adr, pages = "1857--1858", year = "2016", DOI = "https://doi.org/10.1145/2976749.2976754", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", acknowledgement = ack-nhfb, acmid = "2976754", keywords = "Bitcoin; block chain; blockchain; cryptographic currencies", location = "Vienna, Austria", pagecount = "2", } @InProceedings{Judmayer:2016:CCCb, author = "Aljosha Judmayer and Edgar Weippl", booktitle = "Proceedings of the 25th International Conference Companion on World Wide Web", title = "Cryptographic Currencies Crash Course ({C4}): Tutorial", publisher = "International World Wide Web Conferences Steering Committee", address = "Republic and Canton of Geneva, Switzerland", pages = "1021--1024", year = "2016", DOI = "https://doi.org/10.1145/2872518.2891066", ISBN = "1-4503-4144-6", ISBN-13 = "978-1-4503-4144-8", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WWW '16 Companion", acknowledgement = ack-nhfb, acmid = "2891066", keywords = "Bitcoin, block chain, cryptographic currencies", location = "Montr\&\#233;al, Qu\&\#233;bec, Canada", pagecount = "4", } @InProceedings{Juels:2016:RGI, author = "Ari Juels and Ahmed Kosba and Elaine Shi", booktitle = "Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "The Ring of {Gyges}: Investigating the Future of Criminal Smart Contracts", publisher = pub-ACM, address = pub-ACM:adr, pages = "283--295", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978362", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", acknowledgement = ack-nhfb, acmid = "2978362", keywords = "criminal smart contracts, Ethereum", location = "Vienna, Austria", pagecount = "13", } @Article{Juhasz:2016:BAI, author = "P{\'e}ter L. Juh{\'a}sz and J{\'o}zsef St{\'e}ger and D{\'a}niel Kondor and G{\'a}bor Vattay", title = "A {Bayesian} Approach to Identify Bitcoin Users", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2016", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1612.06747; https://dblp.org/db/journals/corr/corr1612.html#JuhaszSKV16", acknowledgement = ack-nhfb, dblp-key = "journals/corr/JuhaszSKV16", dblp-mdate = "2018-08-13", } @Book{Karame:2016:BBS, author = "Ghassan Karame and Elli Androulaki", title = "{Bitcoin} and blockchain security", publisher = pub-ARTECH, address = pub-ARTECH:adr, pages = "xiii + 218", year = "2016", ISBN = "1-63081-013-4", ISBN-13 = "978-1-63081-013-9", LCCN = "HG1710 .K37 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Artech House information security and privacy series", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Security measures; Bitcoin; Electronic commerce; Bitcoin; Electronic commerce; Security measures", } @InProceedings{Karame:2016:SSB, author = "Ghassan Karame", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "On the Security and Scalability of {Bitcoin}'s Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "1861--1862", year = "2016", DOI = "https://doi.org/10.1145/2976749.2976756", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2976756", acknowledgement = ack-nhfb, acmid = "2976756", keywords = "bitcoin security; blockchain security", location = "Vienna, Austria", pagecount = "2", } @InProceedings{Kate:2016:ICN, author = "Aniket Kate", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "Introduction to Credit Networks: Security, Privacy, and Applications", publisher = pub-ACM, address = pub-ACM:adr, pages = "1859--1860", year = "2016", DOI = "https://doi.org/10.1145/2976749.2976755", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2976755", acknowledgement = ack-nhfb, acmid = "2976755", keywords = "blockchain; credit networks; I owe you; ripple; stellar; sybil tolerance; trust networks", location = "Vienna, Austria", pagecount = "2", } @InProceedings{Keenan:2016:WFK, author = "Thomas P. Keenan", booktitle = "{ACM SIGGRAPH 2016 Talks}", title = "Have We Found the Key to the Smart Community?", publisher = pub-ACM, address = pub-ACM:adr, pages = "89:1--89:1", year = "2016", DOI = "https://doi.org/10.1145/2897839.2956558", ISBN = "1-4503-4282-5", ISBN-13 = "978-1-4503-4282-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SIGGRAPH '16", URL = "http://doi.acm.org/10.1145/2897839.2956558", acknowledgement = ack-nhfb, acmid = "2956558", articleno = "89", location = "Anaheim, California", pagecount = "1", } @InProceedings{Khairuddin:2016:EMB, author = "Irni Eliana Khairuddin and Corina Sas and Sarah Clinch and Nigel Davies", booktitle = "Proceedings of the 2016 {CHI} Conference Extended Abstracts on Human Factors in Computing Systems", title = "Exploring Motivations for {Bitcoin} Technology Usage", publisher = pub-ACM, address = pub-ACM:adr, pages = "2872--2878", year = "2016", DOI = "https://doi.org/10.1145/2851581.2892500", ISBN = "1-4503-4082-2", ISBN-13 = "978-1-4503-4082-3", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CHI EA '16", acknowledgement = ack-nhfb, acmid = "2892500", keywords = "bitcoin technology, user motivation", location = "San Jose, California, USA", pagecount = "7", } @InProceedings{Kiayias:2016:BMG, author = "Aggelos Kiayias and Elias Koutsoupias and Maria Kyropoulou and Yiannis Tselekounis", booktitle = "{Proceedings of the 2016 ACM Conference on Economics and Computation}", title = "Blockchain Mining Games", publisher = pub-ACM, address = pub-ACM:adr, pages = "365--382", year = "2016", DOI = "https://doi.org/10.1145/2940716.2940773", ISBN = "1-4503-3936-0", ISBN-13 = "978-1-4503-3936-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "EC '16", URL = "http://doi.acm.org/10.1145/2940716.2940773", acknowledgement = ack-nhfb, acmid = "2940773", keywords = "Bitcoin, blockchain games, consensus protocol, nash equilibrium", location = "Maastricht, The Netherlands", pagecount = "18", } @Article{Kleineberg:2016:SBC, author = "Kaj-Kolja Kleineberg and Dirk Helbing", title = "A Social {Bitcoin} could sustain a democratic digital world", journal = j-EUR-PHYS-J-SPEC-TOP, volume = "225", number = "17--18", pages = "3231--3241", month = dec, year = "2016", CODEN = "EPJSAC", DOI = "https://doi.org/10.1140/epjst/e2016-60156-7", ISSN = "1951-6355 (print), 1951-6401 (electronic)", ISSN-L = "1951-6355", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1140/epjst/e2016-60156-7", acknowledgement = ack-nhfb, fjournal = "European Physical Journal --- Special Topics", journal-URL = "http://link.springer.com/journal/11734", } @Article{Kokoris-Kogias:2016:EBS, author = "Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford", title = "Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing", journal = "CoRR", volume = "abs/1602.06997", number = "??", pages = "??--??", month = "????", year = "2016", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1602.06997; https://dblp.org/db/journals/corr/corr1602.html#Kokoris-KogiasJ16", acknowledgement = ack-nhfb, dblp-key = "journals/corr/Kokoris-KogiasJ16", dblp-mdate = "2018-08-13", } @InProceedings{Kow:2016:HKW, author = "Yong Ming Kow and Xianghua Ding", booktitle = "Proceedings of the 19th International Conference on Supporting Group Work", title = "``{Hey}, {I} Know What This is!'': Cultural Affinities and Early Stage Appropriation of the Emerging {Bitcoin} Technology", publisher = pub-ACM, address = pub-ACM:adr, pages = "213--221", year = "2016", DOI = "https://doi.org/10.1145/2957276.2957279", ISBN = "1-4503-4276-0", ISBN-13 = "978-1-4503-4276-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "GROUP '16", acknowledgement = ack-nhfb, acmid = "2957279", keywords = "appropriation, Bitcoin, sociocultural", location = "Sanibel Island, Florida, USA", pagecount = "9", } @Article{Kraft:2016:DCB, author = "Daniel Kraft", title = "Difficulty control for blockchain-based consensus systems", journal = "Peer-to-Peer Networking and Applications", volume = "9", number = "2", month = "", year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s12083-015-0347-x", ISSN = "", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12083-015-0347-x", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/12083", } @InProceedings{Kumaresan:2016:ASC, author = "Ranjit Kumaresan and Iddo Bentov", booktitle = "Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Amortizing Secure Computation with Penalties", publisher = pub-ACM, address = pub-ACM:adr, pages = "418--429", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978424", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", acknowledgement = ack-nhfb, acmid = "2978424", keywords = "amortization, Bitcoin, fairness, secure computation", location = "Vienna, Austria", pagecount = "12", } @InProceedings{Kumaresan:2016:ISC, author = "Ranjit Kumaresan and Vinod Vaikuntanathan and Prashant Nalini Vasudevan", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "Improvements to Secure Computation with Penalties", publisher = pub-ACM, address = pub-ACM:adr, pages = "406--417", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978421", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978421", acknowledgement = ack-nhfb, acmid = "2978421", keywords = "Bitcoin, fairness, secure computation", location = "Vienna, Austria", pagecount = "12", } @InProceedings{Kunnapas:2016:BSC, author = "Kaido K{\"u}nnapas", booktitle = "The Future of Law and {eTechnologies}", title = "From {Bitcoin} to Smart Contracts: Legal Revolution or Evolution from the Perspective of de lege ferenda?", publisher = pub-SV, address = pub-SV:adr, pages = "111--131", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-26896-5_6", ISBN = "3-319-26896-1", ISBN-13 = "978-3-319-26896-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-26896-5_6", acknowledgement = ack-nhfb, keywords = "de lege ferenda (Latin) == the passage of the law", } @Article{Lee:2016:BBS, author = "Boohyung Lee and Jong-Hyouk Lee", title = "Blockchain-based secure firmware update for embedded devices in an {Internet of Things} environment", journal = j-J-SUPERCOMPUTING, volume = "73", number = "3", pages = "1152--1167", month = sep, year = "2016", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-016-1870-0", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @InProceedings{Lee:2016:ESM, author = "V. Lee and H. Wei", booktitle = "2016 {IEEE 11th} Conference on Industrial Electronics and Applications {(ICIEA)}", title = "Exploratory simulation models for fraudulent detection in {Bitcoin} system", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1972--1977", month = jun, year = "2016", DOI = "https://doi.org/10.1109/ICIEA.2016.7603912", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Delays; Distributed Network; Double-spending; double-spending issues; double-spending risks; e-payment; exploratory simulation models; financial data processing; Fraud detection; fraudulent detection; Government; network connection status; Online banking; online payment security; online transactions; Peer-to-peer computing; Ports (Computers); Security; security issues; security of data; Simulation; transaction processing; {Bitcoin} system", } @InProceedings{Leiding:2016:SMB, author = "Benjamin Leiding and Parisa Memarmoshrefi and Dieter Hogrefe", booktitle = "{Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct}", title = "Self-managed and Blockchain-based Vehicular Ad-hoc Networks", publisher = pub-ACM, address = pub-ACM:adr, pages = "137--140", year = "2016", DOI = "https://doi.org/10.1145/2968219.2971409", ISBN = "1-4503-4462-3", ISBN-13 = "978-1-4503-4462-3", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "UbiComp '16", URL = "http://doi.acm.org/10.1145/2968219.2971409", acknowledgement = ack-nhfb, acmid = "2971409", keywords = "blockchain; Ethereum; self-managed VANET", location = "Heidelberg, Germany", pagecount = "4", } @InCollection{Leinonen:2016:DBC, author = "Harry Leinonen", booktitle = "Transforming Payment Systems in {Europe}", title = "Decentralised Blockchained and Centralised Real-Time Payment Ledgers: Development Trends and Basic Requirements", publisher = pub-SV, address = pub-SV:adr, pages = "236--261", year = "2016", DOI = "https://doi.org/10.1057/9781137541215_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1057/9781137541215_8", acknowledgement = ack-nhfb, } @InProceedings{Liao:2016:BCD, author = "K. Liao and Z. Zhao and A. Doupe and G. J. Ahn", booktitle = "2016 {APWG} Symposium on Electronic Crime Research {(eCrime)}", title = "Behind closed doors: measurement and analysis of {CryptoLocker} ransoms in {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--13", month = jun, year = "2016", DOI = "https://doi.org/10.1109/ECRIME.2016.7487938", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "auxiliary information; BTC-e; Computer crime; computer crime; cryptography; CryptoLocker; CryptoLocker economy; CryptoLocker operation; Cryptolocker ransoms; cybercrime; cybercrimes; decentralized cryptographic currency; Electronic mail; erratic cybercrime landscape; financial data processing; financial infrastructure; Online banking; online fora; Privacy; Protocols; Public key; ransom payments; ransomware; reddit; security; sheep marketplace scam; threat intelligence; {Bitcoin}; {Bitcoin} ecosystem; {Bitcoin} Fog; {Bitcoin} services; {Bitcoin}Talk", } @Article{Lischke:2016:ABN, author = "Matthias Lischke and Benjamin Fabian", title = "Analyzing the {Bitcoin} Network: The First Four Years", journal = j-FUTURE-INTERNET, volume = "8", number = "1", pages = "7", day = "07", month = mar, year = "2016", CODEN = "????", DOI = "https://doi.org/10.3390/fi8010007", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:50:55 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/8/1/7", abstract = "In this explorative study, we examine the economy and transaction network of the decentralized digital currency Bitcoin during the first four years of its existence. The objective is to develop insights into the evolution of the Bitcoin economy during this period. For this, we establish and analyze a novel integrated dataset that enriches data from the Bitcoin blockchain with off-network data such as business categories and geo-locations. Our analyses reveal the major Bitcoin businesses and markets. Our results also give insights on the business distribution by countries and how businesses evolve over time. We also show that there is a gambling network that features many very small transactions. Furthermore, regional differences in the adoption and business distribution could be found. In the network analysis, the small world phenomenon is investigated and confirmed for several subgraphs of the Bitcoin network.", acknowledgement = ack-nhfb, } @InCollection{Liu:2016:MRS, author = "Paul Tak Shing Liu", booktitle = "Information and Communications Security", title = "Medical Record System Using Blockchain, Big Data and Tokenization", publisher = pub-SV, address = pub-SV:adr, pages = "254--261", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-50011-9_20", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-50011-9_20", acknowledgement = ack-nhfb, } @InProceedings{Luu:2016:MSC, author = "Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "Making Smart Contracts Smarter", publisher = pub-ACM, address = pub-ACM:adr, pages = "254--269", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978309", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978309", acknowledgement = ack-nhfb, acmid = "2978309", keywords = "blockchain, cryptocurrencies, Ethereum, smart contract, symbolic execution", location = "Vienna, Austria", pagecount = "16", } @InProceedings{Luu:2016:SSP, author = "Loi Luu and Viswesh Narayanan and Chaodong Zheng and Kunal Baweja and Seth Gilbert and Prateek Saxena", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "A Secure Sharding Protocol For Open Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "17--30", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978389", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978389", acknowledgement = ack-nhfb, acmid = "2978389", keywords = "Bitcoin, consensus protocol, sharding", location = "Vienna, Austria", pagecount = "14", } @InProceedings{Mac:2016:BBS, author = "Trent J. Mac and Donald and Darcy W. E. Allen and Jason Potts", booktitle = "{Banking Beyond Banks and Money}", title = "Blockchains and the Boundaries of Self-Organized Economies: Predictions for the Future of Banking", publisher = pub-SV, address = pub-SV:adr, year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42448-4_14", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-42448-4_14", acknowledgement = ack-nhfb, } @InCollection{MacDonald:2016:BBS, author = "Trent J. MacDonald and Darcy W. E. Allen and Jason Potts", booktitle = "Banking Beyond Banks and Money", title = "Blockchains and the Boundaries of Self-Organized Economies: Predictions for the Future of Banking", publisher = "Springer International Publishing", address = "????", pages = "279--296", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42448-4_14", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Maesa:2016:UBB, author = "D. D. F. Maesa and A. Marino and L. Ricci", booktitle = "2016 {IEEE} International Conference on Data Science and Advanced Analytics {(DSAA)}", title = "Uncovering the {Bitcoin} Blockchain: An Analysis of the Full Users Graph", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "537--546", month = oct, year = "2016", DOI = "https://doi.org/10.1109/DSAA.2016.52", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Algorithm design and analysis; BITCOIN blockchain; BITCOIN economy; BITCOIN network; BITCOIN transaction graph; blockchain; Computer science; cryptocurrency; Cryptography; cryptography; decentralized cryptocurrency system; Economics; EFTS; Electronic mail; exponential explosion; full user graph analysis; fund movement investigation; graph theory; heuristic clustering; network connectivity; node detection; Online banking; pattern clustering; Protocols; time evolution; {Bitcoin}", } @Article{Magaki:2016:ACSa, author = "Ikuo Magaki and Moein Khazraee and Luis Vega Gutierrez and Michael Bedford Taylor", title = "{ASIC} Clouds: Specializing the Datacenter", journal = j-COMP-ARCH-NEWS, volume = "44", number = "3", pages = "178--190", month = jun, year = "2016", CODEN = "CANED2", DOI = "https://doi.org/10.1145/3007787.3001156", ISSN = "0163-5964 (print), 1943-5851 (electronic)", ISSN-L = "0163-5964", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "3001156", ajournal = "SIGARCH Comput. Archit. News", fjournal = "ACM SIGARCH Computer Architecture News", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J89", pagecount = "13", } @InProceedings{Magaki:2016:ACSb, author = "Ikuo Magaki and Moein Khazraee and Luis Vega Gutierrez and Michael Bedford Taylor", booktitle = "Proceedings of the 43rd International Symposium on Computer Architecture", title = "{ASIC} Clouds: Specializing the Datacenter", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "178--190", year = "2016", DOI = "https://doi.org/10.1109/ISCA.2016.25", ISBN = "1-4673-8947-1", ISBN-13 = "978-1-4673-8947-1", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ISCA '16", acknowledgement = ack-nhfb, acmid = "3001156", location = "Seoul, Republic of Korea", pagecount = "13", } @Book{Mago:2016:BHB, author = "Felix Mago and Tobias Gillen", title = "{Das Bitcoin-Handbuch: Bitcoin von A bis Z}. ({German}) [{The} {Bitcoin} Handbook: {Bitcoin} from {A} to {Z}]", publisher = "jmb-Verlag", address = "Hannover, Germany", pages = "134", year = "2016", ISBN = "3-944342-77-1", ISBN-13 = "978-3-944342-77-1", LCCN = "????", bibdate = "Mon Dec 4 08:59:19 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BASIC thinking", acknowledgement = ack-nhfb, language = "German", subject = "Elektronischer Zahlungsverkehr; Bargeldloser Zahlungsverkehr; Ratgeber; Electronic Commerce; Bitcoin", tableofcontents = "Vorwort / 5 \\ Wo sollen wir blo{\ss} anfangen? / 7 \\ Wie entstehen Bitcoins und was ist Mining? / 12 \\ Die richtige Hardware / 19 \\ Mining Pools / 25 \\ Die richtige Software / 35 \\ Wallet: Brieftasche f{\"u}r die digitale W{\"a}hrung / 39 \\ Die richtige Wallet-Sicherung / 43 \\ Faktoren f{\"u}r ein sicheres Bitcoin-Wallet / 47 \\ Die Desktop-Wallets / 53 \\ Die Online-Wallets / 60 \\ Mobile-Wallets und Bitcoin-Apps / 67 \\ Hardware- und Paper-Wallets / 72 \\ Fazit: Der lange Weg zum Wallet / 75 \\ Wie und wo kauft man Bitcoins? / 77 \\ Fazit: Vergleichsweise einfach / 88 \\ Wo kann man seine Bitcoins ausgeben? / 89 \\ Bitcoins f{\"u}r H{\"a}ndler --- Was bringt es, wie funktioniert es? / 96 \\ Die Alternativen zum Bitcoin / 110 \\ Fazit: Besser leben mit Bitcoin? / 121 \\ Nachwort/{\"U}ber uns / 129 \\ Der Autor Felix Mago / 130 \\ Der Herausgeber Tobias Gillen / 131 \\ Vernetze dich mit uns / 132", } @InProceedings{Matta:2016:BMP, author = "Martina Matta and Ilaria Lunesu and Michele Marchesi", booktitle = "Knowledge Discovery, Knowledge Engineering and Knowledge Management", title = "Is {Bitcoin}'s Market Predictable? {Analysis} of {Web} Search and Social Media", publisher = pub-SV, address = pub-SV:adr, pages = "155--172", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-52758-1_10", ISBN = "3-319-52758-4", ISBN-13 = "978-3-319-52758-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-52758-1_10", acknowledgement = ack-nhfb, } @InProceedings{Matzutt:2016:PDW, author = "Roman Matzutt and Oliver Hohlfeld and Martin Henze and Robin Rawiel and Jan Henrik Ziegeldorf and Klaus Wehrle", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "{Poster}: {I} Don't Want That Content! {On} the Risks of Exploiting {Bitcoin}'s Blockchain As a Content Store", publisher = pub-ACM, address = pub-ACM:adr, pages = "1769--1771", year = "2016", DOI = "https://doi.org/10.1145/2976749.2989059", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2989059", acknowledgement = ack-nhfb, acmid = "2989059", keywords = "arbitrary content, Bitcoin, blockchain technology, censorship resistency, measurement, peer-to-peer protocols", location = "Vienna, Austria", pagecount = "3", } @InProceedings{McCorry:2016:TBP, author = "Patrick McCorry and Malte M{\"o}ser and Siamak F. Shahandashti and Feng Hao", booktitle = "Information Security and Privacy", title = "Towards {Bitcoin} Payment Networks", publisher = pub-SV, address = pub-SV:adr, pages = "57--76", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-40253-6_4", ISBN = "3-319-40252-8 (paperback), 3-319-40253-6 (e-book)", ISBN-13 = "978-3-319-40252-9 (paperback), 978-3-319-40253-6 (e-book)", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-40253-6_4", ZMnumber = "06620891", acknowledgement = ack-nhfb, } @Article{Meiklejohn:2016:FBC, author = "Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage", title = "A fistful of {Bitcoins}: characterizing payments among men with no names", journal = j-CACM, volume = "59", number = "4", pages = "86--93", month = apr, year = "2016", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2896384", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Apr 15 14:58:10 MDT 2016", bibsource = "http://www.acm.org/pubs/contents/journals/cacm/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://cacm.acm.org/magazines/2016/4/200174/fulltext", abstract = "Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on a combination of cryptographic protection and a peer-to-peer protocol for witnessing settlements. Consequently, Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique characteristic further, using heuristic clustering to group Bitcoin wallets based on evidence of shared authority, and then using re-identification attacks (i.e., empirical purchasing of goods and services) to classify the operators of those clusters. From this analysis, we consider the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Michael:2016:RNI, author = "K. Michael", title = "{RFID\slash NFC} Implants for {Bitcoin} Transactions", journal = "IEEE Consumer Electronics Magazine", volume = "5", number = "3", pages = "103--106", month = jul, year = "2016", DOI = "https://doi.org/10.1109/MCE.2016.2556900", ISSN = "2162-2248 (print), 2162-2256 (electronic)", ISSN-L = "2162-2248", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "biological identity; biomedical communication; Biometrics; Cryptography; embedded implant; Implants; Interviews; Near field communication; near-field communication; near-field communication platform; NFC implants; Privacy; radiofrequency identification; Radiofrequency identification; RFID implants; {Bitcoin} transactions", } @InProceedings{Miller:2016:HBB, author = "Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "The Honey Badger of {BFT} Protocols", publisher = pub-ACM, address = pub-ACM:adr, pages = "31--42", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978399", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978399", acknowledgement = ack-nhfb, acmid = "2978399", keywords = "asynchronous; atomic broadcast; BFT; blockchain", location = "Vienna, Austria", pagecount = "12", } @InProceedings{Milutinovic:2016:PLE, author = "Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal", booktitle = "{Proceedings of the 1st Workshop on System Software for Trusted Execution}", title = "Proof of Luck: An Efficient Blockchain Consensus Protocol", publisher = pub-ACM, address = pub-ACM:adr, pages = "2:1--2:6", year = "2016", DOI = "https://doi.org/10.1145/3007788.3007790", ISBN = "1-4503-4670-7", ISBN-13 = "978-1-4503-4670-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SysTEX '16", URL = "http://doi.acm.org/10.1145/3007788.3007790", acknowledgement = ack-nhfb, acmid = "3007790", articleno = "2", keywords = "Blockchain; Consensus Protocol; Intel SGX; Trusted Execution Environments", location = "Trento, Italy", pagecount = "6", } @InProceedings{Monamo:2016:MAB, author = "P. M. Monamo and V. Marivate and B. Twala", booktitle = "2016 15th {IEEE} International Conference on Machine Learning and Applications {(ICMLA)}", title = "A Multifaceted Approach to {Bitcoin} Fraud Detection: Global and Local Outliers", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "188--194", month = dec, year = "2016", DOI = "https://doi.org/10.1109/ICMLA.2016.0039", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "anomalous financial behaviour interpretation; anomaly; boosted binary regression models; Clustering algorithms; cryptography; Data mining; data mining; Electronic mail; Feature extraction; feature extraction; financial data processing; kd-trees; Machine learning algorithms; maximum likelihood-based models; Online banking; outlier; random forest; regression; regression analysis; Security; {Bitcoin} fraud detection; {Bitcoin} network", } @InProceedings{Monamo:2016:ULR, author = "P. Monamo and V. Marivate and B. Twala", booktitle = "2016 Information Security for South Africa {(ISSA)}", title = "Unsupervised learning for robust {Bitcoin} fraud detection", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "129--134", month = aug, year = "2016", DOI = "https://doi.org/10.1109/ISSA.2016.7802939", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "anomaly; anomaly detection; Clustering algorithms; Complexity theory; computer crime; cryptographic currency; cryptography; cybercrime; cybercrime activities; data mining; Electric breakdown; financial data processing; fraud; fraudulent activity detection; Logic gates; multivariate setup; object clustering; Online banking; outlier; pattern clustering; rampant absorption; robust {Bitcoin} fraud detection; trimmed k-means; warrants utilization; {Bitcoin} transactions", } @InProceedings{Moser:2016:BC, author = "Malte M{\"o}ser and Ittay Eyal and Emin G{\"u}n Sirer", title = "{Bitcoin} Covenants", crossref = "Clark:2016:FCD", pages = "126--141", year = "2016", DOI = "https://doi.org/10.1007/978-3-662-53357-4_9", ISBN = "3-662-53357-X", ISBN-13 = "978-3-662-53357-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-53357-4_9", acknowledgement = ack-nhfb, } @Book{Narayanan:2016:BCT, author = "Arvind Narayanan and Joseph Bonneau and Edward Felten and Andrew Miller and Steven Goldfeder", title = "{Bitcoin} and cryptocurrency technologies: a comprehensive introduction", publisher = pub-PRINCETON, address = pub-PRINCETON:adr, pages = "xxvii + 304", year = "2016", ISBN = "0-691-17169-6 (hardcover), 1-4008-8415-2 (e-book)", ISBN-13 = "978-0-691-17169-2 (hardcover), 978-1-4008-8415-5 (e-book)", LCCN = "HG1710 .N35 2016", MRclass = "94-01 94A60 91-01 91B64", bibdate = "Thu Nov 30 17:35:13 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", URL = "https://lopp.net/pdf/princeton_bitcoin_book.pdf", abstract = "\booktitle{Bitcoin and Cryptocurrency Technologies} provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age. How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more. An essential introduction to the new technologies of digital currency, Covers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much more, Features an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slides, Also suitable for use with the authors' Coursera online course, Electronic solutions manual (available only to professors).", acknowledgement = ack-nhfb, subject = "Bitcoin; Electronic funds transfers; Cryptography; Money", tableofcontents = "Introduction to cryptography and cryptocurrencies \\ How Bitcoin achieves decentralization \\ Mechanics of Bitcoin \\ How to store and use Bitcoins \\ Bitcoin mining \\ Bitcoin and anonymity \\ Community, politics, and regulation \\ Alternative mining puzzles \\ Bitcoin as a platform \\ Altcoins and the cryptocurrency ecosystem \\ Decentralized institutions: the future of Bitcoin? \\ Conclusion", } @Article{Narayanan:2016:RPC, author = "Arvind Narayanan and Andrew Miller and Song Han", editor = "Peter Bailis", title = "Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning", journal = j-QUEUE, volume = "14", number = "6", pages = "60:43--60:55", month = dec, year = "2016", CODEN = "AQCUAE", DOI = "https://doi.org/10.1145/3028687.3043967", ISSN = "1542-7730 (print), 1542-7749 (electronic)", ISSN-L = "1542-7730", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://doi.acm.org/10.1145/3028687.3043967", acknowledgement = ack-nhfb, acmid = "3043967", articleno = "60", fjournal = "ACM Queue: Tomorrow's Computing Today", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J882", pagecount = "13", } @InProceedings{Neilson:2016:BFT, author = "David Neilson and Sukhvinder Hara and Ian Mitchell", booktitle = "Global Security, Safety and Sustainability --- The Security Challenges of the Connected World", title = "{Bitcoin} Forensics: A Tutorial", publisher = pub-SV, address = pub-SV:adr, pages = "12--26", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-51064-4_2", ISBN = "3-319-51064-9", ISBN-13 = "978-3-319-51064-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-51064-4_2", acknowledgement = ack-nhfb, } @InProceedings{Neudecker:2016:TAI, author = "T. Neudecker and P. Andelfinger and H. Hartenstein", booktitle = "2016 Intl {IEEE} Conferences on Ubiquitous Intelligence Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress {(UIC\slash} {ATC\slash} {ScalCom\slash} {CBDCom\slash} {IoP\slash} {SmartWorld)}", title = "Timing Analysis for Inferring the Topology of the {Bitcoin} Peer-to-Peer Network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "358--367", month = jul, year = "2016", DOI = "https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; computer network security; decentralized architecture; Delays; electronic currency system; electronic money; flooding P2P networks; inference attacks; Monitoring; Network Analysis; network attacks; network links; Network topology; Online banking; Peer-to-Peer; Peer-to-peer computing; peer-to-peer computing; peer-to-peer network topology; Propagation delay; telecommunication network topology; timing analysis; Timing Analysis; Topology; trickling countermeasure", } @Book{Nishibe:2016:EMG, author = "Makoto Nishibe", title = "The enigma of money: gold, central banknotes, and {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "xiv + 93 + 3", year = "2016", DOI = "https://doi.org/10.1007/978-981-10-1819-0", ISBN = "981-10-1818-9 (print), 981-10-1819-7 (e-book)", ISBN-13 = "978-981-10-1818-3 (print), 978-981-10-1819-0 (e-book)", LCCN = "HB71-74; HG1272", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", URL = "http://link.springer.com/10.1007/978-981-10-1819-0", abstract = "This book provides a new way of understanding modern money and markets by stressing their self-fulfilling\slash self-destructive properties as institutions from evolutionary perspectives. In contrast to an unrealistic view of the neoclassical general equilibrium theory that models the price mechanism of a ``concentrated market'' without using money, presented here is an alternative theory of markets on how a realistic ``dispersive market'' using a stock of money and inventory as buffers can work as a multilayered price-quantitative adjustment system. The central features of modern sovereign moneys seen in inconvertible IOUs of central banknotes can be depicted as ``The Emperor's New Clothes'' that correspond to the U.S. dollar and the Euro void of their own value. The image captures such characteristics of national currencies as ``self-fulfilling ideas'' by the inertia of conventions in the past and expectations of an uncertain future. Both ideas normally make money more acceptable and circulative so that its value can become more stable unless expectations for the future turn very pessimistic. The same logic also applies to such other currencies as Bitcoin and community currencies. Their recent diffusion has shown that Hayek's idea of denationalization of money and competition between multiple currencies in terms of its qualities, not its quantities sought as in ongoing quantitative easing, become more relevant under current situations. The qualities of money refer not only to stable monetary values and low transaction costs, but also to high ability in creating, sharing, and communicating social and cultural value. The potential of the logic of self-fulfillment of ideas can thus open up a new economic society when we realize that such various non-national currencies all depend on the same logic of money.", acknowledgement = ack-nhfb, tableofcontents = "1 The Enigma of Money: If We Understand Money, We Will Understand Economy / 1 \\ 1.1 What Is the ``Economy''? / 1 \\ 1.2 Plural Visions of ``Market'': Market as Metaphor / 2 \\ 1.3 ``Economy'' Is a Living Thing / 2 \\ 1.4 If We Understand Money, We Will Understand Economy / 3 \\ 1.5 The Enigma of Money: A ``Thing'' or an ``Event''? / 4 \\ 2 Is Money a ``Thing'' or an ``Event''? Reconsidering Money and Market / 7 \\ 2.1 Money and Okane / 7 \\ The Okane Story / 7 \\ Anything Can Be the Material of Money / 8 \\ Religious and Psychological Functions of Money / 9 \\ 2.2 What Is ``Market''?: Modern Economics Neglects Money / 10 \\ No Money, No Market/Commodity / 10 \\ Fictitious Markets in Modern Economics: What Is a ``Concentrated'' Market? / 11 \\ A Real Market: What Is a ``Distributed'' Market? / 13 \\ Bilateral Transactions Are Basic in a Real ``Distributed'' Market / 13 \\ Hicks' Classification of Markets: Flexprice and Fixprice Markets / 15 \\ 2.3 How Distributed Markets Work: Stock Markets and the Electronic Bazaar in the Real State of Affairs / 16 \\ How ``Price'' Is Determined / 16 \\ Market Price Fixing in Stock Markets: Itayose and Zaraba / 17 \\ The Stock Market as a Model of General Equilibrium Theory / 19 \\ Electronic Markets Two Decades Ago / 20 \\ Face-to-Face Trades and the Market for Lemons / 22 \\ Money Turns a Thing into a ``Commodity'' and a Place for Trading ``Commodities'' into a ``Market'' / 24 \\ 2.4 The Principles of Generating Money / 24 \\ Is Money the Same as Language? / 24 \\ Love and Barter Have Something in Common / 25 \\ When Money Comes into Existence / 26 \\ A Generative Model of Money / 26 \\ Imitation of Others' Wants Brings Money into Being / 28 \\ Diversity in Money / 30 \\ Negative Possibilities with Money / 30 \\ 2.5 Robinson Crusoe and Stone Money on Yap Island / 31 \\ The Story of Robinson Crusoe Tells How Hard It Is to Escape from Money / 31 \\ ``Economy'' Without a ``Society'' / 33 \\ Stone Money on Yap Island / 34 \\ Anything Can Be Money / 34 \\ 3 Money as ``The Self-Fulfillment of an Idea'': The Difference Between a Bank of Japan Note and Bitcoin / 37 \\ 3.1 Why Talk About Money Leads Us into a Circular Logic / 37 \\ Four Functions of Money / 37 \\ The Differences Between Money and Commodities / 38 \\ Money as the Emperor / 39 \\ Talk About Money Quickly Ends Up in a Circular Logic / 39 \\ 3.2 Thinking About Money Through ``The Emperor's New Clothes'' / 39 \\ A Ten Thousand Yen Bill as a Self-Fulfilling Idea / 39 \\ Money and the Story of ``Emperor's New Clothes'' / 40 \\ The Emperor Is Great, Even If He Is Wearing Nothing / 41 \\ Access Gift and a Ten Thousand Yen Bill / 41 \\ The Self-Fulfillment of Custom / 43 \\ The Self-Fulfillment of Expectations / 44 \\ Reality Is Strong When Built by Custom and Expectations / 45 \\ 3.3 Yenten as Pseudo-money / 46 \\ The Yenten Incident / 46 \\ Yenten as a Ponzi Scheme / 47 \\ Pseudo-Money by Means of a ``Prepaid Payment Instrument'' / 48 \\ Penny Auction / 49 \\ 3.4 What Does Bitcoin Tell Us? / 50 \\ Bitcoin: A Crypto-currency / 50 \\ Problems with Bitcoin / 52 \\ Bitcoin Spreads Out / 53 \\ Bitcoin and Free Software / 54 \\ Bitcoin Points to the Future: Denationalization of Money and Competing Currencies / 54 \\ 3.5 What Does the Informatization of Currency Mean? / 56 \\ Two Currents of Money: Toward Informatization and Creditization / 56 \\ Credit Money and Credit Creation / 56 \\ The Essence of Money Is Suggested by These Two Currents / 57 \\ When Money Changes, Markets Will Change / 58 \\ 4 The Disease Haunting Money: The Relation Between Money and Bubbles / 59 \\ 4.1 Humanity's Desire to Synchronize Creates Bubbles / 59 \\ The Word ``Bubble'' / 59 \\ The Heisei Bubble / 60 \\ What Is a Bubble? / 60 \\ Humanity's Selfish Desire to Synchronize with Others Creates It / 61 \\ Bubbles and the Theory of Evolution / 62 \\ 4.2 A History of Bubbles / 63 \\ The Tulip Bubble / 63 \\ Why Tulips? / 64 \\ Tulip Mania Accelerates / 64 \\ The Peak of a Feast Is the Beginning of Its End / 65 \\ A Man Named John Law / 66 \\ Law's Alchemy / 67 \\ Law's Magical System / 67 \\ Stock Mania in ``La Compagnie de la Louisiane ou d'Occident'' / 68 \\ The End of Law's System / 69 \\ The South Sea Bubble Company: Originator of a Bubble / 70 \\ A Shady Company = A Bubble Company / 71 \\ Geniuses Fooled by Bubbles / 72 \\ 4.3 Bubbles as a Self-Fulfilling Idea / 73 \\ Money and Bubbles Have Something in Common / 73 \\ The Sunspots Theory / 73 \\ Illusion and Reality / 74 \\ 4.4 Soros' Bubble Theory / 75 \\ Soros' ``Reflexivity'' / 75 \\ Eight Stages of Bubbles / 76 \\ The Contagiousness of Bubbles / 77 \\ 5 Why Is Capitalist Economy Unstable? On Hyperinflation and Speculation / 79 \\ 5.1 The Disease Haunting Capitalism Is Hyperinflation / 79 \\ When Money Breaks Down / 79 \\ Even If Money Vanishes, Another Money Will Emerge / 79 \\ 5.2 The Difference Between Investment and Speculation / 80 \\ Bubbles and Speculation / 80 \\ A Beauty Contest / 82 \\ 5.3 The Future of Money, the Future of Markets / 82 \\ Marx's and Keynes' Views on Money / 82 \\ Is Money Possible Without Booms or Bubbles? / 84 \\ Three Advantages and Three Shortcomings of Market Economy / 84 \\ The Focus Is Only on the Market's Shortcomings / 85 \\ Money and ``Trust'' / 86 \\ 6 The Crisis of Capitalism and the ``Quality'' of Money / 87 \\ 6.1 The Meaning of Occupy Wall Street / 87 \\ 6.2 Symptoms of the Crisis of Capitalism / 88 \\ 6.3 The Crisis in the United States and Japan / 89 \\ 6.4 The Quality of Money and Its ``Freedom to Evolve'' / 90 \\ 6.5 What Kind of Money Will Be Chosen and Survive? / 92 \\ Bibliography / 93", } @InProceedings{Nishibe:2016:MSF, author = "Makoto Nishibe", booktitle = "The Enigma of Money", title = "Money as The Self-Fulfillment of an Idea: The Difference Between a {Bank of Japan} Note and {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "37--58", year = "2016", DOI = "https://doi.org/10.1007/978-981-10-1819-0_3", ISBN = "981-10-1819-7", ISBN-13 = "978-981-10-1819-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-1819-0_3", acknowledgement = ack-nhfb, } @InCollection{Olnes:2016:BBE, author = "Svein {\O}lnes", booktitle = "Electronic Government", title = "Beyond {Bitcoin} Enabling Smart Government Using Blockchain Technology", publisher = pub-SV, address = pub-SV:adr, pages = "253--264", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-44421-5_20", ISBN = "3-319-44421-2", ISBN-13 = "978-3-319-44421-5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-44421-5_20", acknowledgement = ack-nhfb, } @Book{Orrell:2016:EM, author = "David Orrell and Roman Chlupat{\'y}", title = "The evolution of money", publisher = pub-U-COLUMBIA, address = pub-U-COLUMBIA:adr, pages = "309", year = "2016", ISBN = "0-231-17372-5 (hardcover)", ISBN-13 = "978-0-231-17372-8 (hardcover)", LCCN = "HG231 .O77 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Money; History", tableofcontents = "Origins \\ The money magnet \\ Virtual money \\ New world \\ A wonderful machine \\ The money power \\ Solid gold economics \\ New money \\ Changing the dominant monetary regime, Bit by Bitcoin \\ Utopia", } @InCollection{Ouaddah:2016:TNP, author = "Aafaf Ouaddah and Anas Abou Elkalam and Abdellah Ait Ouahman", booktitle = "Advances in Intelligent Systems and Computing", title = "Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in {IoT}", publisher = "Springer International Publishing", address = "????", pages = "523--533", month = sep, year = "2016", DOI = "https://doi.org/10.1007/978-3-319-46568-5_53", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Peck:2016:BCB, author = "M. Peck", title = "A blockchain currency that beat's {Bitcoin} on privacy [News]", journal = j-IEEE-SPECTRUM, volume = "53", number = "12", pages = "11--13", month = dec, year = "2016", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2016.7761864", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @InProceedings{Perelgut:2016:HIY, author = "Stephen Perelgut and Colette Lacroix", booktitle = "{Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering}", title = "Hands-on: Implement Your First Blockchain Solution", publisher = pub-IBM, address = pub-IBM:adr, pages = "350--350", year = "2016", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CASCON '16", URL = "http://dl.acm.org/citation.cfm?id=3049877.3049937", acknowledgement = ack-nhfb, acmid = "3049937", location = "Toronto, Ontario, Canada", pagecount = "1", } @Article{Perez-Marco:2016:BDT, author = "Ricardo {P{\'e}rez-Marco}", title = "{Bitcoin} and decentralised trust protocols", journal = j-EUR-MATH-SOC-NEWSL, volume = "100", pages = "31--38", year = "2016", ISSN = "1027-488X", MRclass = "91B64 94A60", bibdate = "Tue Dec 5 09:05:30 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", ZMnumber = "06669060; 1354.91102", acknowledgement = ack-nhfb, fjournal = "European Mathematical Society Newsletter", } @InProceedings{Perez-Sola:2016:PBT, author = "Jordi Herrera-Joancomart{\'\i}Cristina P{\'e}rez-Sol{\`a}", booktitle = "{Modeling Decisions for Artificial Intelligence}", title = "Privacy in {Bitcoin} Transactions: New Challenges from Blockchain Scalability Solutions", publisher = pub-SV, address = pub-SV:adr, year = "2016", DOI = "https://doi.org/10.1007/978-3-319-45656-0_3", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-45656-0_3", acknowledgement = ack-nhfb, } @InCollection{Peters:2016:UMB, author = "Gareth W. Peters and Efstathios Panayi", booktitle = "Banking Beyond Banks and Money", title = "Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the {Internet of Money}", publisher = pub-SV, address = pub-SV:adr, pages = "239--278", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42448-4_13", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-42448-4_13", acknowledgement = ack-nhfb, } @InCollection{Pilkington:2016:BTP, author = "Marc Pilkington", title = "Blockchain technology: principles and applications", crossref = "Olleros:2016:RHD", pages = "225--253", year = "2016", DOI = "https://doi.org/10.4337/9781784717766.00019", bibdate = "Sat Jan 20 16:51:16 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Pinzon:2016:DSA, author = "Carlos Pinz{\'o}n and Camilo Rocha", booktitle = "{CLEI} 2016---{The} {Latin} {American} {Computing} {Conference}", title = "Double-spend attack models with time advantange for {Bitcoin}", volume = "329", publisher = "Elsevier Sci. B. V., Amsterdam", pages = "79--103", year = "2016", DOI = "https://doi.org/10.1016/j.entcs.2016.12.006", MRclass = "68P25", MRnumber = "3598278", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Electron. Notes Theor. Comput. Sci.", acknowledgement = ack-nhfb, } @Article{Pomp:2016:BOW, author = "Marloes Pomp and Maarten-Jan de Wit and Jorrit Wigchert and Irene Schoemakers", title = "Blockchains: op weg naar geautomatiseerd vertrouwen. ({Dutch}) [{Blockchains}: on the road to automated trust]", journal = "{HEADline}", volume = "33", number = "4", pages = "14--16", month = oct, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s40739-016-0042-x", ISSN = "", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s40739-016-0042-x", acknowledgement = ack-nhfb, } @Book{Popper:2016:DGB, author = "Nathaniel Popper", title = "Digital gold: {Bitcoin} and the inside story of the misfits and millionaires trying to reinvent money", publisher = "Harper", address = "New York, NY, USA", pages = "xv + 412", year = "2016", ISBN = "0-06-236250-X (paperback)", ISBN-13 = "978-0-06-236250-6 (paperback)", LCCN = "HG1710 .P68 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "``A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.Digital Gold is New York Times reporter Nathaniel Popper's brilliant and engrossing history of Bitcoin, the landmark digital money and financial technology that has spawned a global social movement.The notion of a new currency, maintained by the computers of users around the world, has been the butt of many jokes, but that has not stopped it from growing into a technology worth billions of dollars, supported by the hordes of followers who have come to view it as the most important new idea since the creation of the Internet. Believers from Beijing to Buenos Aires see the potential for a financial system free from banks and governments. More than just a tech industry fad, Bitcoin has threatened to decentralize some of society's most basic institutions.An unusual tale of group invention, Digital Gold charts the rise of the Bitcoin technology through the eyes of the movement's colorful central characters, including a British anarchist, an Argentinian millionaire, a Chinese entrepreneur, Tyler and Cameron Winklevoss, and Bitcoin's elusive creator, Satoshi Nakamoto. Already, Bitcoin has led to untold riches for some, and prison terms for others.Digital Gold includes 16 pages of black-and-white photos''", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Money; Credit; Electronic commerce", } @Article{Reijers:2016:BNT, author = "Wessel Reijers and Mark Coeckelbergh", title = "The Blockchain as a Narrative Technology: Investigating the Social Ontology and Normative Configurations of Cryptocurrencies", journal = "Philosophy \& Technology", volume = "??", number = "??", pages = "1--28", month = oct, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13347-016-0239-x", ISSN = "2210-5433 (print), 2210-5441 (electronic)", ISSN-L = "2210-5433", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s13347-016-0239-x", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/13347", } @InProceedings{Samaniego:2016:UBP, author = "Mayra Samaniego and Ralph Deters", booktitle = "{Proceedings of the International Conference on Big Data and Advanced Wireless Technologies}", title = "Using Blockchain to Push Software-Defined {IoT} Components Onto Edge Hosts", publisher = pub-ACM, address = pub-ACM:adr, pages = "58:1--58:9", year = "2016", DOI = "https://doi.org/10.1145/3010089.3016027", ISBN = "1-4503-4779-7", ISBN-13 = "978-1-4503-4779-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BDAW '16", URL = "http://doi.acm.org/10.1145/3010089.3016027", acknowledgement = ack-nhfb, acmid = "3016027", articleno = "58", keywords = "Blockchain; Edge Computing; IoT; Software-Defined IoT; Virtual Resources", location = "Blagoevgrad, Bulgaria", pagecount = "9", } @InProceedings{Sanda:2016:PNA, author = "T. Sanda and H. Inaba", booktitle = "2016 {IEEE 5th} Global Conference on Consumer Electronics", title = "Proposal of new authentication method in {Wi-Fi} access using {Bitcoin 2.0}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--5", month = oct, year = "2016", DOI = "https://doi.org/10.1109/GCCE.2016.7800479", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Authentication; authentication method; authorisation; Blockchain; computer network security; cryptography; Cryptography; encryption keys; IEEE 802.11 Standard; illegal person; Online banking; Proposals; Protocols; Servers; user access; Wi-Fi access; Wi-Fi hotspots; wireless LAN; {Bitcoin} 2.0", } @InProceedings{Sengupta:2016:RBB, author = "Binanda Sengupta and Samiran Bag and Sushmita Ruj and Kouichi Sakurai", booktitle = "Proceedings of the 17th International Conference on Distributed Computing and Networking", title = "{Retricoin}: {Bitcoin} Based on Compact Proofs of Retrievability", publisher = pub-ACM, address = pub-ACM:adr, pages = "14:1--14:10", year = "2016", DOI = "https://doi.org/10.1145/2833312.2833317", ISBN = "1-4503-4032-6", ISBN-13 = "978-1-4503-4032-8", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICDCN '16", acknowledgement = ack-nhfb, acmid = "2833317", articleno = "14", keywords = "bilinear pairings, Bitcoin, mining pool, proofs of retrievability", location = "Singapore, Singapore", pagecount = "10", } @InCollection{Sharples:2016:BKD, author = "Mike Sharples and John Domingue", booktitle = "Adaptive and Adaptable Learning", title = "The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward", publisher = pub-SV, address = pub-SV:adr, pages = "490--496", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-45153-4_48", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-45153-4_48", acknowledgement = ack-nhfb, } @Article{Shi:2016:NPW, author = "Ning Shi", title = "A new proof-of-work mechanism for {Bitcoin}", journal = "Financial Innovation", volume = "2", number = "1", pages = "99--122", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0045-6", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0045-6", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @InProceedings{Shrestha:2016:TDD, author = "Ajay Kumar Shrestha and Julita Vassileva", booktitle = "{Proceedings of the International Conference on Big Data and Advanced Wireless Technologies}", title = "Towards Decentralized Data Storage in General Cloud Platform for Meta-products", publisher = pub-ACM, address = pub-ACM:adr, pages = "60:1--60:7", year = "2016", DOI = "https://doi.org/10.1145/3010089.3016029", ISBN = "1-4503-4779-7", ISBN-13 = "978-1-4503-4779-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BDAW '16", URL = "http://doi.acm.org/10.1145/3010089.3016029", acknowledgement = ack-nhfb, acmid = "3016029", articleno = "60", keywords = "Blockchain; Cloud Computing; Cloud Services; Distributed Architecture; IOT; Meta-Products; Smart Contract", location = "Blagoevgrad, Bulgaria", pagecount = "7", } @Misc{Sirer:2016:BGS, author = "Emin G{\"u}n Sirer", title = "{Bitcoin} guarantees strong, not eventual, consistency", howpublished = "Hacking, Distributed", year = "2016", bibdate = "Thu Nov 30 17:42:58 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://hackingdistributed.com/2016/03/01/bitcoin-guarantees-strong-not-eventual-consistency/.", acknowledgement = ack-nhfb, } @Article{Sirer:2016:TPS, author = "Emin G{\"u}n Sirer", title = "Technical Perspective: The state (and security) of the {Bitcoin} economy", journal = j-CACM, volume = "59", number = "4", pages = "85--85", month = apr, year = "2016", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2896382", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Apr 15 14:58:10 MDT 2016", bibsource = "http://www.acm.org/pubs/contents/journals/cacm/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://cacm.acm.org/magazines/2016/4/200172/fulltext", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{SM-D:2016:BRB, author = "{SM-D}", title = "Book Review: {{\booktitle{Bitcoin and Cryptocurrency Technologies}}, Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder}", journal = j-NETWORK-SECURITY, volume = "2016", number = "8", pages = "4--4", month = aug, year = "2016", CODEN = "NTSCF5", DOI = "https://doi.org/10.1016/s1353-4858(16)30074-5", ISSN = "1353-4858 (print), 1872-9371 (electronic)", ISSN-L = "1353-4858", bibdate = "Fri Dec 1 12:11:55 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1353485816300745", acknowledgement = ack-nhfb, fjournal = "Network Security", journal-URL = "https://www.sciencedirect.com/journal/network-security", } @InProceedings{Song:2016:FVC, author = "Dawn Song", booktitle = "{Proceedings of the 16th Conference on Formal Methods in Computer-Aided Design}", title = "Formal Verification for Computer Security: Lessons Learned and Future Directions", publisher = "FMCAD Inc", address = "Austin, TX", pages = "1--1", year = "2016", ISBN = "0-9835678-6-7", ISBN-13 = "97-80983-567-8-6-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "FMCAD '16", URL = "http://dl.acm.org/citation.cfm?id=3077629.3077630", acknowledgement = ack-nhfb, acmid = "3077630", location = "Mountain View, California", pagecount = "1", } @PhdThesis{Song:2016:SBP, author = "Yunfei Song", title = "A study of {Bitcoin} price's relationship with local currency exchange rate and stock market index in emerging economies using {VECM}", type = "{Ph.D.}", school = "Fordham University", address = "New York, NY, USA", pages = "117", year = "2016", ISBN = "1-369-61079-3", ISBN-13 = "978-1-369-61079-6", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1878929754", abstract = "This study gave an overview of the development of Bitcoin and several key economic aspects of its network. Using Johansen's method, it explored the co-integration relationship among Bitcoin price, local currency exchange rate and stock market index in selected emerging economies. It investigated Bitcoin price's impact on these local currency exchange rates and their stock market indices respectively using the Vector Error Correction Model (VECM). It further demonstrated these impacts using the Impulse Response Function. The findings in this study indicate that Bitcoin price co-integrates with the local currencies' exchange rates, with Mexico and Russia being the exception. Despite different short-term responses, in the long term, local currency tends to strengthen against dollar given a decrease of Bitcoin price in the local currency, or an increase of Bitcoin price in dollar. In addition, stock market index's response to a positive shock on Bitcoin price varies across economies, some saw stick rally while others selloff.", acknowledgement = ack-nhfb, advisor = "Erick W. Rengifo", keywords = "0501:Economics; Bitcoin; Economics; Social sciences; Vector Error Correction model", ris-m1 = "10246887", } @Article{Sun:2016:BBS, author = "Jianjun Sun and Jiaqi Yan and Kem Z. K. Zhang", title = "Blockchain-based sharing services: What blockchain technology can contribute to smart cities", journal = "Financial Innovation", volume = "2", number = "1", pages = "??--??", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0040-y", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0040-y", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @Misc{Supra:2016:IHC, author = "J. D. Supra", title = "Investment Highlights from {CoinDesk};s State of the Blockchain", howpublished = "Web document.", day = "30", month = nov, year = "2016", bibdate = "Mon Dec 04 15:19:24 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Swan:2016:BTS, author = "Melanie Swan", booktitle = "{Rule Technologies. Research, Tools, and Applications}", title = "Blockchain Temporality: Smart Contract Time Specifiability with Blocktime", publisher = pub-SV, address = pub-SV:adr, pages = "184--196", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42019-6_12", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-42019-6_12", acknowledgement = ack-nhfb, } @MastersThesis{Sweatman:2016:BBD, author = "Helen Sweatman", title = "The Building Blocks of Digital Art Marketing: a Market Analysis of the Digital Art Market and Its Application to Blockchain Technology", type = "{M.A.}", school = "Sotheby's Institute of Art --- New York", address = "New York, NY, USA", pages = "83", year = "2016", ISBN = "0-355-51156-8", ISBN-13 = "978-0-355-51156-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1976101936", abstract = "Traditional notions of authorship and ownership are changing, spurred on by the radical technological innovations of the Internet, e-commerce, and social media. Just as technology has recently disrupted businesses in the music, film, and book industries, so too will it have a significant impact on the art market and challenge its understanding of authorship and ownership. The contemporary digital art market will be used as a case study to explore this trend, finding that many of the current commercial practices for exhibiting and selling digital art limits its creative scope, and thus its critical value and market value. This thesis will explore a novel alternative approach, arising from a new technology known as ``blockchain,'' as a way in which to respond to these shortcomings. It will be argued that this technology has the potential to raise the marketability and commercial value of digital art but will require promotion within the industry. Marketing strategies to promote the adoption of the blockchain system will be considered.", acknowledgement = ack-nhfb, advisor = "Paul Melton", keywords = "0338:Marketing; 0357:Fine arts; 0505:Commerce-Business; 0513:Intellectual Property; Blockchain; Commerce-Business; Communication and the arts; Digital art; Distributed ledger; e-Commerce; Fine arts; Intellectual Property; Marketing; Ownership rights; Provenance; Social sciences", ris-m1 = "10259584", } @Book{Tapscott:2016:BRHa, author = "Don Tapscott and Alex Tapscott", title = "Blockchain revolution: how the technology behind {Bitcoin} is changing money, business, and the world", publisher = "Portfolio / Penguin", address = "New York, NY, USA", pages = "xx + 348", year = "2016", ISBN = "1-101-98013-3 (hardcover), 1-101-98015-X (e-book), 0-399-56406-3 (International edition)", ISBN-13 = "978-1-101-98013-2 (hardcover), 978-1-101-98015-6 (e-book), 978-0-399-56406-2 (International edition)", LCCN = "HG1710 .T385 2016", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1947--", subject = "Electronic funds transfers; Blockchains (Databases); Bitcoin; Electronic commerce; Mobile commerce; Banks and banking; Technological innovations; Financial institutions", } @Book{Tapscott:2016:BRHb, author = "Don Tapscott and Alex Tapscott and Jeff Cummings", title = "Blockchain revolution: [how the technology behind {Bitcoin} is changing money, business, and the world]", publisher = "Brilliance Audio", address = "Grand Haven, MI, USA", year = "2016", ISBN = "1-5113-5766-5", ISBN-13 = "978-1-5113-5766-1", LCCN = "RZC 5626", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", note = "11 audio discs (14 hr., 17 min.).", abstract = "Although many opportunities for the blockchain require a digital currency, Bitcoin is only one application of this great innovation in computer science. The blockchain can hold any legal document, from deeds and marriage licenses to educational degrees and birth certificates. Call it the World Wide Ledger. It enables smart contracts, decentralized autonomous organizations, decentralized government services, and transactions among other things. The Internet of Everything needs a Ledger of Everything: the blockchain is a truly open, distributed, global platform that fundamentally changes what people can do online, how they do it, and who can participate.", acknowledgement = ack-nhfb, author-dates = "1947--", remark = "Subtitle from container. Compact disc. Accompanying reference guide included as a PDF on bonus disc.", subject = "Electronic funds transfers; Bitcoin; Electronic commerce; Mobile commerce; Banks and banking; Technological innovations; Financial institutions; Technological innovations; Bitcoin; Electronic commerce; Electronic funds transfers; Technological innovations; Mobile commerce", } @Misc{Timon:2016:FPP, author = "J. Timo{\'n} and M. Friedenbach", title = "{Freicoin}: a peer-to-peer digital currency delivering freedom from usury", howpublished = "Web site", year = "2016", bibdate = "Sun Jan 21 08:50:38 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://freico.in/", abstract = "Freicoin is a peer-to-peer (P2P) currency based on the accounting concept of a proof-of-work block chain used by Satoshi Nakamoto in the creation of Bitcoin.\par Unlike Bitcoin, Freicoin has a demurrage fee that ensures its circulation and bearers of the currency pay this fee automatically. This demurrage fee was proposed by Silvio Gesell to eliminate the privileged position held by money compared with capital goods, which is the underlying cause of the boom\slash bust business cycle and the entrenchment of the financial elite, and has been tested several times with positive results.", acknowledgement = ack-nhfb, } @Article{Tschorsch:2016:BBT, author = "Florian Tschorsch and Bj{\"o}rn Scheuermann", title = "{Bitcoin} and Beyond: a Technical Survey on Decentralized Digital Currencies", journal = "IEEE Communications Surveys Tutorials", volume = "18", number = "3", pages = "2084--2123", month = "Third Quarter", year = "2016", CODEN = "????", DOI = "https://doi.org/10.1109/COMST.2016.2535718", ISSN = "1553-877X", ISSN-L = "1553-877X", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/comsur/comsur18.html#TschorschS16; https://www.wikidata.org/entity/Q56622168", acknowledgement = ack-nhfb, ajournal = "IEEE Commun. Surv. Tutorials", dblp-key = "journals/comsur/TschorschS16", dblp-mdate = "2020-04-09", keywords = "Altcoins; billion dollar economy; blockchain; Contracts; cryptocurrencies; Cryptography; decentralized digital currency; design space exploration; digital currencies; distributed consensus; electronic money; Internet; Online banking; Protocols; Space exploration; survey; tutorial; Tutorials; {Bitcoin}; {Bitcoin} protocol", } @InCollection{Ulieru:2016:BBA, author = "Mihaela Ulieru", booktitle = "{Banking Beyond Banks and Money}", title = "{Blockchain 2.0} and Beyond: Adhocracies", publisher = pub-SV, address = pub-SV:adr, pages = "297--303", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-42448-4_15", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-42448-4_15", acknowledgement = ack-nhfb, } @Article{Underwood:2016:NBB, author = "Sarah Underwood", title = "News: Blockchain beyond {Bitcoin}", journal = j-CACM, volume = "59", number = "11", pages = "15--17", month = nov, year = "2016", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/2994581", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Oct 31 16:06:16 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "http://cacm.acm.org/magazines/2016/11/209132/fulltext", abstract = "Blockchain technology has the potential to revolutionize applications and redefine the digital economy.", acknowledgement = ack-nhfb, acmid = "2994581", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", pagecount = "3", } @InProceedings{Upadhyaya:2016:CEC, author = "R. Upadhyaya and A. Jain", booktitle = "2016 International Conference on Computing, Communication and Automation {(ICCCA)}", title = "Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and {Bitcoin} wallet", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "143--148", month = apr, year = "2016", DOI = "https://doi.org/10.1109/CCAA.2016.7813706", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Algorithm design and analysis; bitcoin; bitcoin wallet; computer crime; Computers; consumer confidence; crypto virus; cryptographic protocols; cryptography; cryptolocker ransomware; CTB locker; cyber crime; cyber ethics; cyber Laws; cyber wars; darknet; e-commerce; electronic commerce; Electronic mail; Encryption; information systems; Internet; invasive software; legality; locker bot; malware; ransomware; The Dark Net; tor; trojan horse; Trojan horses; underground Web; Web threats", } @InProceedings{Velasco:2016:SBE, author = "Pablo R. Velasco", booktitle = "Innovative Methods in Media and Communication Research", title = "Sketching {Bitcoin}: Empirical Research of Digital Affordances", publisher = pub-SV, address = pub-SV:adr, pages = "99--122", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-40700-5_6", ISBN = "3-319-40700-7", ISBN-13 = "978-3-319-40700-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-40700-5_6", acknowledgement = ack-nhfb, } @Article{Viana:2016:TTI, author = "Diego Viana", title = "Two Technical Images: Blockchain and High-Frequency Trading", journal = "Philosophy \& Technology", volume = "??", number = "??", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13347-016-0247-x", ISSN = "2210-5433 (print), 2210-5441 (electronic)", ISSN-L = "2210-5433", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s13347-016-0247-x", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/13347", } @InProceedings{Vilim:2016:ABM, author = "Matthew Vilim and Henry Duwe and Rakesh Kumar", booktitle = "Proceedings of the 53rd Annual Design Automation Conference", title = "Approximate {Bitcoin} mining", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "97:1--97:6", month = jun, year = "2016", DOI = "https://doi.org/10.1145/2897937.2897988", ISBN = "1-4503-4236-1", ISBN-13 = "978-1-4503-4236-0", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Algorithm design and analysis; Approximate Computing; approximate mining circuits; approximate {Bitcoin} mining; Approximation algorithms; better than worst-case; BTWC; computation intensive process; cryptocurrency; cryptography; Cryptography; data mining; Delays; Error-Tolerance; fault tolerant computing; financial data processing; Hardware; Online banking; Pipelines; probability; SHA-256; {Bitcoin}; {Bitcoin} framework; {Bitcoin} transactions", } @InCollection{Vukolic:2016:QSB, author = "Marko Vukoli{\'c}", booktitle = "{Open Problems in Network Security}", title = "The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. {BFT} Replication", publisher = pub-SV, address = pub-SV:adr, pages = "112--125", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-39028-4_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-39028-4_9", acknowledgement = ack-nhfb, } @Article{Wang:2016:MMB, author = "Huaiqing Wang and Kun Chen and Dongming Xu", title = "A maturity model for blockchain adoption", journal = "Financial Innovation", volume = "2", number = "1", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0031-z", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0031-z", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @InCollection{Weber:2016:UBP, author = "Ingo Weber and Xiwei Xu and R{\'e}gis Riveret and Guido Governatori and Alexander Ponomarev and Jan Mendling", booktitle = "{Business Process Management}", title = "Untrusted Business Process Monitoring and Execution Using Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "329--347", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-45348-4_19", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-45348-4_19", acknowledgement = ack-nhfb, } @InProceedings{Wijaya:2016:ABT, author = "Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Shi-Feng Sun and Xinyi Huang", booktitle = "Information Security Practice and Experience", title = "Anonymizing {Bitcoin} Transaction", publisher = pub-SV, address = pub-SV:adr, pages = "271--283", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-49151-6_19", ISBN = "3-319-49151-2", ISBN-13 = "978-3-319-49151-6", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-49151-6_19", acknowledgement = ack-nhfb, } @InProceedings{Wijaya:2016:EAM, author = "D. A. Wijaya", booktitle = "2016 International Conference on Computer, Control, Informatics and its Applications {(IC3INA)}", title = "Extending asset management system functionality in {Bitcoin} platform", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "97--101", month = oct, year = "2016", DOI = "https://doi.org/10.1109/IC3INA.2016.7863031", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "asset management; Asset management; asset management; asset management system; bitcoin; bitcoin platform; blockchain; data; digital payment system; distributed database; distributed databases; electronic money; Mathematical model; Online banking; open ledger; Peer-to-peer computing; Protocols; Public key; record-keeping tool", } @InProceedings{Wrner:2016:DRT, author = "Dominic W{\"o}rner", booktitle = "Tackling Society's Grand Challenges with Design Science", title = "Design of a Real-Time Data Market Based on the 21 {Bitcoin} Computer", publisher = pub-SV, address = pub-SV:adr, pages = "228--232", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-39294-3_20", ISBN = "3-319-39294-8", ISBN-13 = "978-3-319-39294-3", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-39294-3_20", acknowledgement = ack-nhfb, } @Article{Xu:2016:BIA, author = "Jennifer J. Xu", title = "Are blockchains immune to all malicious attacks?", journal = "Financial Innovation", volume = "2", number = "1", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0046-5", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0046-5", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @InProceedings{Yamada:2016:BLS, author = "Yuki Yamada and Tatsuo Nakajima and Mizuki Sakamoto", booktitle = "{Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media}", title = "{Blockchain-LI}: A Study on Implementing Activity-Based Micro-Pricing Using Cryptocurrency Technologies", publisher = pub-ACM, address = pub-ACM:adr, pages = "203--207", year = "2016", DOI = "https://doi.org/10.1145/3007120.3007151", ISBN = "1-4503-4806-8", ISBN-13 = "978-1-4503-4806-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "MoMM '16", URL = "http://doi.acm.org/10.1145/3007120.3007151", acknowledgement = ack-nhfb, acmid = "3007151", keywords = "Blockchain; Human behavior change; Mobile devices; Mobile payment; Transaction costs", location = "Singapore, Singapore", pagecount = "5", } @Article{Yue:2016:HDG, author = "Xiao Yue and Huiju Wang and Dawei Jin and Mingqiang Li and Wei Jiang", title = "Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control", journal = j-J-MED-SYST, volume = "40", number = "10", month = aug, year = "2016", CODEN = "JMSYDA", DOI = "https://doi.org/10.1007/s10916-016-0574-6", ISSN = "", ISSN-L = "0148-5598", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10916-016-0574-6", acknowledgement = ack-nhfb, fjournal = "Journal of Medical Systems", journal-URL = "http://link.springer.com/journal/10916", } @Article{Zeilinger:2016:DAM, author = "Martin Zeilinger", title = "Digital Art as `Monetised Graphics': Enforcing Intellectual Property on the Blockchain", journal = "Philosophy \& Technology", volume = "??", number = "??", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13347-016-0243-1", ISSN = "2210-5433 (print), 2210-5441 (electronic)", ISSN-L = "2210-5433", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s13347-016-0243-1", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/13347", } @InProceedings{Zhang:2016:TCA, author = "Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi", booktitle = "{Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}", title = "{Town Crier}: An Authenticated Data Feed for Smart Contracts", publisher = pub-ACM, address = pub-ACM:adr, pages = "270--282", year = "2016", DOI = "https://doi.org/10.1145/2976749.2978326", ISBN = "1-4503-4139-X", ISBN-13 = "978-1-4503-4139-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '16", URL = "http://doi.acm.org/10.1145/2976749.2978326", acknowledgement = ack-nhfb, acmid = "2978326", keywords = "authenticated data feeds, Bitcoin, Ethereum, intel SGX, smart contracts, trusted hardware", location = "Vienna, Austria", pagecount = "13", } @InCollection{Zhao:2016:HVP, author = "Zhichao Zhao and T.-H. Hubert Chan", booktitle = "Information and Communications Security", title = "How to Vote Privately Using {Bitcoin}", volume = "9543", publisher = pub-SV, address = pub-SV:adr, pages = "82--96", year = "2016", DOI = "https://doi.org/10.1007/978-3-319-29814-6_8", ISBN = "3-319-29814-3", ISBN-13 = "978-3-319-29814-6", MRclass = "94A60", MRnumber = "3502793", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-29814-6_8", acknowledgement = ack-nhfb, } @Article{Zhao:2016:OBI, author = "J. Leon Zhao and Shaokun Fan and Jiaqi Yan", title = "Overview of business innovations and research opportunities in blockchain and introduction to the special issue", journal = "Financial Innovation", volume = "2", number = "1", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0049-2", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See erratum \cite{Zhao:2017:EOB}.", URL = "http://link.springer.com/article/10.1186/s40854-016-0049-2", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @InProceedings{Zhou:2016:DBA, author = "X. Zhou and Q. Wu and B. Qin and X. Huang and J. Liu", booktitle = "{2016 IEEE Trustcom\slash BigDataSE\slash ISPA}", title = "Distributed {Bitcoin} Account Management", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "105--112", month = aug, year = "2016", DOI = "https://doi.org/10.1109/TrustCom.2016.0052", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "attribute based encryption; bitcoin protocols; Companies; Cryptography; DBAM framework; distributed bitcoin account management; distributed electronic cash; electronic money; Elliptic curves; financial data processing; Investment; Online banking; Privacy; private key; private key cryptography; Protocols; secret sharing", } @Article{Zhu:2016:AOA, author = "Huasheng Zhu and Zach Zhizhong Zhou", title = "Analysis and outlook of applications of blockchain technology to equity crowdfunding in {China}", journal = "Financial Innovation", volume = "2", number = "1", month = dec, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-016-0044-7", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40854-016-0044-7", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @InProceedings{Zhu:2016:IIS, author = "Y. Zhu and R. Guo and G. Gan and W. T. Tsai", booktitle = "2016 {IEEE 40th} Annual Computer Software and Applications Conference {(COMPSAC)}", title = "Interactive Incontestable Signature for Transactions Confirmation in {Bitcoin} Blockchain", volume = "1", number = "", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "443--448", month = jun, year = "2016", DOI = "https://doi.org/10.1109/COMPSAC.2016.142", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin blockchain; Blockchain; computational law; Computer security; cybersecurity; dealer incontestability; digital signatures; electronic money; Generators; IIS scheme; interactive incontestable signature; Interactive Proof; nonrepudiation; Online banking; owner unforgeability; payment; Protocols; Public key; Signature; stock exchange; Stock markets; transaction confirmation", } @InProceedings{Abbasi:2017:VVI, author = "Abdul Ghafoor Abbasi and Zaheer Khan", booktitle = "{Companion Proceedings of the10th International Conference on Utility and Cloud Computing}", title = "{VeidBlock}: Verifiable Identity Using Blockchain and Ledger in a Software Defined Network", publisher = pub-ACM, address = pub-ACM:adr, pages = "173--179", year = "2017", DOI = "https://doi.org/10.1145/3147234.3148088", ISBN = "1-4503-5195-6", ISBN-13 = "978-1-4503-5195-9", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "UCC '17 Companion", URL = "http://doi.acm.org/10.1145/3147234.3148088", acknowledgement = ack-nhfb, acmid = "3148088", keywords = "authentication; blockchain; ledger; privacy; software defined network; verifiable", location = "Austin, Texas, USA", pagecount = "7", } @InProceedings{Abdelraheem:2017:SER, author = "Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann", title = "Searchable Encrypted Relational Databases: Risks and Countermeasures", crossref = "Garcia-Alfaro:2017:DPM", pages = "70--85", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_5", acknowledgement = ack-nhfb, } @Article{Achenbach:2017:BIR, author = "Dirk Achenbach and Ingmar Baumgart and Jochen Rill", title = "{Die Blockchain im Rampenlicht}. ({German}) [{The} blockchain in the spotlight]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "11", pages = "673--677", month = oct, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0856-2", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0856-2", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @InCollection{Adams:2017:BGD, author = "Richard Adams and Beth Kewell and Glenn Parry", booktitle = "World Sustainability Series", title = "Blockchain for Good? {Digital} Ledger Technology and Sustainable Development Goals", publisher = "Springer International Publishing", address = "????", pages = "127--140", month = oct, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67122-2_7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Akoka:2017:MET, author = "Jacky Akoka and Isabelle Comyn-Wattiau", booktitle = "Conceptual Modeling Perspectives", title = "A Method for Emerging Technology Evaluation. {Application} to Blockchain and Smart Data Discovery", publisher = pub-SV, address = pub-SV:adr, pages = "247--258", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67271-7_17", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67271-7_17", acknowledgement = ack-nhfb, } @InProceedings{Al-Bassam:2017:SSC, author = "Mustafa Al-Bassam", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "{SCPKI}: A Smart Contract-based {PKI} and Identity System", publisher = pub-ACM, address = pub-ACM:adr, pages = "35--40", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055530", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055530", acknowledgement = ack-nhfb, acmid = "3055530", location = "Abu Dhabi, United Arab Emirates", pagecount = "6", } @InProceedings{Ali:2017:IDP, author = "Muhammad Salek Ali and Koustabh Dolui and Fabio Antonelli", booktitle = "{Proceedings of the Seventh International Conference on the Internet of Things}", title = "{IoT} Data Privacy via Blockchains and {IPFS}", publisher = pub-ACM, address = pub-ACM:adr, pages = "14:1--14:7", year = "2017", DOI = "https://doi.org/10.1145/3131542.3131563", ISBN = "1-4503-5318-5", ISBN-13 = "978-1-4503-5318-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoT '17", URL = "http://doi.acm.org/10.1145/3131542.3131563", acknowledgement = ack-nhfb, acmid = "3131563", articleno = "14", keywords = "blockchain; computer networks; distributed access model; internet of things; privacy", location = "Linz, Austria", pagecount = "7", } @InCollection{AlOmar:2017:MBB, author = "Abdullah {Al Omar} and Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto", booktitle = "Security, Privacy, and Anonymity in Computation, Communication, and Storage", title = "{MediBchain}: A Blockchain Based Privacy Preserving Platform for Healthcare Data", publisher = pub-SV, address = pub-SV:adr, pages = "534--543", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-72395-2_49", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-72395-2_49", acknowledgement = ack-nhfb, } @InProceedings{Anceaume:2017:BDS, author = "Emmanuelle Anceaume and Romaric Ludinard and Maria Potop-Butucaru and Fr{\'e}d{\'e}ric Tronel", booktitle = "Stabilization, Safety, and Security of Distributed Systems", title = "{Bitcoin} a Distributed Shared Register", publisher = pub-SV, address = pub-SV:adr, pages = "456--468", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69084-1_34", ISBN = "3-319-69084-1", ISBN-13 = "978-3-319-69084-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69084-1_34", acknowledgement = ack-nhfb, } @InProceedings{Angeletti:2017:PPD, author = "Fabio Angeletti and Ioannis Chatzigiannakis and Andrea Vitaletti", booktitle = "{Proceedings of the First International Workshop on Human-centered Sensing, Networking, and Systems}", title = "Privacy Preserving Data Management in Recruiting Participants for Digital Clinical Trials", publisher = pub-ACM, address = pub-ACM:adr, pages = "7--12", year = "2017", DOI = "https://doi.org/10.1145/3144730.3144733", ISBN = "1-4503-5480-7", ISBN-13 = "978-1-4503-5480-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "HumanSys'17", URL = "http://doi.acm.org/10.1145/3144730.3144733", acknowledgement = ack-nhfb, acmid = "3144733", keywords = "Blockchain; Clinical Trial; IoT; mHealth; Privacy; Wearables", location = "Delft, Netherlands", pagecount = "6", } @Misc{Anonymous:2017:BDD, author = "Anonymous", title = "[{Bitcoin}] Developer Documentation", howpublished = "Web site.", year = "2017", bibdate = "Mon Dec 04 08:31:22 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcoin.org/en/developer-documentation", acknowledgement = ack-nhfb, lastaccessed = "04 December 2017", } @Misc{Anonymous:2017:BPP, author = "Anonymous", title = "{Bitcoin}: A Peer-to-Peer Electronic Cash System: The paper that first introduced {Bitcoin}", howpublished = "Web site", year = "2017", bibdate = "Mon Dec 04 08:29:37 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "Includes links to translations of the 2008 Nakamoto paper to several other languages.", URL = "https://bitcoin.org/en/bitcoin-paper", acknowledgement = ack-nhfb, lastaccessed = "04 December 2017", } @Misc{Anonymous:2017:BW, author = "Anonymous", title = "{Bitcoin} Wiki", howpublished = "Web site", year = "2017", bibdate = "Mon Dec 04 08:32:13 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://en.bitcoin.it/wiki/Main_Page", acknowledgement = ack-nhfb, lastaccessed = "04 December 2017", } @Misc{Anonymous:2017:HDB, author = "Anonymous", title = "How does {Bitcoin} work?", howpublished = "Web site.", year = "2017", bibdate = "Mon Dec 04 08:27:23 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bitcoin.org/en/how-it-works", acknowledgement = ack-nhfb, } @Article{Anonymous:2017:VPC, author = "Anonymous", title = "{Venezuela} Plans a Cryptocurrency, {Maduro} Says", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "3", month = dec, year = "2017", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Feb 20 07:51:10 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2017/12/03/world/americas/venezuela-cryptocurrency-maduro.html", abstract = "The ``petro'' will be used in the country's fight against the Trump administration's financial ``blockade,'' President Nicolas Maduro said.", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @InProceedings{Apostolaki:2017:HBR, author = "Maria Apostolaki and Aviv Zohar and Laurent Vanbever", booktitle = "2017 {IEEE} Symposium on Security and Privacy {(SP)}", title = "Hijacking {Bitcoin}: Routing Attacks on Cryptocurrencies", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "375--392", month = may, year = "2017", DOI = "https://doi.org/10.1109/SP.2017.29", ISBN = "1-5090-5532-0", ISBN-13 = "978-1-5090-5532-6", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7958588/", acknowledgement = ack-nhfb, keywords = "ASes; authorisation; autonomous systems; BGP; BGP hijack; BGP hijacks; BGP routing data; bitcoin; computer crime; cryptocurrencies; cryptocurrency; cryptography; data mining; Delays; electronic money; Internet; Internet routing infrastructure; IP networks; mining pools; P2P networks; Peer-to-peer computing; Routing; routing; routing advertisements; routing attacks; routing manipulation; Routing protocols; telecommunication network routing; {Bitcoin}; {Bitcoin} hijacking; {Bitcoin} topology; {Bitcoin} traffic manipulation", } @Article{Aste:2017:BTF, author = "Tomaso Aste and Paolo Tasca and Tiziana {Di Matteo}", title = "Blockchain Technologies: The Foreseeable Impact on Society and Industry", journal = j-COMPUTER, volume = "50", number = "9", pages = "18--28", month = sep, year = "2017", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2017.3571064", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Mon Oct 2 08:46:55 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "https://www.computer.org/csdl/mags/co/2017/09/mco2017090018-abs.html", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @InProceedings{Ateniese:2017:RBX, author = "Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton Andrade", booktitle = "2017 {IEEE} European Symposium on Security and Privacy {(EuroSP)}", title = "Redactable Blockchain --- or --- Rewriting History in {Bitcoin} and Friends", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "111--126", month = apr, year = "2017", DOI = "https://doi.org/10.1109/EuroSP.2017.37", ISBN = "1-5090-5761-7", ISBN-13 = "978-1-5090-5761-0", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7961975/", acknowledgement = ack-nhfb, keywords = "Bitcoin; chameleon hash functions; Contracts; cryptography; electronic money; hash collisions; Organizations; redactable blockchain; Software; Standards", } @InProceedings{Atzei:2017:SAE, author = "Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli", booktitle = "{Principles of Security and Trust}", title = "A Survey of Attacks on {Ethereum} Smart Contracts ({SoK})", publisher = pub-SV, address = pub-SV:adr, pages = "164--186", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54455-6_8", ISBN = "3-662-54455-5", ISBN-13 = "978-3-662-54455-6", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-54455-6_8", acknowledgement = ack-nhfb, } @InCollection{Augot:2017:UCS, author = "Daniel Augot and Herv{\'e} Chabanne and Thomas Chenevier and William George and Laurent Lambert", booktitle = "Data Privacy Management, Cryptocurrencies and Blockchain Technology", title = "A User-Centric System for Verified Identities on the {Bitcoin} Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "390--407", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_22", ISBN = "3-319-67816-7", ISBN-13 = "978-3-319-67816-0", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_22", acknowledgement = ack-nhfb, } @InCollection{Awan:2017:BTA, author = "Malik Khurram Awan and Agostino Cortesi", booktitle = "Computer Information Systems and Industrial Management", title = "Blockchain Transaction Analysis Using Dominant Sets", publisher = pub-SV, address = pub-SV:adr, pages = "229--239", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-59105-6_20", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-59105-6_20", acknowledgement = ack-nhfb, } @InCollection{Azouvi:2017:WSI, author = "Sarah Azouvi and Mustafa Al-Bassam and Sarah Meiklejohn", booktitle = "Data Privacy Management, Cryptocurrencies and Blockchain Technology", title = "Who Am I? {Secure} Identity Registration on Distributed Ledgers", publisher = pub-SV, address = pub-SV:adr, pages = "373--389", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_21", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_21", acknowledgement = ack-nhfb, } @InProceedings{Badertscher:2017:BTL, author = "Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas", booktitle = "{Advances in cryptology --- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part I}", title = "{Bitcoin} as a Transaction Ledger: A Composable Treatment", publisher = pub-SV, address = pub-SV:adr, pages = "324--356", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63688-7_11", ISBN = "3-319-63687-1 (paperback), 3-319-63688-X (e-book)", ISBN-13 = "978-3-319-63687-0 (paperback), 978-3-319-63688-7 (e-book)", MRclass = "94A60", bibdate = "Mon Dec 4 12:12:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-63688-7_11", ZMnumber = "06802617", acknowledgement = ack-nhfb, } @Article{Bag:2017:BBW, author = "S. Bag and S. Ruj and K. Sakurai", title = "{Bitcoin} Block Withholding Attack: Analysis and Mitigation", journal = "IEEE Transactions on Information Forensics and Security", volume = "12", number = "8", pages = "1967--1978", month = aug, year = "2017", DOI = "https://doi.org/10.1109/TIFS.2016.2623588", ISSN = "1556-6013 (print), 1556-6021 (electronic)", ISSN-L = "1556-6013", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin block withholding attack; block withholding attack; BWH attack; commitment schemes; Computational modeling; cryptographic commitment schemes; Cryptography; cryptography; Electronic mail; electronic money; Games; hash function; mining pool; Online banking; pool attacks; Protocols; rogue miners; rogue pool administrators; selfish miner; selfish {Bitcoin} miner; sponsored block withholding attack; Statistical analysis; {Bitcoin} mining; {Bitcoin} protocol", } @Article{Bailis:2017:RPC, author = "Peter Bailis and Arvind Narayanan and Andrew Miller and Song Han", title = "Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning", journal = j-CACM, volume = "60", number = "5", pages = "48--51", month = may, year = "2017", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3024928", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat May 27 15:08:46 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/cacm/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://cacm.acm.org/magazines/2017/5/216321/fulltext", abstract = "Expert-curated guides to the best of CS research.", acknowledgement = ack-nhfb, acmid = "3024928", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", pagecount = "4", } @Book{Bandelj:2017:MTE, editor = "Nina Bandelj and Frederick F. Wherry and Viviana A. Rotman Zelizer", title = "Money talks: explaining how money really works", publisher = pub-PRINCETON, address = pub-PRINCETON:adr, pages = "xii + 269", year = "2017", ISBN = "0-691-16868-7 (hardcover)", ISBN-13 = "978-0-691-16868-5 (hardcover)", LCCN = "HG221 .M8143 2017", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "The world of money is being transformed as households and organizations face changing economies, and new currencies and payment systems like Bitcoin and Apple Pay gain ground. What is money, and how do we make sense of it? Money Talks is the first book to offer a wide range of alternative and unexpected explanations of how social relations, emotions, moral concerns, and institutions shape how we create, mark, and use money. This collection brings together a stellar group of international experts from multiple disciplines sociology, economics, history, law, anthropology, political science, and philosophy to propose fresh explanations for money's origins, uses, effects, and future. Money Talks explores five key questions: How do social relationships, emotions, and morals shape how people account for and use their money? How do corporations infuse social meaning into their financing and investment practices? What are the historical, political, and social foundations of currencies? When does money become contested, and are there things money shouldn't buy? What is the impact of the new twenty-first-century currencies on our social relations? At a time of growing concern over financial inequality, Money Talks overturns conventional views about money by revealing its profound social potential.", acknowledgement = ack-nhfb, subject = "Money; Social aspects; Political aspects; Economics; Sociological aspects; Sociological aspects; Money; Political aspects; Social aspects", tableofcontents = "Introduction. Advancing money talks / Nina Bandelj, Frederick F. Wherry and Viviana A. Zelizer \\ Part I. Beyond fungibility. Economics and the social meaning of money / Jonathan Morduch \\ Morals and emotions of money / Nina Bandelj \ldots{} [et al.] \\ How relational accounting matters / Frederick F. Wherry \\ Part II. Beyond special monies. The social meaning of credit, value, and finance / Bruce G. Carruthers \\ From industrial money to generalized capitalization / Simone Polillo \\ Part III. Creating money. The constitutional approach to money: monetary design and the production of the modern world / Christine Desan \\ The market mirage / David Singh Grewal \\ The macro-social meaning of money: from territorial currencies to global money / Eric Helleiner \\ Part IV. Contested money. Money and emotion: win-win bargains, win-lose contexts, and the emotional labor of commercial surrogates / Arlie Hochschild \\ Paid to donate: egg donors, sperm donors, and gendered experiences of bodily commodifications / Rene Almeling \\ Money and family relationships: the biography of transnational money / Supriya Singh \\ Part V. Money futures. Money talks, plastic money tattles: the new sociability of money / Alya Guseva and Akos Rona-Tas \\ Blockchains are a diamond's best friend: Zelizer for the Bitcoin moment / Bill Maurer \\ Utopian monies: complementary currencies, Bitcoin, and the social life of money / Nigel Dodd", } @Article{Bano:2017:RSB, author = "Shehar Bano and Mustafa Al-Bassam and George Danezis", title = "The Road to Scalable Blockchain Designs", journal = j-LOGIN, volume = "42", number = "4", pages = "??--??", month = "Winter", year = "2017", CODEN = "LOGNEM", ISSN = "1044-6397", bibdate = "Tue Apr 03 15:19:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.usenix.org/publications/login/winter2017/bano", abstract = "Bitcoin has become centralized and slow due to the inherent limitations of its blockchain. A number of alternative blockchain designs have been proposed to address these issues. Off-chain solutions allow for small and frequent transactions to take place over low-tier blockchain instances, parallel to and backed by the main blockchain. On-chain solutions directly modify the blockchain design to support high performance. We focus on the latter and summarize and discuss recent approaches to on-chain scaling of blockchains.", acknowledgement = ack-nhfb, fjournal = ";login: the USENIX Association newsletter", } @Article{Bariviera:2017:IBR, author = "Aurelio F. Bariviera", title = "The inefficiency of {Bitcoin} revisited: a dynamic approach", journal = j-ECONOM-LETT, volume = "161", pages = "1--4", year = "2017", CODEN = "ECLEDS", DOI = "https://doi.org/10.1016/j.econlet.2017.09.013", ISSN = "0165-1765 (print), 1873-7374 (electronic)", ISSN-L = "0165-1765", MRclass = "91B24", MRnumber = "3723207", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Economics Letters", journal-URL = "https://www.sciencedirect.com/science/journal/01651765", } @InProceedings{Bartoletti:2017:ABO, author = "Massimo Bartoletti and Livio Pompianu", title = "An Analysis of {Bitcoin} {{\tt OP\_RETURN}} Metadata", crossref = "Jakobsson:2017:FCD", pages = "218--230", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_14", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_14", acknowledgement = ack-nhfb, } @InProceedings{Bartoletti:2017:CDM, author = "Massimo Bartoletti and Roberto Zunino", title = "Constant-Deposit Multiparty Lotteries on {Bitcoin}", crossref = "Jakobsson:2017:FCD", pages = "231--247", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_15", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_15", acknowledgement = ack-nhfb, } @InProceedings{Bartoletti:2017:GFB, author = "Massimo Bartoletti and Stefano Lande and Livio Pompianu and Andrea Bracciali", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "A General Framework for Blockchain Analytics", publisher = pub-ACM, address = pub-ACM:adr, pages = "7:1--7:6", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152831", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152831", acknowledgement = ack-nhfb, acmid = "3152831", articleno = "7", keywords = "analytics, Bitcoin, blockchain, Ethereum", location = "Las Vegas, Nevada", pagecount = "6", } @InProceedings{Bartoletti:2017:PSP, author = "Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda", title = "A Proof-of-Stake Protocol for Consensus on {Bitcoin} Subchains", crossref = "Jakobsson:2017:FCD", pages = "568--584", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_36", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_36", acknowledgement = ack-nhfb, } @Article{Beck:2017:BTB, author = "{Prof.Dr.Roman} Beck and {Prof.Dr.Michel} Avital and {Prof.Dr.Matti} Rossi and {Prof.Dr.Jason} Bennett Thatcher", title = "Blockchain Technology in Business and Information Systems Research", journal = "Business \& Information Systems Engineering", volume = "59", number = "6", pages = "381--384", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12599-017-0505-1", ISSN = "1867-0202 (print), 2363-7005 (electronic)", ISSN-L = "1867-0202", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12599-017-0505-1", acknowledgement = ack-nhfb, fjournal = "Business \& Information Systems Engineering", journal-URL = "https://link.springer.com/journal/12599", } @InProceedings{Bell:2017:AOS, author = "Jonathan Bell and Thomas D. LaToza and Foteini Baldmitsi and Angelos Stavrou", booktitle = "{Proceedings of the 12th International Workshop on Software Engineering for Science}", title = "Advancing Open Science with Version Control and Blockchains", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "13--14", year = "2017", DOI = "https://doi.org/10.1109/SE4Science.2017..11", ISBN = "1-5386-2791-4", ISBN-13 = "978-1-5386-2791-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SE4Science '17", acknowledgement = ack-nhfb, acmid = "3105498", location = "Buenos Aires, Argentina", pagecount = "2", } @Article{Benchoufi:2017:BTI, author = "Mehdi Benchoufi and Philippe Ravaud", title = "Blockchain technology for improving clinical research quality", journal = "Trials", volume = "18", number = "1", month = jul, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1186/s13063-017-2035-z", ISSN = "", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s13063-017-2035-z", acknowledgement = ack-nhfb, } @Article{Berg:2017:BEB, author = "Chris Berg and Sinclair Davidson and Jason Potts", title = "The Blockchain Economy: A beginner's guide to institutional cryptoeconomics", journal = "Medium", volume = "??", number = "??", pages = "??--??", day = "26", month = sep, year = "2017", bibdate = "Sat Jan 20 17:09:18 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://medium.com/@cryptoeconomics/the-blockchain-economy-a-beginners-guide-to-institutional-cryptoeconomics-64bf2f2beec4", acknowledgement = ack-nhfb, } @Article{Berg:2017:BIT, author = "Chris Berg and Sinclair Davidson and Jason Potts", title = "Blockchains industrialise trust", journal = "{SSRN} Electronic Journal", volume = "??", number = "??", pages = "??--??", day = "19", month = nov, year = "2017", DOI = "https://doi.org/10.2139/ssrn.3074070", ISSN = "1556-5068", bibdate = "Sun Jan 21 11:58:18 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3074070", acknowledgement = ack-nhfb, } @InProceedings{Bergquist:2017:DCT, author = "Jonatan Bergquist and Aron Laszka and Monika Sturm and Abhishek Dubey", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "On the Design of Communication and Transaction Anonymity in Blockchain-based Transactive Microgrids", publisher = pub-ACM, address = pub-ACM:adr, pages = "3:1--3:6", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152827", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152827", acknowledgement = ack-nhfb, acmid = "3152827", articleno = "3", keywords = "anonymity; blockchain; distributed ledger; onion routing; privacy; transactive energy platforms; zero-knowledge proofs", location = "Las Vegas, Nevada", pagecount = "6", } @InProceedings{Bessani:2017:BFT, author = "Alysson Bessani and Jo{\~a}o Sousa and Marko Vukoli{\'c}", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "A {Byzantine} Fault-tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform", publisher = pub-ACM, address = pub-ACM:adr, pages = "6:1--6:2", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152830", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152830", acknowledgement = ack-nhfb, acmid = "3152830", articleno = "6", keywords = "blockchain; Byzantine fault tolerance", location = "Las Vegas, Nevada", pagecount = "2", } @InCollection{Bhardwaj:2017:BTD, author = "Shweta Bhardwaj and Manish Kaushik", booktitle = "Smart Computing and Informatics", title = "Blockchain --- Technology to Drive the Future", publisher = "Springer Singapore", pages = "263--271", month = oct, year = "2017", DOI = "https://doi.org/10.1007/978-981-10-5547-8_28", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Bheemaiah:2017:CEN, author = "Kariappa Bheemaiah", title = "Complexity Economics: A New Way to Witness Capitalism", crossref = "Bheemaiah:2017:BA", pages = "155--225", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2674-2_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2674-2_4", acknowledgement = ack-nhfb, } @InCollection{Bheemaiah:2017:DBE, author = "Kariappa Bheemaiah", title = "Debt-based Economy: The Intricate Dance of Money and Debt", crossref = "Bheemaiah:2017:BA", pages = "1--24", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2674-2_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2674-2_1", acknowledgement = ack-nhfb, } @InCollection{Bheemaiah:2017:FF, author = "Kariappa Bheemaiah", title = "Fragmentation of Finance", crossref = "Bheemaiah:2017:BA", pages = "25--82", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2674-2_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2674-2_2", acknowledgement = ack-nhfb, } @InCollection{Bheemaiah:2017:IC, author = "Kariappa Bheemaiah", title = "Innovating Capitalism", crossref = "Bheemaiah:2017:BA", pages = "83--154", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2674-2_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2674-2_3", acknowledgement = ack-nhfb, } @InProceedings{Biryukov:2017:FSD, author = "Alex Biryukov and Dmitry Khovratovich and Sergei Tikhomirov", booktitle = "{Financial Cryptography and Data Security}", title = "{Findel}: Secure Derivative Contracts for {Ethereum}", publisher = pub-SV, address = pub-SV:adr, pages = "453--467", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_28", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_28", acknowledgement = ack-nhfb, } @InProceedings{Bistarelli:2017:EEV, author = "Stefano Bistarelli and Marco Mantilacci and Paolo Santancini and Francesco Santini", booktitle = "Proceedings of the Symposium on Applied Computing", title = "An End-to-end Voting-system Based on {Bitcoin}", publisher = pub-ACM, address = pub-ACM:adr, pages = "1836--1841", year = "2017", DOI = "https://doi.org/10.1145/3019612.3019841", ISBN = "1-4503-4486-0", ISBN-13 = "978-1-4503-4486-9", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SAC '17", acknowledgement = ack-nhfb, acmid = "3019841", keywords = "Bitcoin, electronic voting, verifiable voting-system", location = "Marrakech, Morocco", pagecount = "6", } @InProceedings{Bistarelli:2017:GBF, author = "Stefano Bistarelli and Francesco Santini", booktitle = "Proceedings of the 12th International Conference on Availability, Reliability and Security", title = "Go with the {-Bitcoin-} Flow, with Visual Analytics", publisher = pub-ACM, address = pub-ACM:adr, pages = "38:1--38:6", year = "2017", DOI = "https://doi.org/10.1145/3098954.3098972", ISBN = "1-4503-5257-X", ISBN-13 = "978-1-4503-5257-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ARES '17", acknowledgement = ack-nhfb, acmid = "3098972", articleno = "38", keywords = "Analysis Tool, {Bitcoin}, Visual Analytics", location = "Reggio Calabria, Italy", pagecount = "6", } @InCollection{Bocek:2017:SCT, author = "Thomas Bocek and Burkhard Stiller", booktitle = "Digital Marketplaces Unleashed", title = "Smart Contracts --- Blockchains in the Wings", publisher = pub-SV, address = pub-SV:adr, pages = "169--184", month = sep, year = "2017", DOI = "https://doi.org/10.1007/978-3-662-49275-8_19", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Bogner:2017:SUA, author = "Andreas Bogner", booktitle = "{Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers}", title = "Seeing is Understanding: Anomaly Detection in Blockchains with Visualized Features", publisher = pub-ACM, address = pub-ACM:adr, pages = "5--8", year = "2017", DOI = "https://doi.org/10.1145/3123024.3123157", ISBN = "1-4503-5190-5", ISBN-13 = "978-1-4503-5190-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "UbiComp '17", URL = "http://doi.acm.org/10.1145/3123024.3123157", acknowledgement = ack-nhfb, acmid = "3123157", keywords = "anomaly detection; block-chain; Ethereum; machine learning; visualization", location = "Maui, Hawaii", pagecount = "4", } @Article{Bohme:2017:TGD, author = "Rainer B{\"o}hme and Paulina Pesch", title = "{Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie}. ({German}) [{Technical} basics and data protection questions of blockchain technology]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "8", pages = "473--481", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0815-y", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0815-y", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @InProceedings{Bore:2017:TBE, author = "Nelson Bore and Samuel Karumba and Juliet Mutahi and Shelby Solomon Darnell and Charity Wayua and Komminist Weldemariam", booktitle = "{Proceedings of the Ninth International Conference on Information and Communication Technologies and Development}", title = "Towards Blockchain-enabled School Information Hub", publisher = pub-ACM, address = pub-ACM:adr, pages = "19:1--19:4", year = "2017", DOI = "https://doi.org/10.1145/3136560.3136584", ISBN = "1-4503-5277-4", ISBN-13 = "978-1-4503-5277-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICTD '17", URL = "http://doi.acm.org/10.1145/3136560.3136584", acknowledgement = ack-nhfb, acmid = "3136584", articleno = "19", keywords = "Blockchain; Data Management; Education; ICTD", location = "Lahore, Pakistan", pagecount = "4", } @InProceedings{Boshrooyeh:2017:IAI, author = "Sanaz Taheri Boshrooyeh and Alptekin K{\"u}p{\c{c}}{\"u}", title = "{Inonymous}: Anonymous Invitation-Based System", crossref = "Garcia-Alfaro:2017:DPM", pages = "219--235", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_13", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_13", acknowledgement = ack-nhfb, } @InCollection{Bracamonte:2017:ESI, author = "Vanessa Bracamonte and Hitoshi Okada", booktitle = "{Social Informatics}", title = "An Exploratory Study on the Influence of Guidelines on Crowdfunding Projects in the {Ethereum} Blockchain Platform", publisher = pub-SV, address = pub-SV:adr, pages = "347--354", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67256-4_27", ISBN = "3-319-67256-8", ISBN-13 = "978-3-319-67256-4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-67256-4_27", acknowledgement = ack-nhfb, } @Article{Bradbury:2017:PB, author = "Danny Bradbury", title = "The problem with {Bitcoin}", journal = "Computer Fraud \& Security", volume = "2013", number = "11", pages = "58--66", month = sep, year = "2017", DOI = "https://doi.org/10.1016/S1361-3723(13)70101-5", ISSN = "1361-3723 (print), 1873-7056 (electronic)", ISSN-L = "1361-3723", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1361372313701015", acknowledgement = ack-nhfb, fjournal = "Computer Fraud \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/13613723", } @PhdThesis{Brenig:2017:TTD, author = "Christian Brenig", title = "Transparency through decentralized consensus: the bitcoin blockchain and beyond", type = "{Ph.D.}", school = "Albert-Ludwigs-Universit{\"a}t", address = "Freiburg, Germany", year = "2017", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1966098099", acknowledgement = ack-nhfb, keywords = "(UMI)AAI10733938; Social sciences", ris-m1 = "10733938", } @Article{Bruhl:2017:BBD, author = "Volker Br{\"u}hl", title = "{Bitcoins, Blockchain und Distributed Ledgers}", journal = "Wirtschaftsdienst", volume = "97", number = "2", pages = "135--142", month = feb, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s10273-017-2096-3", ISSN = "0043-6275 (print), 1613-978X (electronic)", ISSN-L = "0043-6275", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10273-017-2096-3", acknowledgement = ack-nhfb, fjournal = "Wirtschaftsdienst: Journal for Economic Policy", journal-URL = "https://link.springer.com/journal/10273", language = "German", } @InCollection{Brunnler:2017:LBU, author = "Kai Br{\"u}nnler and Dandolo Flumini and Thomas Studer", booktitle = "Logical Foundations of Computer Science", title = "A Logic of Blockchain Updates", publisher = "Springer International Publishing", address = "????", pages = "107--119", month = nov, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-72056-2_7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Buccafurri:2017:OLB, author = "Francesco Buccafurri and Gianluca Lax and Serena Nicolazzo and Antonino Nocera", booktitle = "{Proceedings of the 12th International Conference on Availability, Reliability and Security}", title = "Overcoming Limits of Blockchain for {IoT} Applications", publisher = pub-ACM, address = pub-ACM:adr, pages = "26:1--26:6", year = "2017", DOI = "https://doi.org/10.1145/3098954.3098983", ISBN = "1-4503-5257-X", ISBN-13 = "978-1-4503-5257-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ARES '17", URL = "http://doi.acm.org/10.1145/3098954.3098983", acknowledgement = ack-nhfb, acmid = "3098983", articleno = "26", keywords = "Blockchain; IoT applications; Public Ledger; Twitter", location = "Reggio Calabria, Italy", pagecount = "6", } @InCollection{Buccafurri:2017:TAB, author = "Francesco Buccafurri and Gianluca Lax and Serena Nicolazzo and Antonino Nocera", booktitle = "{Web Engineering}", title = "{Tweetchain}: An Alternative to Blockchain for Crowd-Based Applications", publisher = pub-SV, address = pub-SV:adr, pages = "386--393", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-60131-1_24", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-60131-1_24", acknowledgement = ack-nhfb, } @InProceedings{Burchert:2017:SFB, author = "Conrad Burchert and Christian Decker and Roger Wattenhofer", booktitle = "Stabilization, Safety, and Security of Distributed Systems", title = "Scalable Funding of {Bitcoin} Micropayment Channel Networks", publisher = pub-SV, address = pub-SV:adr, pages = "361--377", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69084-1_26", ISBN = "3-319-69084-1", ISBN-13 = "978-3-319-69084-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69084-1_26", acknowledgement = ack-nhfb, } @TechReport{Burniske:2017:BRB, author = "C. Burniske and A. White", title = "{Bitcoin}: Ringing the Bell for a New Asset Class", type = "Research white paper", institution = "Ark Invest", address = "55 West 19th, 5th Floor New York, NY 10011, USA", month = jan, year = "2017", bibdate = "Sat Jan 20 16:30:05 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://research.ark-invest.com/hubfs/1_Download_Files_ARK-Invest/White_Papers/Bitcoin-Ringing-The-Bell-For-A-New-Asset-Class.pdf", acknowledgement = ack-nhfb, } @InProceedings{Camenisch:2017:PUS, author = "Jan Camenisch and Manu Drijvers and Maria Dubovitskaya", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "Practical {UC-Secure} Delegatable Credentials with Attributes and Their Application to Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "683--699", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134025", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3134025", acknowledgement = ack-nhfb, acmid = "3134025", keywords = "blockchain; composable security; credentials; delegation; hierarchical issuance; privacy-preserving authentication; zero-knowledge", location = "Dallas, Texas, USA", pagecount = "17", } @InProceedings{Campanelli:2017:ZKC, author = "Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo", booktitle = "Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services", publisher = pub-ACM, address = pub-ACM:adr, pages = "229--243", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134060", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", acknowledgement = ack-nhfb, acmid = "3134060", keywords = "Bitcoin, contingent payments, zero-knowledge protocols", location = "Dallas, Texas, USA", pagecount = "15", } @InProceedings{Castellanos:2017:CGO, author = "J. Alejandro F. Castellanos and Debora Coll-Mayor and Jos{\'e} Antonio Notholt", booktitle = "2017 {IEEE} International Conference on Smart Energy Grid Engineering {(SEGE)}", title = "Cryptocurrency as guarantees of origin: Simulating a green certificate market with the {Ethereum} Blockchain", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "367--372", month = aug, year = "2017", DOI = "https://doi.org/10.1109/SEGE.2017.8052827", bibdate = "Thu Nov 30 15:21:10 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8052827/", acknowledgement = ack-nhfb, keywords = "blockchain; Blockchain technology; Blockchain tokens; commerce; Companies; consumer behaviour; Contracts; contracts; Cryptocurrency; cryptocurrency; energy; energy prosumer types; energy providers; energy system operators; Ethereum; Ethereum Blockchain; Europe; European energy suppliers; Fix Price Strategy; green certificate market; green energy; Green products; grey energy; guarantees of origin; incentive mechanisms; incentive schemes; market strategies; Peer-to-peer computing; power markets; premium prices; pricing; renewable energy producers; renewable energy sources; robust paying system; smart contracts; tokenized GoO trading; Variable Price Strategy", } @InProceedings{Cecchetti:2017:SCD, author = "Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "{Solidus}: Confidential Distributed Ledger Transactions via {PVORM}", publisher = pub-ACM, address = pub-ACM:adr, pages = "701--717", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134010", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3134010", acknowledgement = ack-nhfb, acmid = "3134010", keywords = "blockchain; confidential transactions; oblivious ram", location = "Dallas, Texas, USA", pagecount = "17", } @InProceedings{Cen:2017:IBP, author = "Yuanyuan Cen and Hui Wang and Xuefeng Li", booktitle = "{Proceedings of the 6th International Conference on Informatics, Environment, Energy and Applications}", title = "Improving Business Process Interoperability by Shared Ledgers", publisher = pub-ACM, address = pub-ACM:adr, pages = "89--93", year = "2017", DOI = "https://doi.org/10.1145/3070617.3070631", ISBN = "1-4503-5230-8", ISBN-13 = "978-1-4503-5230-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IEEA '17", URL = "http://doi.acm.org/10.1145/3070617.3070631", acknowledgement = ack-nhfb, acmid = "3070631", keywords = "Blockchain; Business modelling; Business process management; Distributed systems; Financial technology; Information systems; Interoperability of systems", location = "Jeju, Republic of Korea", pagecount = "5", } @InProceedings{Chakravorty:2017:UUC, author = "Antorweep Chakravorty and Chunming Rong", booktitle = "{Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication}", title = "{Ushare}: User Controlled Social Media Based on Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "99:1--99:6", year = "2017", DOI = "https://doi.org/10.1145/3022227.3022325", ISBN = "1-4503-4888-2", ISBN-13 = "978-1-4503-4888-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IMCOM '17", URL = "http://doi.acm.org/10.1145/3022227.3022325", acknowledgement = ack-nhfb, acmid = "3022325", articleno = "99", keywords = "blockchain; control; ownership; sharing; social network; traceability", location = "Beppu, Japan", pagecount = "6", } @InProceedings{Chanson:2017:BPE, author = "Mathieu Chanson and Andreas Bogner and Felix Wortmann and Elgar Fleisch", booktitle = "{Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers}", title = "Blockchain As a Privacy Enabler: An Odometer Fraud Prevention System", publisher = pub-ACM, address = pub-ACM:adr, pages = "13--16", year = "2017", DOI = "https://doi.org/10.1145/3123024.3123078", ISBN = "1-4503-5190-5", ISBN-13 = "978-1-4503-5190-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "UbiComp '17", URL = "http://doi.acm.org/10.1145/3123024.3123078", acknowledgement = ack-nhfb, acmid = "3123078", keywords = "blockchain; data ownership; Ethereum; privacy", location = "Maui, Hawaii", pagecount = "4", } @InProceedings{Chen:2017:BBP, author = "Po-Wei Chen and Bo-Sian Jiang and Cia-Hui Wang", booktitle = "2017 {IEEE 13th} International Conference on Wireless and Mobile Computing, Networking and Communications {(WiMob)}", title = "Blockchain-based payment collection supervision system using pervasive {Bitcoin} digital wallet", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "139--146", month = oct, year = "2017", DOI = "https://doi.org/10.1109/WiMOB.2017.8115844", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8115844/", acknowledgement = ack-nhfb, keywords = "Android App; Androids; blockchain; cloud database; Credit cards; IEEE merchandise; NFC; Organizations; pervasive digital wallet; {Bitcoin}", } @InProceedings{Chen:2017:UBB, author = "Lin Chen and Lei Xu and Nolan Shah and Nour Diallo and Zhimin Gao and Yang Lu and Weidong Shi", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "Unraveling Blockchain Based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach", publisher = pub-ACM, address = pub-ACM:adr, pages = "23--28", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055528", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055528", acknowledgement = ack-nhfb, acmid = "3055528", keywords = "anonymization; blockchain; privacy", location = "Abu Dhabi, United Arab Emirates", pagecount = "6", } @InProceedings{Cheng:2017:TDL, author = "Zhongqi Cheng and Tim Schmidt and Guantao Liu and Rainer Doomer", editor = "{IEEE}", booktitle = "{2017 IEEE International High Level Design Validation and Test Workshop (HLDVT), 5--6 October 2017, Santa Cruz, CA, USA}", title = "Thread- and data-level parallel simulation in {SystemC}, a {Bitcoin} miner case study", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "74--81", month = oct, year = "2017", DOI = "https://doi.org/10.1109/HLDVT.2017.8167466", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "16-core host; 4-core host; 60-core host; Bitcoin; Bitcoin miner model; Computational modeling; coprocessors; data mining; data-level parallel simulation; datalevel parallelism; design complexity; electronic money; Instruction sets; many-core Intel(g) Xeon Phi; multi-threading; multicore processors; multiprocessing systems; Parallel processing; peak simulation; Peer-to-peer computing; Ports (Computers); Synchronization; system level design; system level modeling; system level simulation; SystemC simulation speed; thread-level parallelism", } @InProceedings{Choudhuri:2017:FUW, author = "Arka Rai Choudhuri and Matthew Green and Abhishek Jain and Gabriel Kaptchuk and Ian Miers", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards", publisher = pub-ACM, address = pub-ACM:adr, pages = "719--728", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134092", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3134092", acknowledgement = ack-nhfb, acmid = "3134092", keywords = "fairness; secure multiparty computation", location = "Dallas, Texas, USA", pagecount = "10", } @Article{Chow:2017:BMC, author = "S. Chow and M. E. Peck", title = "The {Bitcoin} mines of {China}", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "46--53", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048840", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; bitcoin mines; China; coal; coal-fired power plants; Data mining; Economics; file organisation; foreign exchange trading; minerals; Minerals; mining; Photography; Power generation; power plants; rare earth mineral extraction sites; SHA-256 hash function; Urban areas", } @InProceedings{Coblenz:2017:OSB, author = "Michael Coblenz", booktitle = "{Proceedings of the 39th International Conference on Software Engineering Companion}", title = "{Obsidian}: A Safer Blockchain Programming Language", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "97--99", year = "2017", DOI = "https://doi.org/10.1109/ICSE-C.2017.150", ISBN = "1-5386-1589-4", ISBN-13 = "978-1-5386-1589-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICSE-C '17", acknowledgement = ack-nhfb, acmid = "3098376", keywords = "blockchain programming; blockchain security; programming language usability", location = "Buenos Aires, Argentina", pagecount = "3", } @Article{Cocco:2017:BBC, author = "Luisanna Cocco and Andrea Pinna and Michele Marchesi", title = "Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology", journal = j-FUTURE-INTERNET, volume = "9", number = "3", pages = "25", day = "27", month = jun, year = "2017", CODEN = "????", DOI = "https://doi.org/10.3390/fi9030025", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:50:57 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/9/3/25", abstract = "This paper looks at the challenges and opportunities of implementing blockchain technology across banking, providing food for thought about the potentialities of this disruptive technology. The blockchain technology can optimize the global financial infrastructure, achieving sustainable development, using more efficient systems than at present. In fact, many banks are currently focusing on blockchain technology to promote economic growth and accelerate the development of green technologies. In order to understand the potential of blockchain technology to support the financial system, we studied the actual performance of the Bitcoin system, also highlighting its major limitations, such as the significant energy consumption due to the high computing power required, and the high cost of hardware. We estimated the electrical power and the hash rate of the Bitcoin network, over time, and, in order to evaluate the efficiency of the Bitcoin system in its actual operation, we defined three quantities: ``economic efficiency'', ``operational efficiency'', and ``efficient service''. The obtained results show that by overcoming the disadvantages of the Bitcoin system, and therefore of blockchain technology, we could be able to handle financial processes in a more efficient way than under the current system.", acknowledgement = ack-nhfb, } @InProceedings{Connor:2017:EBT, author = "Russell O. Connor and Marta Piekarska", title = "Enhancing {Bitcoin} Transactions with Covenants", crossref = "Jakobsson:2017:FCD", pages = "191--198", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_12", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_12", acknowledgement = ack-nhfb, } @InProceedings{Conoscenti:2017:PPP, author = "Marco Conoscenti and Antonio Vetr{\`o} and Juan Carlos De Martin", booktitle = "{Proceedings of the 39th International Conference on Software Engineering Companion}", title = "Peer to Peer for Privacy and Decentralization in the {Internet of Things}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "288--290", year = "2017", DOI = "https://doi.org/10.1109/ICSE-C.2017.60", ISBN = "1-5386-1589-4", ISBN-13 = "978-1-5386-1589-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICSE-C '17", acknowledgement = ack-nhfb, acmid = "3098442", keywords = "block-chain; internet of things; peer to peer; privacy", location = "Buenos Aires, Argentina", pagecount = "3", } @PhdThesis{Craggs:2017:IBT, author = "Barnaby Craggs", title = "Information bias and trust in bitcoin speculation", type = "{Ph.D.}", school = "Lancaster University (United Kingdom)", address = "Bailrigg, Lancashire, UK", year = "2017", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2083755359", abstract = "The Internet pervades modern life, offering up opportunities to connect, inform and be informed. As the range and number of sources for information online explode, how people select and interpret information has become a pertinent area for study, not least in light of the prevalence of fake-news. People are well known to act upon information they believe to be trustworthy and where the decision to act incurs risk, an inability to accurately select and assess the credibility of information presents a challenge. Bitcoin, the nascent crypto-currency, presents a domain within which profound financial risk abounds. Even for those armed with experience and knowledge there are numerous challenges to assessing risk, especially as sources of Bitcoin information can be observed to be partisan and of questionable accuracy. Within the domain of bitcoin speculation, this thesis asks the central research question of: are people able to select and correctly evaluate information they might rely upon to make decisions? In addressing this research question, this thesis offers --- through the application of a psychological model of informational trust to bitcoin speculators --- two fundamental contributions: Firstly, that these users are able to identify relevant news without a reliance upon confirmation bias. Secondly, that a notable percentage of users are not evaluating the credibility of online news by expertly interpreting the fundamentals of information but, rather deferring their trust to either the source news website or a more broad trust of information on the Internet. For these users, chance or luck may mean that they are basing their decisions upon factually accurate news. But this is a position which makes them particularly vulnerable to fake-news where it is spread via sources which they might trust. This position of susceptibility provides evidence to support further security research of both the prevalence of, and counter-measures for fake-news.", acknowledgement = ack-nhfb, keywords = "(UMI)AAI10959302; http://eprints.lancs.ac.uk/123877/; Social sciences", ris-m1 = "10959302", } @InProceedings{Dai:2017:BCC, author = "Fangfang Dai and Yue Shi and Nan Meng and Liang Wei and Zhiguo Ye", editor = "{IEEE}", booktitle = "{2017 4th International Conference on Systems and Informatics (ICSAI), 11--13 November 2017, Hangzhou, China}", title = "From {Bitcoin} to cybersecurity: A comparative study of blockchain application and security issues", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "975--979", month = nov, year = "2017", DOI = "https://doi.org/10.1109/ICSAI.2017.8248427", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; blockchain; Computer security; cybersecurity; Memory; Privacy; privacy-protection; Reliability; tamper-proofing", } @InCollection{Dannen:2017:BBK, author = "Chris Dannen", booktitle = "Introducing {Ethereum} and {Solidity}", title = "Bridging the Blockchain Knowledge Gap", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "1--20", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2535-6_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2535-6_1", acknowledgement = ack-nhfb, } @Book{Dannen:2017:IES, author = "Chris Dannen", title = "Introducing {Ethereum} and {Solidity}", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "xxi + 185", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2535-6", ISBN = "1-4842-2535-X", ISBN-13 = "978-1-4842-2535-6", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/java2010.bib", URL = "http://link.springer.com/book/10.1007/978-1-4842-2535-6", abstract = "Learn how to use Solidity and the Ethereum project --- second only to Bitcoin in market capitalization. Blockchain protocols are taking the world by storm, and the Ethereum project, with its Turing-complete scripting language Solidity, has rapidly become a front-runner. This book presents the blockchain phenomenon in context; then situates Ethereum in a world pioneered by Bitcoin. See why professionals and non-professionals alike are honing their skills in smart contract patterns and distributed application development. You'll review the fundamentals of programming and networking, alongside its introduction to the new discipline of crypto-economics. You'll then deploy smart contracts of your own, and learn how they can serve as a back-end for JavaScript and HTML applications on the Web. Many Solidity tutorials out there today have the same flaw: they are written for``advanced'' JavaScript developers who want to transfer their skills to a blockchain environment. Introducing Ethereum and Solidity is accessible to technology professionals and enthusiasts of ``all levels.'' You'll find exciting sample code that can move forward real world assets in both the academic and the corporate arenas. Find out now why this book is a powerful gateway for creative technologists of all types, from concept to deployment.", acknowledgement = ack-nhfb, tableofcontents = "At a Glance \\ Contents \\ About the Author \\ About the Technical Reviewer \\ Chapter 1: Bridging the Blockchain Knowledge Gap \\ Blockchain Roll Call! \\ What Ethereum Does \\ Three Parts of a Blockchain \\ Ethereum Assumes Many Chains \\ This Is a Scam, Just Like Bitcoin! \\ Ether as a Currency and Commodity \\ Gresham's Law \\ The Path to Better Money \\ Cryptoeconomics and Security \\ Back to the Good Old Days \\ Cryptochaos \\ The Power Is in the Protocol \\ You Can Build Trustless Systems \\ What Smart Contracts (Really) Do \\ Objects and Methods for Value \\ Just Add Commerce \\ Content Creation \\ Where's the Data?What Is Mining?Ether and Electricity Prices \\ Going Inside the EVM \\ The Mist Browser \\ Browser vs. Wallet or Keychain \\ Solidity Is Kind of Like JavaScript, But and What Ethereum Is Good For \\ A Critical Take \\ ``Without any possibility of downtime, censorship, or third-party interference'' \\ ``A secure, free, and open platform for the Internet of Things'' \\ ``Enabling transparent governance for communities and businesses'' \\ ``Handles user authentication and secure payments for you, as well as messaging and even decentralized storage'' \\ ``No need to sign up or pay for application host: The world's first zero-infrastructure platform'' \\ State of Smart Contract Development Today \\ Copycat Coins \\ Funding Your Project \\ Deciding Where You Fit In \\ A Note to New Programmers \\ Ethereum Is Free and Open Source \\ The EVM Is Here to Stay \\ What You Can Build Today \\ Private and Public Chains \\ Send and Receive Ether \\ Write Smart Contracts \\ Create Provably Fair Applications \\ Launch Your Own Token \\ The Promise of Decentralized Databases \\ What's Next: New Ways of Working \\ Summary \\ Chapter 2: The Mist Browser \\ Wallets as a Computing Metaphor \\ Your Address Is What? \\ Where Is My Ether? The Bank Teller Metaphor \\ In Cryptocurrency, You Hold Your Own Assets \\ Visualizing Ethereum Transactions \\ Breaking with Banking History \\ How Encryption Leads to Trust \\ System Requirements \\ More about Eth.guide and This Book \\ Tools for Developers \\ CLI Nodes \\ Recommended: Using Parity with Geth \\ Finally, into the Mist! \\ Downloading and Installing Mist \\ Configuring Mist \\ Finding Your New Address \\ Sending and Receiving Ether \\ Understanding Ethereum Account Types \\ Backing Up and Restoring Your Keys \\ Using Paper Wallets \\ Using Mobile Wallets \\ Working with Messages and Transactions \\ Transactions Change State \\ Editing a Global Database \\ So, What Is a Blockchain? \\ Paying for Transactions \\ Understanding Denominations \\ Getting Ether \\ Anonymity in Cryptocurrency \\ Blockchain Explorers \\ Summary \\ Chapter 3: The EVM \\ The Central Bank Network of Yesterday \\ What are Virtual Machines, Exactly? \\ The Role of the Ethereum Protocol in Banking \\ Anyone Can Make a Banking Platform \\ What the EVM Does \\ EVM Applications Are Called Smart Contracts \\ The Name ``Smart Contracts'' \\ The EVM Runs Bytecode \\ Understanding State Machines \\ Digital vs. Analog \\ ``State-ments'' \\ Data's Role in State", } @Article{Daulay:2017:RAA, author = "Raja Sakti Arief Daulay and Surya Michrandi Nasution and Marisa W. Paryasto", title = "Realization and Addressing Analysis In Blockchain {Bitcoin}", journal = "{IOP} Conference Series: Materials Science and Engineering", volume = "260", pages = "012002", month = nov, year = "2017", DOI = "https://doi.org/10.1088/1757-899x/260/1/012002", ISSN = "1757-8981 (print), 1757-899X (electronic)", ISSN-L = "1757-8981", bibdate = "Mon Dec 4 11:59:45 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{deBalthasar:2017:ABL, author = "Thibault de Balthasar and Julio Hernandez-Castro", booktitle = "Secure {IT} Systems", title = "An Analysis of {Bitcoin} Laundry Services", publisher = pub-SV, address = pub-SV:adr, pages = "297--312", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70290-2_18", ISBN = "3-319-70290-4", ISBN-13 = "978-3-319-70290-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70290-2_18", acknowledgement = ack-nhfb, } @InCollection{deKruijff:2017:UBU, author = "Joost de Kruijff and Hans Weigand", booktitle = "Advanced Information Systems Engineering", title = "Understanding the Blockchain Using Enterprise Ontology", publisher = pub-SV, address = pub-SV:adr, pages = "29--43", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-59536-8_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-59536-8_3", acknowledgement = ack-nhfb, } @Article{Denning:2017:BMB, author = "Peter J. Denning and Ted G. Lewis", title = "Bitcoins Maybe; Blockchains Likely", journal = j-AM-SCI, volume = "105", number = "6", pages = "335--??", month = nov # "\slash " # dec, year = "2017", CODEN = "AMSCAC", DOI = "https://doi.org/10.1511/2017.105.6.335", ISSN = "0003-0996 (print), 1545-2786 (electronic)", ISSN-L = "0003-0996", bibdate = "Fri Apr 26 16:02:24 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.americanscientist.org/article/bitcoins-maybe-blockchains-likely", abstract = "The innovative foundations of the cryptocurrency may outlive the currency itself, as its verification method finds applications everywhere.", acknowledgement = ack-nhfb, fjournal = "American Scientist", journal-URL = "http://www.americanscientist.org/issues/past.aspx", } @Article{deSoto:2017:TTC, author = "Hernando de Soto", title = "A tale of two civilizations in the era of {Facebook} and blockchain", journal = "Small Business Economics", volume = "49", number = "4", pages = "729--739", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11187-017-9949-4", ISSN = "", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11187-017-9949-4", acknowledgement = ack-nhfb, } @InProceedings{Dickerson:2017:ACS, author = "Thomas Dickerson and Paul Gazzillo and Maurice Herlihy and Eric Koskinen", booktitle = "{Proceedings of the ACM Symposium on Principles of Distributed Computing}", title = "Adding Concurrency to Smart Contracts", publisher = pub-ACM, address = pub-ACM:adr, pages = "303--312", year = "2017", DOI = "https://doi.org/10.1145/3087801.3087835", ISBN = "1-4503-4992-7", ISBN-13 = "978-1-4503-4992-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PODC '17", URL = "http://doi.acm.org/10.1145/3087801.3087835", acknowledgement = ack-nhfb, acmid = "3087835", keywords = "blockchain; concurrency; Ethereum; fork-join; miners; smart contracts; validators", location = "Washington, DC, USA", pagecount = "10", } @InProceedings{DiCrescenzo:2017:PPD, author = "Giovanni {Di Crescenzo} and Brian Coan and Jonathan Kirsch", title = "Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks", crossref = "Garcia-Alfaro:2017:DPM", pages = "275--294", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_16", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_16", acknowledgement = ack-nhfb, } @InCollection{DiFrancescoMaesa:2017:ABU, author = "Damiano {Di Francesco Maesa} and Andrea Marino and Laura Ricci", booktitle = "Complex Networks \& Their Applications {V}", title = "An analysis of the {Bitcoin} users graph: inferring unusual behaviours", publisher = pub-SV, address = pub-SV:adr, pages = "749--760", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-50901-3_59", ISBN = "3-319-50901-2", ISBN-13 = "978-3-319-50901-3", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-50901-3_59", acknowledgement = ack-nhfb, } @InCollection{DiFrancescoMaesa:2017:BBA, author = "Damiano {Di Francesco Maesa} and Paolo Mori and Laura Ricci", booktitle = "Distributed Applications and Interoperable Systems", title = "Blockchain Based Access Control", publisher = pub-SV, address = pub-SV:adr, pages = "206--220", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-59665-5_15", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-59665-5_15", acknowledgement = ack-nhfb, } @InProceedings{Dikshit:2017:EWT, author = "Pratyush Dikshit and Kunwar Singh", booktitle = "2017 {ISEA} Asia Security and Privacy {(ISEASP)}", title = "Efficient weighted threshold {ECDSA} for securing {Bitcoin} wallet", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--9", month = jan, year = "2017", DOI = "https://doi.org/10.1109/ISEASP.2017.7976994", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7976994/", acknowledgement = ack-nhfb, keywords = "Banking; bitcoin; bitcoin transaction; bitcoin wallet security; blockchain; cryptographic algorithms; Cryptography; digital currency; Digital signatures; digital signatures; ECDSA; efficient weighted threshold ECDSA; elliptic curve digital signature algorithm; financial data processing; Peer-to-peer computing; private key cryptography; public key cryptography; publically available database; secret key; security policy; Shamir secret sharing; threshold signature scheme; {Bitcoin}; {Bitcoin} wallet", } @InProceedings{Dinh:2017:BFA, author = "Tien Tuan Anh Dinh and Ji Wang and Gang Chen and Rui Liu and Beng Chin Ooi and Kian-Lee Tan", booktitle = "{Proceedings of the 2017 ACM International Conference on Management of Data}", title = "{BLOCKBENCH}: A Framework for Analyzing Private Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "1085--1100", year = "2017", DOI = "https://doi.org/10.1145/3035918.3064033", ISBN = "1-4503-4197-7", ISBN-13 = "978-1-4503-4197-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SIGMOD '17", URL = "http://doi.acm.org/10.1145/3035918.3064033", acknowledgement = ack-nhfb, acmid = "3064033", keywords = "blockchains; consensus; performance benchmark; security; smart contracts; transactions", location = "Chicago, Illinois, USA", pagecount = "16", } @Article{DiPierro:2017:WB, author = "Massimo {Di Pierro}", title = "What Is the Blockchain?", journal = j-COMPUT-SCI-ENG, volume = "19", number = "5", pages = "92--95", month = sep # "\slash " # oct, year = "2017", CODEN = "CSENFA", DOI = "https://doi.org/10.1109/MCSE.2017.3421554", ISSN = "1521-9615 (print), 1558-366X (electronic)", ISSN-L = "1521-9615", bibdate = "Thu Sep 7 06:51:00 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computscieng.bib", URL = "https://www.computer.org/csdl/mags/cs/2017/05/mcs2017050092-abs.html", acknowledgement = ack-nhfb, fjournal = "Computing in Science and Engineering", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5992", } @InProceedings{Divita:2017:ABM, author = "Joseph Divita and Roger A. Hallman", booktitle = "Proceedings of the 12th International Conference on Availability, Reliability and Security", title = "An Approach to Botnet Malware Detection Using Nonparametric {Bayesian} Methods", publisher = pub-ACM, address = pub-ACM:adr, pages = "75:1--75:9", year = "2017", DOI = "https://doi.org/10.1145/3098954.3107010", ISBN = "1-4503-5257-X", ISBN-13 = "978-1-4503-5257-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ARES '17", acknowledgement = ack-nhfb, acmid = "3107010", articleno = "75", keywords = "Botnets, Cybersecurity, Nonparametric Bayesian Methods", location = "Reggio Calabria, Italy", pagecount = "9", } @InCollection{Dixon:2017:BMB, author = "Peter Dixon", booktitle = "Innovationen und Innovationsmanagement in der Finanzbranche", title = "{Blockchain: Mehr als Bitcoin}. ({German}) [{Blockchain}: More than {Bitcoin}]", publisher = pub-SV, address = pub-SV:adr, pages = "215--229", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-15648-0_10", ISBN = "3-658-15648-1", ISBN-13 = "978-3-658-15648-0", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-15648-0_10", acknowledgement = ack-nhfb, language = "German", } @InProceedings{Dlamini:2017:DSS, author = "N. P. Dlamini and M. S. Scott and K. K. Nair", booktitle = "{2017 IST-Africa Week Conference (IST-Africa)}", title = "Development of an {SMS} system used to access {Bitcoin} wallets", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--10", month = may, year = "2017", DOI = "https://doi.org/10.23919/ISTAFRICA.2017.8102316", ISBN = "1-5386-3837-1", ISBN-13 = "978-1-5386-3837-8", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8102316/", acknowledgement = ack-nhfb, keywords = "Bitcoin; Crypto currency; Internet; low-end mobile phone; Mobile communication; Mobile handsets; Prototypes; Software; {Bitcoin} wallet", } @InProceedings{Dmitrienko:2017:SWA, author = "Alexandra Dmitrienko and David Noack and Moti Yung", booktitle = "Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security", title = "Secure Wallet-Assisted Offline {Bitcoin} Payments with Double-Spender Revocation", publisher = pub-ACM, address = pub-ACM:adr, pages = "520--531", year = "2017", DOI = "https://doi.org/10.1145/3052973.3052980", ISBN = "1-4503-4944-7", ISBN-13 = "978-1-4503-4944-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ASIA CCS '17", acknowledgement = ack-nhfb, acmid = "3052980", keywords = "Bitcoin, double-spender revocation, offline payments, secure hardware, zero confirmation transactions", location = "Abu Dhabi, United Arab Emirates", pagecount = "12", } @InProceedings{Dorri:2017:TOB, author = "Ali Dorri and Salil S. Kanhere and Raja Jurdak", booktitle = "{Proceedings of the Second International Conference on Internet-of-Things Design and Implementation}", title = "Towards an Optimized {BlockChain} for {IoT}", publisher = pub-ACM, address = pub-ACM:adr, pages = "173--178", year = "2017", DOI = "https://doi.org/10.1145/3054977.3055003", ISBN = "1-4503-4966-8", ISBN-13 = "978-1-4503-4966-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoTDI '17", URL = "http://doi.acm.org/10.1145/3054977.3055003", acknowledgement = ack-nhfb, acmid = "3055003", keywords = "BlockChain; Internet of Things; Privacy; Security", location = "Pittsburgh, PA, USA", pagecount = "6", } @InCollection{Drescher:2017:AT, author = "Daniel Drescher", title = "Authorizing Transactions", crossref = "Drescher:2017:BB", pages = "103--109", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_13", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_13", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:BPT, author = "Daniel Drescher", title = "Bringing the Pieces Together", crossref = "Drescher:2017:BB", pages = "189--202", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_21", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_21", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:CTH, author = "Daniel Drescher", title = "Choosing a Transaction History", crossref = "Drescher:2017:BB", pages = "165--181", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_19", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_19", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:DCP, author = "Daniel Drescher", title = "Discovering the Core Problem", crossref = "Drescher:2017:BB", pages = "29--32", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_4", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:DDS, author = "Daniel Drescher", title = "Distributing the Data Store Among Peers", crossref = "Drescher:2017:BB", pages = "145--152", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_17", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_17", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:DO, author = "Daniel Drescher", title = "Documenting Ownership", crossref = "Drescher:2017:BB", pages = "63--69", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_9", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:DT, author = "Daniel Drescher", title = "Disambiguating the Term", crossref = "Drescher:2017:BB", pages = "33--37", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_5", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:HD, author = "Daniel Drescher", title = "Hashing Data", crossref = "Drescher:2017:BB", pages = "71--79", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_10", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_10", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:HRW, author = "Daniel Drescher", title = "Hashing in the Real World", crossref = "Drescher:2017:BB", pages = "81--92", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_11", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_11", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:IPU, author = "Daniel Drescher", title = "Identifying and Protecting User Accounts", crossref = "Drescher:2017:BB", pages = "93--101", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_12", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_12", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:PB, author = "Daniel Drescher", title = "Planning the Blockchain", crossref = "Drescher:2017:BB", pages = "57--62", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_8", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:PDS, author = "Daniel Drescher", title = "Protecting the Data Store", crossref = "Drescher:2017:BB", pages = "135--143", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_16", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_16", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:PI, author = "Daniel Drescher", title = "Paying for Integrity", crossref = "Drescher:2017:BB", pages = "183--188", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_20", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_20", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:RB, author = "Daniel Drescher", title = "Reinventing the Blockchain", crossref = "Drescher:2017:BB", pages = "213--220", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_23", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_23", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:RP, author = "Daniel Drescher", title = "Recognizing the Potential", crossref = "Drescher:2017:BB", pages = "19--25", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_3", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:SBP, author = "Daniel Drescher", title = "Seeing the Big Picture", crossref = "Drescher:2017:BB", pages = "9--17", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_2", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:SGF, author = "Daniel Drescher", title = "Summarizing and Going Further", crossref = "Drescher:2017:BB", pages = "235--248", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_25", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_25", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:SL, author = "Daniel Drescher", title = "Seeing the Limitations", crossref = "Drescher:2017:BB", pages = "205--211", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_22", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_22", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:SMT, author = "Daniel Drescher", title = "Spending Money Twice", crossref = "Drescher:2017:BB", pages = "49--54", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_7", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:STD, author = "Daniel Drescher", title = "Storing Transaction Data", crossref = "Drescher:2017:BB", pages = "111--122", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_14", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_14", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:TLA, author = "Daniel Drescher", title = "Thinking in Layers and Aspects", crossref = "Drescher:2017:BB", pages = "3--7", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_1", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:UB, author = "Daniel Drescher", title = "Using the Blockchain", crossref = "Drescher:2017:BB", pages = "223--233", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_24", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_24", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:UDS, author = "Daniel Drescher", title = "Using the Data Store", crossref = "Drescher:2017:BB", pages = "123--134", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_15", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_15", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:UNO, author = "Daniel Drescher", title = "Understanding the Nature of Ownership", crossref = "Drescher:2017:BB", pages = "39--47", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_6", acknowledgement = ack-nhfb, } @InCollection{Drescher:2017:VAT, author = "Daniel Drescher", title = "Verifying and Adding Transactions", crossref = "Drescher:2017:BB", pages = "153--164", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9_18", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-2604-9_18", acknowledgement = ack-nhfb, } @InCollection{Dring:2017:EBT, author = "Tina D{\"u}ring and Hagen Fisbeck", booktitle = "{CSR} und Digitalisierung. ({German}) [{CSR} and digitization]", title = "{Einsatz der Blockchain-Technologie f{\"u}r eine transparente Wertsch{\"o}pfungskette}. ({German}) [{Use} of blockchain technology for a transparent value chain]", publisher = pub-SV, address = pub-SV:adr, pages = "449--464", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-53202-7_33", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, language = "German", } @InCollection{Dubovitskaya:2017:HBC, author = "Alevtina Dubovitskaya and Zhigang Xu and Samuel Ryu and Michael Schumacher and Fusheng Wang", booktitle = "{Data Management and Analytics for Medicine and Healthcare}", title = "How Blockchain Could Empower {eHealth}: An Application for Radiation Oncology", publisher = pub-SV, address = pub-SV:adr, pages = "3--6", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67186-4_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67186-4_1", acknowledgement = ack-nhfb, } @InProceedings{Durand:2017:DWT, author = "Arnaud Durand and Pascal Gremaud and Jacques Pasquier", booktitle = "{Proceedings of the Seventh International Conference on the Internet of Things}", title = "Decentralized {Web of Trust} and Authentication for the {Internet of Things}", publisher = pub-ACM, address = pub-ACM:adr, pages = "27:1--27:2", year = "2017", DOI = "https://doi.org/10.1145/3131542.3140263", ISBN = "1-4503-5318-5", ISBN-13 = "978-1-4503-5318-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoT '17", URL = "http://doi.acm.org/10.1145/3131542.3140263", acknowledgement = ack-nhfb, acmid = "3140263", articleno = "27", keywords = "authentication; blockchain; IoT; public key infrastructure", location = "Linz, Austria", pagecount = "2", } @InCollection{During:2017:EBT, author = "Tina D{\"u}ring and Hagen Fisbeck", booktitle = "{CSR und Digitalisierung}", title = "Einsatz der Blockchain-Technologie f{\"u}r eine transparente Wertsch{\"o}pfungskette", publisher = pub-SV, address = pub-SV:adr, year = "2017", DOI = "https://doi.org/10.1007/978-3-662-53202-7_33", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-53202-7_33", acknowledgement = ack-nhfb, } @InProceedings{Dyer:2017:OPE, author = "James Dyer and Martin Dyer and Jie Xu", title = "Order-Preserving Encryption Using Approximate Integer Common Divisors", crossref = "Garcia-Alfaro:2017:DPM", pages = "257--274", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_15", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_15", acknowledgement = ack-nhfb, } @InCollection{Eberhardt:2017:BIC, author = "Jacob Eberhardt and Stefan Tai", booktitle = "{Service-Oriented and Cloud Computing}", title = "On or Off the Blockchain? {Insights} on Off-Chaining Computation and Data", publisher = pub-SV, address = pub-SV:adr, pages = "3--15", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67262-5_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67262-5_1", acknowledgement = ack-nhfb, } @Article{Egelund-Muller:2017:AEF, author = "Benjamin Egelund-M{\"u}ller and Martin Elsman and Fritz Henglein and Omri Ross", title = "Automated Execution of Financial Contracts on Blockchains", journal = "Business \& Information Systems Engineering", volume = "59", number = "6", pages = "457--467", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12599-017-0507-z", ISSN = "1867-0202 (print), 2363-7005 (electronic)", ISSN-L = "1867-0202", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12599-017-0507-z", acknowledgement = ack-nhfb, fjournal = "Business \& Information Systems Engineering", journal-URL = "https://link.springer.com/journal/12599", } @InProceedings{Emmadi:2017:RIP, author = "Nitesh Emmadi and Harika Narumanchi", booktitle = "{Proceedings of the 18th International Conference on Distributed Computing and Networking}", title = "Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures' Infrastructure", publisher = pub-ACM, address = pub-ACM:adr, pages = "46:1--46:6", year = "2017", DOI = "https://doi.org/10.1145/3007748.3018280", ISBN = "1-4503-4839-4", ISBN-13 = "978-1-4503-4839-3", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICDCN '17", URL = "http://doi.acm.org/10.1145/3007748.3018280", acknowledgement = ack-nhfb, acmid = "3018280", articleno = "46", keywords = "Bitcoin; Blockchain; Hashchain; Keyless Signatures' Infrastructure; Merkle Tree; Permissioned Environments; Permissionless Environments", location = "Hyderabad, India", pagecount = "6", } @InProceedings{Engelmann:2017:TEA, author = "Felix Engelmann and Henning Kopp and Frank Kargl and Florian Glaser and Christof Weinhardt", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "Towards an Economic Analysis of Routing in Payment Channel Networks", publisher = pub-ACM, address = pub-ACM:adr, pages = "2:1--2:6", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152826", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152826", acknowledgement = ack-nhfb, acmid = "3152826", articleno = "2", keywords = "Bitcoin, blockchain, Ethereum, payment channel, simulation", location = "Las Vegas, Nevada", pagecount = "6", } @InCollection{Epishkina:2017:DCH, author = "Anna Epishkina and Sergey Zapechnikov", booktitle = "Advances in Intelligent Systems and Computing", title = "Discovering and Clustering Hidden Time Patterns in Blockchain Ledger", publisher = "Springer International Publishing", address = "????", pages = "245--250", month = jul, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63940-6_35", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Ermilov:2017:ABA, author = "Dmitry Ermilov and Maxim Panov and Yury Yanovich", editor = "{IEEE}", booktitle = "{2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), 18--21 December 2017, Cancun, Mexico}", title = "Automatic {Bitcoin} Address Clustering", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "461--466", month = dec, year = "2017", DOI = "https://doi.org/10.1109/ICMLA.2017.0-118", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8260674/", acknowledgement = ack-nhfb, keywords = "Authentication; Bitcoin; Bitcoin,-blockchain,-clustering,-privacy,-anonymity; Clustering algorithms; Companies; History; Mixers", } @InProceedings{Eskandari:2017:DDA, author = "Mojtaba Eskandari and Bruno Crispo and Anderson Santana de Oliveira", title = "{DLoc}: Distributed Auditing for Data Location Compliance in Cloud", crossref = "Garcia-Alfaro:2017:DPM", pages = "202--218", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_12", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_12", acknowledgement = ack-nhfb, } @InProceedings{Evans-Greenwood:2017:DLL, author = "Peter Evans-Greenwood", booktitle = "{Proceedings of the 26th International Conference on World Wide Web Companion}", title = "Distributed Ledgers \& Linked Data", publisher = "International World Wide Web Conferences Steering Committee", address = "Republic and Canton of Geneva, Switzerland", pages = "1451--1451", year = "2017", DOI = "https://doi.org/10.1145/3041021.3053898", ISBN = "1-4503-4914-5", ISBN-13 = "978-1-4503-4914-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WWW '17 Companion", acknowledgement = ack-nhfb, acmid = "3053898", keywords = "blockchain; distributed ai; distributed ledgers; linked data", location = "Perth, Australia", pagecount = "1", } @Article{Eyal:2017:BTT, author = "Ittay Eyal", title = "Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities", journal = j-COMPUTER, volume = "50", number = "9", pages = "38--49", month = sep, year = "2017", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2017.3571042", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Mon Oct 2 08:46:55 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "https://www.computer.org/csdl/mags/co/2017/09/mco2017090038-abs.html", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @InProceedings{Fadhil:2017:LBA, author = "Muntadher Fadhil and Gareth Owenson and Mo Adda", booktitle = "2017 {IFIP\slash} {IEEE} Symposium on Integrated Network and Service Management {(IM)}", title = "Locality based approach to improve propagation delay on the {Bitcoin} peer-to-peer network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "556--559", month = may, year = "2017", DOI = "https://doi.org/10.23919/INM.2017.7987328", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7987328/", acknowledgement = ack-nhfb, keywords = "BCBSN; Clustering Evaluation; clustering protocol; clustering structures; communication link cost reduction; connectivity locality; cost reduction; Delays; double spend attacks; electronic money; geographical location; geography; locality based approach; location based clustering; location based-distance; mobile computing; pattern clustering; peer-to-peer computing; Peer-to-peer computing; peer-to-peer electronic currency system; Propagation Delay; Propagation delay; Protocols; transaction propagation delay; transaction verification delay overhead; {Bitcoin}; {Bitcoin} nodes; {Bitcoin} peer-to-peer network", } @Article{Fairley:2017:BWF, author = "P. Fairley", title = "Blockchain world --- Feeding the blockchain beast: if {Bitcoin} ever does go mainstream, the electricity needed to sustain it will be enormous", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "36--59", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048837", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; blockchain world; Central Processing Unit; Data mining; Hardware; Medical services; power grids; virtual currency; {Bitcoin}", } @Article{Fauzi:2017:IAU, author = "Muhammad Reza Rizky Fauzi and Surya Michrandi Nasution and Marisa W. Paryasto", title = "Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the {Bitcoin}", journal = "{IOP} Conference Series: Materials Science and Engineering", volume = "260", pages = "012003", month = nov, year = "2017", DOI = "https://doi.org/10.1088/1757-899x/260/1/012003", ISSN = "1757-8981 (print), 1757-899X (electronic)", ISSN-L = "1757-8981", bibdate = "Mon Dec 4 11:59:45 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Feder:2017:IDO, author = "Amir Feder and Neil Gandal and J. T. Hamrick and Tyler Moore", title = "The impact of {DDoS} and other security shocks on Bitcoin currency exchanges: evidence from {Mt. Gox}", journal = "J. Cybersecur.", volume = "3", number = "2", pages = "137--144", month = "????", year = "2017", CODEN = "????", DOI = "https://doi.org/10.1093/cybsec/tyx012", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cybersecurity/cybersecurity3.html#FederGHM17; https://www.wikidata.org/entity/Q111689208", acknowledgement = ack-nhfb, dblp-key = "journals/cybersecurity/FederGHM17", dblp-mdate = "2022-08-16", } @InProceedings{Fezeu:2017:SID, author = "H. Kamdem Fezeu and T. Djotio and R. Oulad Haj Thami", booktitle = "{Proceedings of the 2Nd International Conference on Big Data, Cloud and Applications}", title = "Safe and Irrefutable Decentralized Communication: Bringing Non-Repudiation to Mesh Networks", publisher = pub-ACM, address = pub-ACM:adr, pages = "37:1--37:6", year = "2017", DOI = "https://doi.org/10.1145/3090354.3090392", ISBN = "1-4503-4852-1", ISBN-13 = "978-1-4503-4852-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BDCA'17", URL = "http://doi.acm.org/10.1145/3090354.3090392", acknowledgement = ack-nhfb, acmid = "3090392", articleno = "37", keywords = "Blockchain; Information Security; Internet of Things; Mesh Networks", location = "Tetouan, Morocco", pagecount = "6", } @InCollection{Filtz:2017:EBA, author = "Erwin Filtz and Axel Polleres and Roman Karl and Bernhard Haslhofer", booktitle = "Data Science Analytics and Applications", title = "Evolution of the {Bitcoin} Address Graph", publisher = pub-SV, address = pub-SV:adr, pages = "77--82", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-19287-7_11", ISBN = "3-658-19287-9", ISBN-13 = "978-3-658-19287-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-19287-7_11", acknowledgement = ack-nhfb, } @InBook{Finn:2017:CB, author = "Ed Finn", booktitle = "What Algorithms Want:Imagination in the Age of Computing", title = "Counting {Bitcoin}", publisher = pub-MIT, address = pub-MIT:adr, pages = "272-", year = "2017", DOI = "", ISBN = "0-262-33883-1", ISBN-13 = "978-0-262-33883-7", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7904154", acknowledgement = ack-nhfb, } @Book{Finn:2017:WAW, author = "Ed Finn", title = "What algorithms want: imagination in the age of computing", publisher = pub-MIT, address = pub-MIT:adr, pages = "viii + 257", year = "2017", ISBN = "0-262-03592-8 (hardcover)", ISBN-13 = "978-0-262-03592-7 (hardcover)", LCCN = "HM851 .F5565 2017", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Information technology; Social aspects; Computers; Algorithms", tableofcontents = "Acknowledgements \\ Introduction \\ What is an algorithm? \\ Building the star trek computer \\ House of cards: the aesthetics of abstraction \\ Coding cow clicker: the work of algorithms \\ Counting bitcoin \\ Coda: the algorithmic imagination \\ Notes \\ Figure credits \\ Works cited \\ Index", } @InProceedings{Foth:2017:PBT, author = "Marcus Foth", booktitle = "{Proceedings of the 29th Australian Conference on Computer-Human Interaction}", title = "The Promise of Blockchain Technology for Interaction Design", publisher = pub-ACM, address = pub-ACM:adr, pages = "513--517", year = "2017", DOI = "https://doi.org/10.1145/3152771.3156168", ISBN = "1-4503-5379-7", ISBN-13 = "978-1-4503-5379-3", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "OZCHI '17", URL = "http://doi.acm.org/10.1145/3152771.3156168", acknowledgement = ack-nhfb, acmid = "3156168", keywords = "blockchain; distributed ledger; interaction design; provenance", location = "Brisbane, Queensland, Australia", pagecount = "5", } @Article{Fox:2017:B, author = "Dirk Fox", title = "{Bitcoin}", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "8", pages = "507--507", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0821-0", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0821-0", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", } @InProceedings{Fraser:2017:SFS, author = "J. G. Fraser and A. Bouridane", booktitle = "2017 Seventh International Conference on Emerging Security Technologies {(EST)}", title = "Have the security flaws surrounding {Bitcoin} affected the currency's value?", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "50--55", month = sep, year = "2017", DOI = "https://doi.org/10.1109/EST.2017.8090398", ISSN = "2472-7601", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8090398/", acknowledgement = ack-nhfb, keywords = "Bitcoin; Blockchain; Companies; Crypto Currency Digital Security; Digital Currency; Fluctuations; Online banking; Protocols", } @InProceedings{Frey:2017:SSG, author = "Remo Manuel Frey and Thomas Hardjono and Christian Smith and Keeley Erhardt and Alex `Sandy' Pentland", booktitle = "{Proceedings of the Fourth International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data}", title = "Secure Sharing of Geospatial Wildlife Data", publisher = pub-ACM, address = pub-ACM:adr, pages = "5:1--5:6", year = "2017", DOI = "https://doi.org/10.1145/3080546.3080550", ISBN = "1-4503-5047-X", ISBN-13 = "978-1-4503-5047-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "GeoRich '17", URL = "http://doi.acm.org/10.1145/3080546.3080550", acknowledgement = ack-nhfb, acmid = "3080550", articleno = "5", keywords = "animal; blockchain; crime; cyber-poaching; data sharing; geospatial; GPS; hunting; privacy; security; species protection; wildlife", location = "Chicago, Illinois", pagecount = "6", } @Article{Fridgen:2017:EDI, author = "{Prof.Dr.Gilbert} Fridgen and Sven Radszuwill and Andr{\'e} Schweizer and {Prof.Dr.Nils} Urbach", title = "{Entwicklung disruptiver Innovationen mit Blockchain: Der Weg zum richtigen Anwendungsfall}. ({German}) [{Developing} Disruptive Innovations with Blockchain: The Road to the Right Use Case]", journal = "Wirtschaftsinformatik \& Management", volume = "9", number = "5", pages = "52--59", month = oct, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s35764-017-0108-0", ISSN = "1867-5905 (print), 1867-5913 (electronic)", ISSN-L = "1867-5905", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s35764-017-0108-0", acknowledgement = ack-nhfb, fjournal = "Wirtschaftsinformatik \& Management", journal-URL = "https://link.springer.com/journal/35764", language = "German", } @InProceedings{Friebe:2017:DDD, author = "Sebastian Friebe and Martin Florian", booktitle = "Proceedings of the {SIGCOMM} Posters and Demos", title = "{DPS}-Discuss: Demonstrating Decentralized, Pseudonymous, {Sybil}-resistant Communication", publisher = pub-ACM, address = pub-ACM:adr, pages = "74--75", year = "2017", DOI = "https://doi.org/10.1145/3123878.3131991", ISBN = "1-4503-5057-7", ISBN-13 = "978-1-4503-5057-0", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SIGCOMM Posters and Demos '17", acknowledgement = ack-nhfb, acmid = "3131991", keywords = "Bitcoin, Censorship, Pseudonymity, Sybil-Resistance, Tor", location = "Los Angeles, CA, USA", pagecount = "2", } @InProceedings{Frowis:2017:CWT, author = "Michael Fr{\"o}wis and Rainer B{\"o}hme", title = "In Code We Trust?", crossref = "Garcia-Alfaro:2017:DPM", pages = "357--372", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_20", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_20", acknowledgement = ack-nhfb, } @InProceedings{Furuta:2017:TES, author = "Yuuji Furuta and Naoto Yanai and Masashi Karasaki and Katsuhiko Eguchi and Yasunori Ishihara and Toru Fujiwara", title = "Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model", crossref = "Garcia-Alfaro:2017:DPM", pages = "55--69", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_4", acknowledgement = ack-nhfb, } @Article{G:2017:BFM, author = "B. G.", title = "{Bitcoin} is fiat money, too: What {Charles Kindleberger} has to say about cryptocurrencies", journal = j-ECONOMIST, volume = "??", number = "??", pages = "??--??", day = "22", month = sep, year = "2017", CODEN = "EONOEH", ISSN = "0013-0613 (print), 1476-8860 (electronic)", ISSN-L = "0013-0613", bibdate = "Fri Jan 19 06:04:10 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.economist.com/blogs/freeexchange/2017/09/not-so-novel", acknowledgement = ack-nhfb, fjournal = "The Economist", remark = "From the article: ``\ldots{} it has always been tempting for private finance to create too much money. There is no evidence that money born on a distributed ledger will be clean of this sin.'' ``[the distributed ledger] us not new, and it has failed spectacularly in the past. \ldots{} History instructs that no governance is perfect, and humans are reliably awful.''", } @InProceedings{Gadriwala:2017:APC, author = "Umme Salma Gadriwala and Christopher Kumar Anand and Curtis D'Alves and Bill O'Farrell", booktitle = "{Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering}", title = "Accelerating {Poly1305} Cryptographic Message Authentication on the {Z14}", publisher = pub-IBM, address = pub-IBM:adr, pages = "48--54", year = "2017", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CASCON '17", URL = "http://dl.acm.org/citation.cfm?id=3172795.3172802", acknowledgement = ack-nhfb, acmid = "3172802", location = "Markham, Ontario, Canada", pagecount = "7", } @TechReport{Gandal:2017:PMB, author = "Neil Gandal and J. T. Hamrick and Tyler Moore and Tali Oberman", title = "Price Manipulation in the {Bitcoin} Ecosystem", type = "Report", institution = "Tel Aviv University and The University of Tulsa", address = "Tel Aviv, Israel and Tulsa, OK, USA", day = "22", month = may, year = "2017", bibdate = "Thu Jan 18 06:22:16 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://weis2017.econinfosec.org/wp-content/uploads/sites/3/2017/05/WEIS_2017_paper_21.pdf", abstract = "We identify and analyze the impact of suspicious trading activity (STA) on the Mt. Gox Bitcoin currency exchange between February and November 2013. We discuss two distinct STA periods in which approximately 600,000 bitcoins (BTC) valued at \$188 million were acquired by agents who did not pay for the bitcoins. During the second period, the USD-BTC exchange rate rose by an average of \$20 at Mt. Gox on days when suspicious trades took place, compared to a slight decline on days without suspicious activity. Based on rigorous analysis with extensive robustness checks, we conclude that the suspicious trading activity caused the unprecedented spike in the USD-BTC exchange rate in late 2013, when the rate jumped from around \$150 to more than \$1,000 in two months.", acknowledgement = ack-nhfb, } @PhdThesis{Gao:2017:PAB, author = "Zhimin Gao", title = "Performance Analysis of Blockchain and Smart Contracts", type = "{Ph.D.}", school = "University of Houston", address = "Houston, TX, USA", pages = "167", year = "2017", ISBN = "0-438-84609-5", ISBN-13 = "978-0-438-84609-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2189769513", abstract = "Blockchain, or distributed ledger, provides a way to build various decentralized systems without relying on any single trusted party. It is especially attractive for smart contracts that different parties do not need to trust each other to have a contract, and the distributed ledger can guarantee correct execution of the contract. Several factors, such as low throughput and high latency, have already affected the performance of blockchain and smart contract system significantly. They also impede innovation and development of blockchain. For example, most existing distributed ledger and smart contract systems process smart contracts in a serial manner, i.e., all users have to run a contract before its result can be accepted by the system. Although this approach is easy to implement and manage, it is not scalable and greatly limits the system's capability of handling a large number of smart contracts. In order to address this problem, we propose a scalable smart contract execution scheme that can run multiple smart contracts in parallel to improve the throughput of the system. We also design a novel scheme to reduce the latency of blockchain creation by dividing the block mining period into two steps. Then, a mathematical model is introduced to discuss more about the scalability of blockchain and smart contracts. We utilize the concept of Nash equilibrium and game theory to prove that the system will scale up autonomously under some conditions. Finally, we discuss a hardware-based scheme to improve the performance of blockchain and smart contracts.", acknowledgement = ack-nhfb, advisor = "Weidong Shi", keywords = "0984:Computer science; Applied sciences; Blockchain; Computer science; Performance; Security; Smart contracts", ris-m1 = "13837389", } @InProceedings{Garay:2017:BBP, author = "Juan Garay and Aggelos Kiayias and Nikos Leonardos", booktitle = "Advances in Cryptology {CRYPTO 2017}", title = "The {Bitcoin} Backbone Protocol with Chains of Variable Difficulty", publisher = pub-SV, address = pub-SV:adr, pages = "291--323", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63688-7_10", ISBN = "3-319-63687-1 (paperback), 3-319-63688-X (e-book)", ISBN-13 = "978-3-319-63687-0 (paperback), 978-3-319-63688-7 (e-book)", MRclass = "94A60", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-63688-7_10", ZMnumber = "06802616", acknowledgement = ack-nhfb, } @InProceedings{Garay:2017:BPB, author = "Juan A. Garay", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "Basic Properties of the Blockchain: (Invited Talk)", publisher = pub-ACM, address = pub-ACM:adr, pages = "1--1", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055519", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055519", acknowledgement = ack-nhfb, acmid = "3055519", location = "Abu Dhabi, United Arab Emirates", pagecount = "1", } @InCollection{Garcia-Banuelos:2017:OEB, author = "Luciano Garc{\'\i}a-Ba{\~n}uelos and Alexander Ponomarev and Marlon Dumas and Ingo Weber", booktitle = "{Business Process Management}", title = "Optimized Execution of Business Processes on Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "130--146", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-65000-5_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-65000-5_8", acknowledgement = ack-nhfb, } @InCollection{Garcia-Barriocanal:2017:DMB, author = "Elena Garc{\'\i}a-Barriocanal and Salvador S{\'a}nchez-Alonso and Miguel-Angel Sicilia", booktitle = "{Metadata and Semantic Research}", title = "Deploying Metadata on Blockchain Technologies", publisher = pub-SV, address = pub-SV:adr, pages = "38--49", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70863-8_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70863-8_4", acknowledgement = ack-nhfb, } @PhdThesis{Gencer:2017:SBT, author = "Adem Efe Gencer", title = "On Scalability of Blockchain Technologies", type = "{Ph.D.}", school = "Cornell University", address = "Ithaca, NY, USA", pages = "140", year = "2017", ISBN = "0-355-28166-X", ISBN-13 = "978-0-355-28166-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1964277559", abstract = "In this dissertation, we explore how to improve scalability of blockchains while maintaining their fundamental premise of decentralization. Scalable blockchains are capable of delivering a target throughput and latency in the presence of increasing workload. To this end, first we present Bitcoin-NG, a new blockchain protocol designed to provide scale for services involving frequent, high-volume interactions. This Byzantine fault tolerant blockchain protocol is robust to extreme churn and shares the same trust model as Bitcoin. We experimentally demonstrate that Bitcoin-NG scales optimally, with bandwidth limited only by the capacity of the individual nodes and latency limited only by the propagation time of the network. Then, we examine the scalability challenges arising from proliferation of blockchain services. In particular, we observe that due to inherently single-service oriented blockchain protocols, services can bloat the existing blockchains, fail to provide sufficient security, or completely forego the property of trustless auditability. We introduce Aspen, a sharded blockchain protocol that securely scales with increasing number of services. Aspen enables service integration without compromising security-leveraging the trust assumptions-or flooding users with irrelevant messages. Finally, we provide the means to assess the viability of different scaling solutions. We develop and utilize custom metrics for evaluating performance and security of blockchain protocols. Moreover, we design tools and techniques for measuring decentralization in operational blockchain systems, demonstrating their use in a comparative study of decentralization in Bitcoin and Ethereum.", acknowledgement = ack-nhfb, advisor = "Emin Gun Sirer and Robbert van Renesse", keywords = "0984:Computer science; Applied sciences; Aspen; Bitcoin-NG; Blockchain; Computer science; Decentralization; Scaling; Sharding", ris-m1 = "10617385", } @InCollection{Gencer:2017:SPS, author = "Adem Efe Gencer and Robbert van Renesse and Emin G{\"u}n Sirer", booktitle = "{Financial Cryptography and Data Security}", title = "Short Paper: Service-Oriented Sharding for Blockchains", publisher = pub-SV, address = pub-SV:adr, pages = "393--401", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70972-7_22", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70972-7_22", acknowledgement = ack-nhfb, } @InProceedings{Gentilal:2017:TBB, author = "Miraje Gentilal and Paulo Martins and Leonel Sousa", booktitle = "Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems", title = "{TrustZone}-backed {Bitcoin} Wallet", publisher = pub-ACM, address = pub-ACM:adr, pages = "25--28", year = "2017", DOI = "https://doi.org/10.1145/3031836.3031841", ISBN = "1-4503-4869-6", ISBN-13 = "978-1-4503-4869-0", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CS2 '17", acknowledgement = ack-nhfb, acmid = "3031841", keywords = "TrustZone, Bitcoin, hardware wallet", location = "Stockholm, Sweden", pagecount = "4", } @InProceedings{Ghosh:2017:ACO, author = "Shalini Ghosh and Ariyam Das and Phil Porras and Vinod Yegneswaran and Ashish Gehani", booktitle = "Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining", title = "Automated Categorization of Onion Sites for Analyzing the {Darkweb} Ecosystem", publisher = pub-ACM, address = pub-ACM:adr, pages = "1793--1802", year = "2017", DOI = "https://doi.org/10.1145/3097983.3098193", ISBN = "1-4503-4887-4", ISBN-13 = "978-1-4503-4887-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "KDD '17", acknowledgement = ack-nhfb, acmid = "3098193", keywords = "classification, clustering, darkweb, keyword discovery, onion sites, semi-supervised learning", location = "Halifax, NS, Canada", pagecount = "10", } @Article{Gimpel:2017:DTB, author = "Henner Gimpel and Maximilian R{\"o}glinger", title = "Disruptive Technologien --- Blockchain, Deep Learning \& Co.", journal = "Wirtschaftsinformatik \& Management", volume = "9", number = "5", pages = "8--15", month = oct, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s35764-017-0103-5", ISSN = "1867-5905 (print), 1867-5913 (electronic)", ISSN-L = "1867-5905", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s35764-017-0103-5", acknowledgement = ack-nhfb, fjournal = "Wirtschaftsinformatik \& Management", journal-URL = "https://link.springer.com/journal/35764", } @InCollection{Gkaniatsou:2017:LLA, author = "Andriana Gkaniatsou and Myrto Arapinis and Aggelos Kiayias", booktitle = "Information Security", title = "Low-Level Attacks in {Bitcoin} Wallets", publisher = pub-SV, address = pub-SV:adr, pages = "233--253", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69659-1_13", ISBN = "3-319-69659-9", ISBN-13 = "978-3-319-69659-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69659-1_13", acknowledgement = ack-nhfb, } @InProceedings{Gobel:2017:IBS, author = "J. G{\"o}bel and A. E. Krzesinski", editor = "{IEEE}", booktitle = "{2017 27th International Telecommunication Networks and Applications Conference (ITNAC), 22--24 November 2017, Melbourne, VIC, Australia}", title = "Increased block size and {Bitcoin} blockchain dynamics", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = nov, year = "2017", DOI = "https://doi.org/10.1109/ATNAC.2017.8215367", ISBN = "1-5090-6796-5", ISBN-13 = "978-1-5090-6796-1", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Data structures; Peer-to-peer computing; Proposals; Protocols", } @InProceedings{Goldwasser:2017:PAV, author = "Shafi Goldwasser and Sunoo Park", booktitle = "{Proceedings of the 2017 on Workshop on Privacy in the Electronic Society}", title = "Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal", publisher = pub-ACM, address = pub-ACM:adr, pages = "99--110", year = "2017", DOI = "https://doi.org/10.1145/3139550.3139565", ISBN = "1-4503-5175-1", ISBN-13 = "978-1-4503-5175-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WPES '17", URL = "http://doi.acm.org/10.1145/3139550.3139565", acknowledgement = ack-nhfb, acmid = "3139565", keywords = "accountability; cryptography; snark; zero knowledge", location = "Dallas, Texas, USA", pagecount = "12", } @PhdThesis{Gonzalez:2017:ASP, author = "Pablo R. Velasco Gonzalez", title = "''the authority of the steam'': power dynamics of digital production in the bitcoin blockchain", type = "{Ph.D.}", school = "University of Warwick", address = "Warwick, Warwickshire, UK", year = "2017", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2204708100", abstract = "This thesis offers a critical investigation of the Bitcoin currency and the operation of its technical structure, i.e. blockchain technology. The main objective of the research is to identify and describe the specific power dynamics performed by and through this digital phenomenon. ``Power dynamics'' are framed in this work largely in terms of authority and sovereignty. To structure an exploration of such dynamics, the narrative is overarched by four different notions of ``utopia'' -as paradox, ideal, no-place, and imagined governance- that address the following main questions always underpinned by the general inquiry on power: What is the Bitcoin Blockchain? Where is it located? How are power relations performed in it? And how are power relations modified in relation with previous institutional systems? The thesis addresses distinct notions of authority in Bitcoin through the observation of its historical, spatial, and organizational characteristics. It maps the techno-political emergence of the blockchain system, the geographical distribution of Bitcoin's infrastructural network, and the strategies for governance involved in its development as software. Based on the observation of these settings, this thesis argues that Bitcoin posits a restructuration of power dynamics through the automation of code, in particular, through its process of production. In order to develop this restructuration, the power dynamics of the Bitcoin blockchain are weighted against authority models of the state's institutions. The thesis builds upon existing political theories of Empire (Hardt and Negri), protocol (Galloway), and the Stack (Bratton) to develop a critical account of Bitcoin's power dynamics. The work sits in between the disciplines of Media Theory, Software Studies, Political Theory, and Digital Methods, and makes use of qualitative and quantitative methods to empirically support the former argument.", acknowledgement = ack-nhfb, keywords = "(UMI)AAI13875666; http://wrap.warwick.ac.uk/108267/; Social sciences", ris-m1 = "13875666", } @MastersThesis{Goswami:2017:SAB, author = "Sneha Goswami", title = "Scalability Analysis of Blockchains Through Blockchain Simulation", type = "{M.S.C.S.}", school = "University of Nevada, Las Vegas", address = "Las Vegas, NV, USA", pages = "66", year = "2017", ISBN = "0-355-31209-3", ISBN-13 = "978-0-355-31209-6", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1978154763", abstract = "The past decade has witnessed a surge of cryptocurrencies such as bitcoins, litecoin, dogecoin, peercoin, bitcoin being the most popular amongst them. Enthusiasts and skeptics have debated and come up with disparate opinions to contest both the success and failures of such currencies. However, the veracity of such opinions can only be derived after true analysis of the technological breakthroughs that have occurred in this domain. Blockchains being the backbone of such currencies is a broad subject that encompasses economics, law, cryptography and software engineering. Most of these technologies are decentralized and are open source algorithms. Blockchains popularity is largely based on its tremendous potential of carrying huge amount of data securely over a peer to peer network. This feature of blockchains has leveraged its value in the market for many companies who want to use blockchains for enterprise goals and profit making. For a more comprehensive understanding of blockchains and how the block generation algorithm works, how transactions are included in a block we must understand the genesis of the blockchain technology, what exactly it represents and its relevance to the real world. Despite its advantages, blockchains still remain a novel technology and their remains areas of concerns that can be bettered for attaining ideal efficiency. This research delves into the scalability issue of blockchains and provides a comparative analysis of several blockchain parameters with real time data. It delves into the factors that make block chains largely non-scalable. This is done by the simulation of blockchain. It then addresses the various mechanisms that can be employed to resolve this limitation through measuring the differences between the simulator and real time scenarios.", acknowledgement = ack-nhfb, advisor = "Yoohwan Kim", keywords = "0984:Computer science; Applied sciences; Bitcoin; Blockchains; Computer science; Cryptocurrency; Cryptography; Decentralized; Scalability", ris-m1 = "10286702", } @InCollection{Goyal:2017:OCI, author = "Rishab Goyal and Vipul Goyal", booktitle = "{Theory of Cryptography}", title = "Overcoming Cryptographic Impossibility Results Using Blockchains", publisher = pub-SV, address = pub-SV:adr, pages = "529--561", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70500-2_18", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70500-2_18", acknowledgement = ack-nhfb, } @InProceedings{Grcan:2017:BLD, author = "{\"O}nder G{\"u}rcan and Antonella {Del Pozzo} and Sara Tucci-Piergiovanni", booktitle = "On the Move to Meaningful {Internet} Systems. {OTM 2017} Conferences", title = "On the {Bitcoin} Limitations to Deliver Fairness to Users", publisher = pub-SV, address = pub-SV:adr, pages = "589--606", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69462-7_37", ISBN = "3-319-69462-6", ISBN-13 = "978-3-319-69462-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69462-7_37", acknowledgement = ack-nhfb, } @InProceedings{Green:2017:BAP, author = "Matthew Green and Ian Miers", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "{Bolt}: Anonymous Payment Channels for Decentralized Currencies", publisher = pub-ACM, address = pub-ACM:adr, pages = "473--489", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134093", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3134093", acknowledgement = ack-nhfb, acmid = "3134093", keywords = "Bitcoin, blockchain, off chain, payments", location = "Dallas, Texas, USA", pagecount = "17", } @Article{Grimm:2017:ARB, author = "R{\"u}diger Grimm and Andreas Heinemann", title = "{Alle reden {\"u}ber Blockchain}. ({German}) [{Everyone} is talking about blockchain]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "8", pages = "469--469", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0813-0", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0813-0", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @InCollection{Halim:2017:BSH, author = "Norul Suhaliana bt Abd Halim and Md Arafatur Rahman and Saiful Azad and Muhammad Nomani Kabir", booktitle = "Recent Trends in Information and Communication Technology", title = "Blockchain Security Hole: Issues and Solutions", publisher = "Springer International Publishing", address = "????", pages = "739--746", month = may, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-59427-9_76", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Halpin:2017:NDI, author = "Harry Halpin", booktitle = "{Proceedings of the 12th International Conference on Availability, Reliability and Security}", title = "{NEXTLEAP}: Decentralizing Identity with Privacy for Secure Messaging", publisher = pub-ACM, address = pub-ACM:adr, pages = "92:1--92:10", year = "2017", DOI = "https://doi.org/10.1145/3098954.3104056", ISBN = "1-4503-5257-X", ISBN-13 = "978-1-4503-5257-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ARES '17", URL = "http://doi.acm.org/10.1145/3098954.3104056", acknowledgement = ack-nhfb, acmid = "3104056", articleno = "92", keywords = "anonymity; decentralization; identity; privacy; secure messaging", location = "Reggio Calabria, Italy", pagecount = "10", } @InProceedings{Hariya:2017:BPB, author = "Meet Hariya and Yash Wagle and Achintya Desai and Sachin Deshpande", editor = "{IEEE}", booktitle = "{2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), 20--22 April 2017, Coimbatore, India}", title = "Buyer's protection in {Bitcoin}", volume = "1", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "713--715", month = apr, year = "2017", DOI = "https://doi.org/10.1109/ICECA.2017.8203634", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Computer security; Conflict Resolution; Cryptocurrency; Digital signatures; Distributed System; Privacy", } @Book{Hart:2017:MHE, editor = "Keith Hart", title = "Money in a human economy", volume = "5", publisher = "Berghahn Books", address = "New York, NY, USA", pages = "vi + 308", year = "2017", ISBN = "1-78533-559-6 (hardcover), 1-78533-560-X", ISBN-13 = "978-1-78533-559-4 (hardcover), 978-1-78533-560-0", LCCN = "HG231 .M5864 2017", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "The human economy", acknowledgement = ack-nhfb, subject = "Money; History; Foreign exchange", tableofcontents = "Introduction \\ Capitalism and our moment in the history of money / Keith Hart \\ Thinking about money \\ Money is good to think: from ``wants of the mind'' to conversation, stories and accounts / Jane Guyer \\ The shadow of Aristotle: a history of ideas about the origins of money / Joseph Noko \\ Luxury and the sexual economy of capitalism / Noam Yuran \\ The evolution of money today \\ The future of money is shaped by the family practices of the global south / Supriya Singh \\ Remittance securitization in the hemisphere of the Americas: from Wall Street to Calle principal and back / David Pedersen \\ Cross-border investment in China / Horacio Ortiz \\ Value transfer and rent: or, I didn't realize my payment was your annuity / Bill Maurer \\ The politics of bitcoin / Nigel Dodd \\ Money in its time and place \\ A South Asian mercantile model of exchange: hundi during British rule / Marina Martin \\ Money and markets for and against the people: the rise and fall of Basotho's economic independence, 1830s--1930s / Sean Maliehe \\ Gender and money in the Argentinian trueque / Hadrien Saiag \\ Imaginary monies in Haiti / Federico Neibourg \\ Index", } @InCollection{He:2017:BBI, author = "Yunhua He and Hong Li and Xiuzhen Cheng and Yan Liu and Limin Sun", booktitle = "Wireless Algorithms, Systems, and Applications", title = "A {Bitcoin} Based Incentive Mechanism for Distributed {P2P} Applications", publisher = pub-SV, address = pub-SV:adr, pages = "457--468", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-60033-8_40", ISBN = "3-319-60033-8", ISBN-13 = "978-3-319-60033-8", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-60033-8_40", acknowledgement = ack-nhfb, } @InProceedings{Hentges:2017:FPS, author = "Mitchell Hentges and Sheldon Roddick and Haytham Elmiligi", booktitle = "Proceedings of the {22Nd} Western Canadian Conference on Computing Education", title = "{Fambit}: A Promising Solution to Support Open Educational Resources Initiatives", publisher = pub-ACM, address = pub-ACM:adr, pages = "4:1--4:4", year = "2017", DOI = "https://doi.org/10.1145/3085585.3085589", ISBN = "1-4503-5066-6", ISBN-13 = "978-1-4503-5066-2", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WCCCE '17", acknowledgement = ack-nhfb, acmid = "3085589", articleno = "4", keywords = "Bitcoin, Microdonation, Online content monetization, WebExtension, World Wide Web", location = "Abbotsford, BC, Canada", pagecount = "4", } @InProceedings{Herlihy:2017:BFD, author = "Maurice Herlihy", booktitle = "{Proceedings of the ACM Symposium on Principles of Distributed Computing}", title = "Blockchains and the Future of Distributed Computing", publisher = pub-ACM, address = pub-ACM:adr, pages = "155--155", year = "2017", DOI = "https://doi.org/10.1145/3087801.3087873", ISBN = "1-4503-4992-7", ISBN-13 = "978-1-4503-4992-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PODC '17", URL = "http://doi.acm.org/10.1145/3087801.3087873", acknowledgement = ack-nhfb, acmid = "3087873", keywords = "blockchain; cryptocurrency; distributed computing", location = "Washington, DC, USA", pagecount = "1", } @InProceedings{Hirai:2017:DEV, author = "Yoichi Hirai", booktitle = "{Financial Cryptography and Data Security}", title = "Defining the {Ethereum} Virtual Machine for Interactive Theorem Provers", publisher = pub-SV, address = pub-SV:adr, pages = "520--535", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_33", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_33", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2017:CWC, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Conclusion --- What Can We Learn from Blockchain-Driven Supply Chain Finance?", crossref = "Hofmann:2018:SCF", pages = "89--91", month = aug, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-62371-9_7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2017:CWO, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Concept --- Where Are the Opportunities of Blockchain-Driven Supply Chain Finance?", crossref = "Hofmann:2018:SCF", pages = "51--75", month = aug, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-62371-9_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2017:DHD, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Discussion --- How Does the Full Potential of Blockchain Technology in Supply Chain Finance Look Like?", crossref = "Hofmann:2018:SCF", pages = "77--87", month = aug, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-62371-9_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2017:IWP, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Introduction --- Why to Pay Attention on Blockchain-Driven Supply Chain Finance?", crossref = "Hofmann:2018:SCF", pages = "1--6", month = aug, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-62371-9_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Hong:2017:BEF, author = "Zhen Hong and Zehua Wang and Wei Cai and Victor C. M. Leung", title = "Blockchain-Empowered Fair Computational Resource Sharing System in the {D2D} Network", journal = j-FUTURE-INTERNET, volume = "9", number = "4", pages = "85", day = "17", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.3390/fi9040085", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:50:58 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/9/4/85", abstract = "Device-to-device (D2D) communication is becoming an increasingly important technology in future networks with the climbing demand for local services. For instance, resource sharing in the D2D network features ubiquitous availability, flexibility, low latency and low cost. However, these features also bring along challenges when building a satisfactory resource sharing system in the D2D network. Specifically, user mobility is one of the top concerns for designing a cooperative D2D computational resource sharing system since mutual communication may not be stably available due to user mobility. A previous endeavour has demonstrated and proven how connectivity can be incorporated into cooperative task scheduling among users in the D2D network to effectively lower average task execution time. There are doubts about whether this type of task scheduling scheme, though effective, presents fairness among users. In other words, it can be unfair for users who contribute many computational resources while receiving little when in need. In this paper, we propose a novel blockchain-based credit system that can be incorporated into the connectivity-aware task scheduling scheme to enforce fairness among users in the D2D network. Users' computational task cooperation will be recorded on the public blockchain ledger in the system as transactions, and each user's credit balance can be easily accessible from the ledger. A supernode at the base station is responsible for scheduling cooperative computational tasks based on user mobility and user credit balance. We investigated the performance of the credit system, and simulation results showed that with a minor sacrifice of average task execution time, the level of fairness can obtain a major enhancement.", acknowledgement = ack-nhfb, remark = "Special Issue Recent Advances in Cellular D2D Communications.", } @InCollection{Hopf:2017:RBT, author = "Stefan Hopf and Arnold Picot", booktitle = "Interdisziplin{\"a}re Perspektiven zur Zukunft der Wertsch{\"o}pfung", title = "{Revolutioniert Blockchain-Technologie das Management von Eigentumsrechten und Transaktionskosten?}. ({German}) [{Is} blockchain technology revolutionizing ownership and transaction management?]", publisher = "Springer Fachmedien Wiesbaden", pages = "109--119", month = dec, year = "2017", DOI = "https://doi.org/10.1007/978-3-658-20265-1_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, language = "German", } @Article{Howard:2017:RPF, author = "Heidi Howard and Dahlia Malkhi and Sasha Spiegelman", title = "Revisiting the {Paxos Foundations}: a Look at Summer Internship Work at {VMware Research}", journal = j-OPER-SYS-REV, volume = "51", number = "1", pages = "67--71", month = aug, year = "2017", CODEN = "OSRED8", DOI = "https://doi.org/10.1145/3139645.3139656", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Fri Sep 15 10:37:05 MDT 2017", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/opersysrev.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J597", } @InCollection{Hsiao:2017:DVS, author = "Jen-Ho Hsiao and Raylin Tso and Chien-Ming Chen and Mu-En Wu", booktitle = "Advances in Computer Science and Ubiquitous Computing", title = "Decentralized E-Voting Systems Based on the Blockchain Technology", publisher = "Springer Singapore", pages = "305--309", month = dec, year = "2017", DOI = "https://doi.org/10.1007/978-981-10-7605-3_50", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Huang:2017:BPC, author = "Butian Huang and Zhenguang Liu and Jianhai Chen and Anan Liu and Qi Liu and Qinming He", title = "Behavior pattern clustering in blockchain networks", journal = j-MULTIMEDIA-TOOLS-APPLIC, volume = "76", number = "19", pages = "20099--20110", month = jan, year = "2017", CODEN = "MTAPFB", DOI = "https://doi.org/10.1007/s11042-017-4396-4", ISSN = "1380-7501 (print), 1573-7721 (electronic)", ISSN-L = "1380-7501", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11042-017-4396-4", acknowledgement = ack-nhfb, fjournal = "Multimedia Tools and Applications", journal-URL = "https://link.springer.com/journal/11042", } @InCollection{Huang:2017:FTP, author = "Hui Huang and Kuan-Ching Li and Xiaofeng Chen", booktitle = "{Cyberspace Safety and Security}", title = "A Fair Three-Party Contract Singing Protocol Based on Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "72--85", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69471-9_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69471-9_6", acknowledgement = ack-nhfb, } @InProceedings{Hull:2017:BDE, author = "Richard Hull", booktitle = "{Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems}", title = "Blockchain: Distributed Event-based Processing in a Data-Centric World: Extended Abstract", publisher = pub-ACM, address = pub-ACM:adr, pages = "2--4", year = "2017", DOI = "https://doi.org/10.1145/3093742.3097982", ISBN = "1-4503-5065-8", ISBN-13 = "978-1-4503-5065-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "DEBS '17", URL = "http://doi.acm.org/10.1145/3093742.3097982", acknowledgement = ack-nhfb, acmid = "3097982", keywords = "Blockchain; Business Collaboration; Business Process Management; Smart Contract", location = "Barcelona, Spain", pagecount = "3", } @PhdThesis{Hutchison:2017:AEM, author = "Michael Hutchison", title = "Acceptance of Electronic Monetary Exchanges, Specifically {Bitcoin}, by Information Security Professionals: a Quantitative Study Using the {Unified Theory of Acceptance and Use of Technology (UTAUT)} Model", type = "{D.C.S.}", school = "Colorado Technical University", address = "Colorado Springs, CO, USA", pages = "106", year = "2017", ISBN = "0-355-09875-X", ISBN-13 = "978-0-355-09875-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1937568128", abstract = "In 2008, the world's first completely decentralized digital currency, Bitcoin was introduced by an unidentified programmer known as Satoshi Nakamoto. Although the Bitcoin market is fairly new in the industry, overall market capitalization has already reached 14,886,975 Bitcoins worth approximately 5.027 Billion US\$ as of December 2015. The burgeoning usage of a novel currency subsequently motivates research on this phenomenon, especially centering on what affects Information Technology professionals to use the currency. The thesis addresses this particular issue by employing the Unified Theory of Acceptance and Use of Technology (UTAUT) model to develop hypotheses on individuals' usage acceptance, and then test these by carrying out a survey. The empirical study took place over a 1 day period and collected 100 responses from Information Technology Security Professionals via a survey collected during the monthly meeting of the North Texas chapter of the Information Systems Security Association (ISSA). The results indicate that the factors significantly influencing the acceptance intention to use electronic monetary exchanges, mainly Bitcoin, include performance expectancy and effort expectancy. Furthermore, actual usage of Bitcoin is affected by facilitating conditions and behavioral intention. Interestingly, the obtained results do not support, in all cases, the original UTAUT model and the hypotheses that were derived from this model, thus suggesting modification of the model for the case of Bitcoin. Moreover, this outcome encourages future research to divulge the characteristics of Bitcoin that appear in other, similar technologies, for which the modified UTAUT model would have high explanatory power. The results of this research can be helpful to the various business sectors that are planning to use Bitcoin by listing the major factors influencing the success of implementation and suggesting improvements for better Bitcoin acceptance and adoption in the future.", acknowledgement = ack-nhfb, advisor = "Richard Livingood", keywords = "0489:Information Technology; 0501:Economics; 0984:Computer science; Acceptance; Applied sciences; Bitcoin; Blockchain; Computer science; Economics; Electronic; Exchanges; Information; Information Technology; Monetary; Professionals; Security; Social sciences; Technology; Utaut", ris-m1 = "10603526", } @Article{Hyvarinen:2017:BBA, author = "Hissu Hyv{\"a}rinen and Marten Risius and Gustav Friis", title = "A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services", journal = "Business \& Information Systems Engineering", volume = "59", number = "6", pages = "441--456", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12599-017-0502-4", ISSN = "1867-0202 (print), 2363-7005 (electronic)", ISSN-L = "1867-0202", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12599-017-0502-4", acknowledgement = ack-nhfb, fjournal = "Business \& Information Systems Engineering", journal-URL = "https://link.springer.com/journal/12599", } @InProceedings{Ibba:2017:CBO, author = "Simona Ibba and Andrea Pinna and Matteo Seu and Filippo Eros Pani", booktitle = "{Proceedings of the XP2017 Scientific Workshops}", title = "{CitySense}: Blockchain-oriented Smart Cities", publisher = pub-ACM, address = pub-ACM:adr, pages = "12:1--12:5", year = "2017", DOI = "https://doi.org/10.1145/3120459.3120472", ISBN = "1-4503-5264-2", ISBN-13 = "978-1-4503-5264-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "XP '17", URL = "http://doi.acm.org/10.1145/3120459.3120472", acknowledgement = ack-nhfb, acmid = "3120472", articleno = "12", keywords = "blockchain; internet of things; SCRUM; sensing; smart cities", location = "Cologne, Germany", pagecount = "5", } @Article{Ibrahim:2017:SRS, author = "Maged Hamada Ibrahim", title = "{SecureCoin}: a Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem", journal = "Int. J. Netw. Secur.", volume = "19", number = "2", pages = "295--312", month = "????", year = "2017", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p295-312.pdf; https://dblp.org/db/journals/ijnsec/ijnsec19.html#Ibrahim17", acknowledgement = ack-nhfb, dblp-key = "journals/ijnsec/Ibrahim17", dblp-mdate = "2021-01-04", } @InProceedings{Idalino:2017:PVA, author = "Tha{\'\i}s Bardini Idalino and Dayana Spagnuelo and Jean Everson Martina", title = "Private Verification of Access on Medical Data: An Initial Study", crossref = "Garcia-Alfaro:2017:DPM", pages = "86--103", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_6", acknowledgement = ack-nhfb, } @Article{Ikeda:2017:Q, author = "Kazuki Ikeda", title = "{qBitcoin}", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1708.04955; https://dblp.org/db/journals/corr/corr1708.html#abs-1708-04955", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1708-04955", dblp-mdate = "2018-08-13", } @InProceedings{Isler:2017:TSP, author = "Devri{\c{s}} {\.I}{\c{s}}ler and Alptekin K{\"u}p{\c{c}}{\"u}", title = "Threshold Single Password Authentication", crossref = "Garcia-Alfaro:2017:DPM", pages = "143--162", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_9", acknowledgement = ack-nhfb, } @InCollection{Jaag:2017:BTC, author = "Christian Jaag and Christian Bach", booktitle = "{The Changing Postal and Delivery Sector}", title = "Blockchain Technology and Cryptocurrencies: Opportunities for Postal Financial Services", publisher = pub-SV, address = pub-SV:adr, pages = "205--221", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-46046-8_13", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-46046-8_13", acknowledgement = ack-nhfb, } @InProceedings{Jabbar:2017:GBI, author = "Karim Jabbar and Pernille Bj{\o}rn", booktitle = "{Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems}", title = "Growing the Blockchain Information Infrastructure", publisher = pub-ACM, address = pub-ACM:adr, pages = "6487--6498", year = "2017", DOI = "https://doi.org/10.1145/3025453.3025959", ISBN = "1-4503-4655-3", ISBN-13 = "978-1-4503-4655-9", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CHI '17", URL = "http://doi.acm.org/10.1145/3025453.3025959", acknowledgement = ack-nhfb, acmid = "3025959", keywords = "Bitcoin, blockchain, entrepreneurship, information infrastructures, open-source, sociomateriality", location = "Denver, Colorado, USA", pagecount = "12", } @InProceedings{Jaffe:2017:MUC, author = "Caroline Jaffe and Cristina Mata and Sepandar Kamvar", booktitle = "{Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers}", title = "Motivating Urban Cycling Through a Blockchain-based Financial Incentives System", publisher = pub-ACM, address = pub-ACM:adr, pages = "81--84", year = "2017", DOI = "https://doi.org/10.1145/3123024.3123141", ISBN = "1-4503-5190-5", ISBN-13 = "978-1-4503-5190-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "UbiComp '17", URL = "http://doi.acm.org/10.1145/3123024.3123141", acknowledgement = ack-nhfb, acmid = "3123141", keywords = "activity tracking; behavioral psychology; bicycles; blockchain; financial incentives; location tracking", location = "Maui, Hawaii", pagecount = "4", } @Article{Jang:2017:ESM, author = "H. Jang and J. Lee", title = "An Empirical Study on Modeling and Prediction of {Bitcoin} Prices with {Bayesian} Neural Networks Based on Blockchain Information", journal = j-IEEE-ACCESS, volume = "??", number = "??", pages = "??--??", year = "2017", DOI = "https://doi.org/10.1109/ACCESS.2017.2779181", ISSN = "2169-3536", ISSN-L = "2169-3536", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Access", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639", keywords = "Bayes methods; Bayesian neural network; Biological system modeling; Bitcoin; Blockchain; Neural networks; Predictive model; Predictive models; Time series analysis; Time-series analysis", } @InProceedings{Jin:2017:BBB, author = "T. Jin and X. Zhang and Y. Liu and K. Lei", booktitle = "2017 Ninth International Conference on Ubiquitous and Future Networks {(ICUFN)}", title = "{BlockNDN}: A {Bitcoin} blockchain decentralized system over named data networking", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "75--80", month = jul, year = "2017", DOI = "https://doi.org/10.1109/ICUFN.2017.7993751", ISSN = "2165-8528 (print), 2165-8536 (electronic)", ISSN-L = "2165-8536", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7993751/", acknowledgement = ack-nhfb, keywords = "Bitcoin; bitcoin; bitcoin blockchain decentralized system; blockchain; BlockNDN; broadcast overhead; cryptography; Data structures; electronic money; IP network; IP networks; named data networking; NDN; next generation networks; peer-to-peer; Peer-to-peer computing; Routing protocols; Synchronization; system architecture; Systems architecture; untrusted networks", } @InProceedings{Joy:2017:PTA, author = "Joshua Joy and Greg Cusack and Mario Gerla", booktitle = "{Proceedings of the 3rd Workshop on Experiences with the Design and Implementation of Smart Objects}", title = "Poster: Time Analysis of the Feasibility of Vehicular Blocktrees", publisher = pub-ACM, address = pub-ACM:adr, pages = "25--26", year = "2017", DOI = "https://doi.org/10.1145/3127502.3127516", ISBN = "1-4503-5141-7", ISBN-13 = "978-1-4503-5141-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SMARTOBJECTS '17", URL = "http://doi.acm.org/10.1145/3127502.3127516", acknowledgement = ack-nhfb, acmid = "3127516", keywords = "blockchain; mobile cloud; vanet privacy; vanet security", location = "Snowbird, Utah, USA", pagecount = "2", } @Article{Judmayer:2017:BCI, author = "Aljosha Judmayer and Nicholas Stifter and Katharina Krombholz and Edgar Weippl and Elisa Bertino and Ravi Sandhu", title = "Blocks and Chains: Introduction to {Bitcoin}, Cryptocurrencies, and Their Consensus Mechanisms", journal = "Synthesis Lectures on Information Security, Privacy, and Trust", volume = "9", number = "1", pages = "1--123", month = jun, year = "2017", DOI = "https://doi.org/10.2200/S00773ED1V01Y201704SPT020", ISBN = "1-62705-713-7", ISBN-13 = "978-1-62705-713-4", ISSN = "1945-9742 (print), 1945-9750 (electronic)", ISSN-L = "1945-9742", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7987472", acknowledgement = ack-nhfb, keywords = "Bitcoin; block; blockchain; chain; consensus ledger; cryptographic currency; Nakamoto consensus; Proof-of-Work", } @InProceedings{Judmayer:2017:MMC, author = "Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar Weippl", title = "Merged Mining: Curse or Cure?", crossref = "Garcia-Alfaro:2017:DPM", pages = "316--333", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_18", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_18", acknowledgement = ack-nhfb, } @InProceedings{Kaaniche:2017:MPP, author = "Nesrine Kaaniche and Maryline Laurent and Pierre-Olivier Rocher and Christophe Kiennert and Joaquin Garcia-Alfaro", title = "$ \mathcal {PCS} $, A Privacy-Preserving Certification Scheme", crossref = "Garcia-Alfaro:2017:DPM", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_14", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_14", acknowledgement = ack-nhfb, } @InCollection{Kaaniche:2017:PPP, author = "Nesrine Kaaniche and Maryline Laurent and Pierre-Olivier Rocher and Christophe Kiennert and Joaquin Garcia-Alfaro", editor = "Joaquin Garcia-Alfaro and Guillermo Navarro-Arribas and Hannes Hartenstein and Jordi Herrera-Joancomart{\'i}", booktitle = "{European Symposium on Research in Computer Security International Workshop on Data Privacy Management Cryptocurrencies and Blockchain Technology: ESORICS 2017, DPM 2017, CBT 2017: Data Privacy Management, Cryptocurrencies and Blockchain Technology}", title = "{PCS}, A Privacy-Preserving Certification Scheme", publisher = pub-SV, address = pub-SV:adr, pages = "239--256", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_14", ISBN = "3-319-67816-7", ISBN-13 = "978-3-319-67816-0", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-319-67816-0", book-URL = "http://www.springerlink.com/content/978-3-319-67816-0", } @InCollection{Kabashkin:2017:RMB, author = "Igor Kabashkin", booktitle = "{Network and System Security}", title = "Risk Modelling of Blockchain Ecosystem", publisher = pub-SV, address = pub-SV:adr, pages = "59--70", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-64701-2_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-64701-2_5", acknowledgement = ack-nhfb, } @InCollection{Kaga:2017:SPS, author = "Yosuke Kaga and Masakazu Fujio and Ken Naganuma and Kenta Takahashi and Takao Murakami and Tetsushi Ohki and Masakatsu Nishigaki", booktitle = "{Information Security Practice and Experience}", title = "A Secure and Practical Signature Scheme for Blockchain Based on Biometrics", publisher = pub-SV, address = pub-SV:adr, pages = "877--891", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-72359-4_55", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-72359-4_55", acknowledgement = ack-nhfb, } @InCollection{Kammuller:2017:PCA, author = "Florian Kamm{\"u}ller", booktitle = "Data Privacy Management, Cryptocurrencies and Blockchain Technology", title = "A Proof Calculus for Attack Trees in {Isabelle}", publisher = pub-SV, address = pub-SV:adr, pages = "3--18", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_1", acknowledgement = ack-nhfb, } @InProceedings{Karvelas:2017:UOR, author = "Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser", title = "Using Oblivious {RAM} in Genomic Studies", crossref = "Garcia-Alfaro:2017:DPM", pages = "35--52", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_3", acknowledgement = ack-nhfb, } @InProceedings{Kasem-Madani:2017:TTU, author = "Saffija Kasem-Madani and Michael Meier and Martin Wehner", title = "Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization", crossref = "Garcia-Alfaro:2017:DPM", pages = "163--179", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_10", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_10", acknowledgement = ack-nhfb, } @Article{Katsiampa:2017:VEB, author = "Paraskevi Katsiampa", title = "Volatility estimation for {Bitcoin}: a comparison of {GARCH} models", journal = j-ECONOM-LETT, volume = "158", pages = "3--6", year = "2017", CODEN = "ECLEDS", DOI = "https://doi.org/10.1016/j.econlet.2017.06.023", ISSN = "0165-1765 (print), 1873-7374 (electronic)", ISSN-L = "0165-1765", MRclass = "91G70", MRnumber = "3681256", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Economics Letters", journal-URL = "https://www.sciencedirect.com/science/journal/01651765", } @InProceedings{Kaushal:2017:EBS, author = "P. K. Kaushal and A. Bagga and R. Sobti", booktitle = "2017 International Conference on Computer, Communications and Electronics (Comptelix)", title = "Evolution of {Bitcoin} and security risk in {Bitcoin} wallets", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "172--177", month = jul, year = "2017", DOI = "https://doi.org/10.1109/COMPTELIX.2017.8003959", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8003959/", acknowledgement = ack-nhfb, keywords = "Bitcoin; bitcoin evolution; bitcoin management; bitcoin system; bitcoin wallet; bitcoin wallets; block-chain rewriting; distributed consensus in bitcoin; electronic money; Peer-to-peer computing; Protocols; security risk; Software; threats on bitcoin network; trust factor; trusted computing", } @InCollection{Kawase:2017:TCT, author = "Yoshiaki Kawase and Shoji Kasahara", booktitle = "{Queueing Theory and Network Applications}", title = "Transaction-Confirmation Time for {Bitcoin}: A Queueing Analytical Approach to Blockchain Mechanism", publisher = pub-SV, address = pub-SV:adr, pages = "75--88", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-68520-5_5", ISBN = "3-319-68520-1", ISBN-13 = "978-3-319-68520-5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-68520-5_5", acknowledgement = ack-nhfb, } @Misc{Kayser:2017:BJW, author = "Zach Kayser", title = "{Bitcoin}: just what the heck is it?", howpublished = "Brainerd Dispatch Web site.", day = "3", month = dec, year = "2017", bibdate = "Mon Dec 04 08:24:58 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.brainerddispatch.com/business/technology/4368345-bitcoin-just-what-heck-it", acknowledgement = ack-nhfb, lastaccessed = "04 December 2017", } @InProceedings{Kazerani:2017:DUB, author = "Ali Kazerani and Domenic Rosati and Brian Lesser", booktitle = "Proceedings of the 35th {ACM} International Conference on the Design of Communication", title = "Determining the Usability of {Bitcoin} for Beginners Using Change Tip and {Coinbase}", publisher = pub-ACM, address = pub-ACM:adr, pages = "5:1--5:5", year = "2017", DOI = "https://doi.org/10.1145/3121113.3121125", ISBN = "1-4503-5160-3", ISBN-13 = "978-1-4503-5160-7", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SIGDOC '17", acknowledgement = ack-nhfb, acmid = "3121125", articleno = "5", keywords = "Bitcoin, cryptocurrency, digital wallets, usability, user experience", location = "Halifax, Nova Scotia, Canada", pagecount = "5", } @Article{Kethineni:2017:UBD, author = "Sesha Kethineni and Ying Cao and Cassandra Dodge", title = "Use of {Bitcoin} in {Darknet} Markets: Examining Facilitative Factors on {Bitcoin}-Related Crimes", journal = "American Journal of Criminal Justice", volume = "??", number = "??", pages = "265--275", month = "????", year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12103-017-9394-6", ISSN = "1066-2316 (print), 1936-1351 (electronic)", ISSN-L = "1066-2316", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12103-017-9394-6", acknowledgement = ack-nhfb, keywords = "Bitcoin; Cybercrime Deterrence; Silk Road; Space transition theory", } @InProceedings{Khalil:2017:RRB, author = "Rami Khalil and Arthur Gervais", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "{Revive}: Rebalancing Off-Blockchain Payment Networks", publisher = pub-ACM, address = pub-ACM:adr, pages = "439--453", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134033", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3134033", acknowledgement = ack-nhfb, acmid = "3134033", keywords = "blockchain, Ethereum, ledger, off-chain, payment channels, smart contracts", location = "Dallas, Texas, USA", pagecount = "15", } @Article{Khazraee:2017:MNO, author = "Moein Khazraee and Lu Zhang and Luis Vega and Michael Bedford Taylor", title = "{Moonwalk}: {NRE} Optimization in {ASIC} Clouds", journal = j-COMP-ARCH-NEWS, volume = "45", number = "1", pages = "511--526", month = apr, year = "2017", CODEN = "CANED2", DOI = "https://doi.org/10.1145/3093337.3037749", ISSN = "0163-5964 (print), 1943-5851 (electronic)", ISSN-L = "0163-5964", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, acmid = "3037749", ajournal = "SIGARCH Comput. Archit. News", fjournal = "ACM SIGARCH Computer Architecture News", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J89", keywords = "accelerator, asic cloud, datacenter, nre, tco", pagecount = "16", } @Article{Ki:2017:BAI, author = "Ki and Hoon Hong", title = "{Bitcoin} as an alternative investment vehicle", journal = "Information Technology and Management", volume = "18", number = "4", pages = "265--275", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s10799-016-0264-6", ISSN = "1385-951X (print), 1573-7667 (electronic)", ISSN-L = "1385-951X", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10799-016-0264-6", acknowledgement = ack-nhfb, } @InProceedings{Kiayias:2017:OPS, author = "Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov", booktitle = "{Advances in cryptology --- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part I}", title = "{Ouroboros}: a provably secure proof-of-stake blockchain protocol", publisher = pub-SV, address = pub-SV:adr, pages = "357--388", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63688-7_12", ISBN = "3-319-63687-1 (paperback), 3-319-63688-X (e-book)", ISBN-13 = "978-3-319-63687-0 (paperback), 978-3-319-63688-7 (e-book)", MRclass = "94A60", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-63688-7_12", acknowledgement = ack-nhfb, } @InProceedings{Kiffer:2017:SFI, author = "Lucianna Kiffer and Dave Levin and Alan Mislove", booktitle = "{Proceedings of the 16th ACM Workshop on Hot Topics in Networks}", title = "Stick a Fork in It: Analyzing the {Ethereum} Network Partition", publisher = pub-ACM, address = pub-ACM:adr, pages = "94--100", year = "2017", DOI = "https://doi.org/10.1145/3152434.3152449", ISBN = "1-4503-5569-2", ISBN-13 = "978-1-4503-5569-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "HotNets-XVI", URL = "http://doi.acm.org/10.1145/3152434.3152449", acknowledgement = ack-nhfb, acmid = "3152449", location = "Palo Alto, CA, USA", pagecount = "7", } @InCollection{Kim:2017:BBS, author = "Yoohwan Kim and Juyeon Jo", booktitle = "Applied Computing \& Information Technology", title = "Binary Blockchain: Solving the Mining Congestion Problem by Dynamically Adjusting the Mining Capacity", publisher = pub-SV, address = pub-SV:adr, pages = "29--49", month = jul, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-64051-8_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Kinai:2017:ABL, author = "Andrew Kinai and Isaac Markus and Erick Oduor and Abdigani Diriye", booktitle = "{Proceedings of the Ninth International Conference on Information and Communication Technologies and Development}", title = "Asset-Based Lending via a Secure Distributed Platform", publisher = pub-ACM, address = pub-ACM:adr, pages = "29:1--29:4", year = "2017", DOI = "https://doi.org/10.1145/3136560.3136594", ISBN = "1-4503-5277-4", ISBN-13 = "978-1-4503-5277-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICTD '17", URL = "http://doi.acm.org/10.1145/3136560.3136594", acknowledgement = ack-nhfb, acmid = "3136594", articleno = "29", keywords = "blockchain; mobile applications; SME lending", location = "Lahore, Pakistan", pagecount = "4", } @InCollection{Klems:2017:TIB, author = "Markus Klems and Jacob Eberhardt and Stefan Tai and Steffen H{\"a}rtlein and Simon Buchholz and Ahmed Tidjani", booktitle = "{Service-Oriented Computing}", title = "Trustless Intermediation in Blockchain-Based Decentralized Service Marketplaces", publisher = pub-SV, address = pub-SV:adr, pages = "731--739", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69035-3_53", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69035-3_53", acknowledgement = ack-nhfb, } @Article{Knirsch:2017:PPB, author = "Fabian Knirsch and Andreas Unterweger and Dominik Engel", title = "Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions", journal = "Computer Science --- Research and Development", volume = "??", number = "??", pages = "1--9", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s00450-017-0348-5", ISSN = "1865-2034 (print), 1865-2042 (electronic)", ISSN-L = "1865-2034", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s00450-017-0348-5", acknowledgement = ack-nhfb, fjournal = "Computer Science --- Research and Development", journal-URL = "https://link.springer.com/journal/450", } @InCollection{Knirsch:2017:PPS, author = "Fabian Knirsch and Andreas Unterweger and G{\"u}nther Eibl and Dominik Engel", booktitle = "Sustainable Cloud and Energy Services", title = "Privacy-Preserving Smart Grid Tariff Decisions with Blockchain-Based Smart Contracts", publisher = pub-SV, address = pub-SV:adr, pages = "85--116", month = sep, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-62238-5_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @MastersThesis{Koehler:2017:UBT, author = "Thomas Koehler", title = "Use of Blockchain Technology in Countering Cyberattacks", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "41", year = "2017", ISBN = "0-355-22590-5", ISBN-13 = "978-0-355-22590-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1957372076", abstract = "The purpose of this capstone project was to research how the distributed ledger technology known as blockchain can be used to prevent cyberattacks and data tampering. Many cyberattacks take advantage of single points of failure and centralization. The research in this capstone identifies these weaknesses in centralized platforms, such as the Internet Domain Name System, and expands on how a more decentralized approach using blockchain technology can reduce risk and provide validation. Although blockchain is still a relatively new technology, the literature review process revealed rapid growth and a multitude of potential uses where the technology can provide a platform for ensuring security, trust, provenance, and consensus. The research found that blockchain can provide a significant advancement in securing technologies such as the Internet of Things, smart contracts, and digital rights management. With the initial push into blockchain technology coming from cryptocurrencies such as bitcoin, industries beyond financial were examined for benefits in adopting the technology. Industries such as entertainment, law, real estate, and even government agencies are examined. Keywords: blockchain, cybersecurity, Internet of Things, IoT, Robert DeCarlo.", acknowledgement = ack-nhfb, advisor = "Robert DeCarlo", keywords = "0489:Information Technology; 0627:Criminology; Applied sciences; Blockchain; Criminology; Cybersecurity; Information Technology; Social sciences", ris-m1 = "10623159", } @InCollection{Korschinowski:2017:BTW, author = "Sven Korschinowski and Maximilian Forster and Luca Reulecke", booktitle = "Praxishandbuch Digital Banking", title = "{Blockchain --- wie Banken die Technologie aus Prozess- und Produkt-Sicht nutzen k{\"o}nnen}. ({German}) [{Blockchain} --- how banks can use the technology from a process and product perspective]", publisher = "Springer Fachmedien Wiesbaden", pages = "277--290", month = dec, year = "2017", DOI = "https://doi.org/10.1007/978-3-658-18890-0_13", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, language = "German", } @InProceedings{Kovalchuk:2017:ASA, author = "Lyudmila Kovalchuk and Dmytro Kaidalov and Oleksiy Shevtsov and Andrii Nastenko and Mariia Rodinko and Roman Oliynykov", booktitle = "2017 9th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications {(IDAACS)}", title = "Analysis of splitting attacks on {Bitcoin} and {GHOST} consensus protocols", volume = "2", number = "", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "978--982", month = sep, year = "2017", DOI = "https://doi.org/10.1109/IDAACS.2017.8095233", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8095233/", acknowledgement = ack-nhfb, keywords = "Bitcoin; blockchain; Conferences; consensus protocol; Estimation; GHOST; Peer-to-peer computing; Protocols; Scalability", } @Article{Kow:2017:ICP, author = "Yong Ming Kow and Caitlin Lustig", title = "Imaginaries and Crystallization Processes in {Bitcoin} Infrastructuring", journal = j-COMPUT-SUPPORTED-COOP-WORK, volume = "??", number = "??", pages = "555--580", month = "????", year = "2017", CODEN = "CSCWEQ", DOI = "https://doi.org/10.1007/s10606-017-9300-2", ISSN = "0925-9724 (print), 1573-7551 (electronic)", ISSN-L = "0925-9724", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10606-017-9300-2", acknowledgement = ack-nhfb, fjournal = "Computer Supported Cooperative Work [CSCW]", } @InProceedings{Krombholz:2017:OSC, author = "Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar Weippl", title = "The Other Side of the Coin: User Experiences with {Bitcoin} Security and Privacy", crossref = "Grossklags:2017:FCD", pages = "555--580", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54970-4_33", ISBN = "3-662-54970-0", ISBN-13 = "978-3-662-54970-4", MRclass = "94A60", MRnumber = "3658658", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-54970-4_33", acknowledgement = ack-nhfb, } @Article{Kshetri:2017:CBSa, author = "Nir Kshetri", title = "Can Blockchain Strengthen the {Internet of Things}?", journal = j-IT-PRO, volume = "19", number = "4", pages = "68--72", year = "2017", CODEN = "IPMAFM", DOI = "https://doi.org/10.1109/mitp.2017.3051335", ISSN = "1520-9202 (print), 1941-045X (electronic)", ISSN-L = "1520-9202", bibdate = "Sat Dec 16 10:13:42 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{IT} Professional", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6294", remark = "Reprinted in \cite{Kshetri:2017:CBSb}.", } @Article{Kshetri:2017:CBSb, author = "Nir Kshetri", title = "Can Blockchain Strengthen the {Internet of Things}?", journal = j-COMPUT-EDGE, volume = "3", number = "12", pages = "42--46", month = dec, year = "2017", ISSN = "2376-113X", bibdate = "Sat Dec 16 10:13:42 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Computing Edge", journal-URL = "http://www.computer.org/web/computingedge", remark = "Reprint of \cite{Kshetri:2017:CBSa}.", } @InProceedings{Kumar:2017:TAM, author = "Amrit Kumar and Cl{\'e}ment Fischer and Shruti Tople and Prateek Saxena", booktitle = "Computer Security --- {ESORICS} 2017", title = "A Traceability Analysis of {Monero}'s Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "153--173", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-66399-9_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-66399-9_9", acknowledgement = ack-nhfb, } @InProceedings{Kuzuno:2017:BEA, author = "Hiroki Kuzuno and Christian Karam", booktitle = "2017 {APWG} Symposium on Electronic Crime Research {(eCrime)}", title = "Blockchain explorer: An analytical process and investigation environment for {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "9--16", month = apr, year = "2017", DOI = "https://doi.org/10.1109/ECRIME.2017.7945049", ISSN = "2159-1237 (print), 2159-1245 (electronic)", ISSN-L = "2159-1237", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7945049/", acknowledgement = ack-nhfb, keywords = "bitcoin analytical process; bitcoin protocol network; blockchain; blockchain explorer; computer crime; computer network security; crime instances; cryptocurrency; cryptographic protocols; darknet marketplaces; DDoS extortion; distributed ledger; financial data processing; graphical transaction relation; History; illegal trades; illicit trades; innovative decentralized architecture; invasive software; law administration; Law enforcement; law enforcement investigation; law enforcement local environment; malware modus operandi; marketcap; Online banking; pseudo anonymity; Public key; ransomware; Real-time systems; Training; USD", } @InCollection{Kwon:2017:DBM, author = "Yujin Kwon and Dohyun Kim and Yunmok Son and Jaeyeong Choi and Yongdae Kim", booktitle = "Information Security Applications", title = "Doppelganger in {Bitcoin} Mining Pools: An Analysis of the Duplication Share Attack", publisher = pub-SV, address = pub-SV:adr, pages = "124--135", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-56549-1_11", ISBN = "3-319-56549-4", ISBN-13 = "978-3-319-56549-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-56549-1_11", acknowledgement = ack-nhfb, } @Article{Kwon:2017:SADa, author = "Yujin Kwon and Dohyun Kim and Yunmok Son and Eugene Y. Vasserman and Yongdae Kim", title = "Be Selfish and Avoid Dilemmas: Fork After Withholding ({FAW}) Attacks on Bitcoin", journal = "CoRR", volume = "abs/1708.09790", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1708.09790; https://dblp.org/db/journals/corr/corr1708.html#abs-1708-09790", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1708-09790", dblp-mdate = "2018-08-13", } @InProceedings{Kwon:2017:SADb, author = "Yujin Kwon and Dohyun Kim and Yunmok Son and Eugene Vasserman and Yongdae Kim", booktitle = "Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security", title = "Be Selfish and Avoid Dilemmas: Fork After Withholding ({FAW}) Attacks on {Bitcoin}", publisher = pub-ACM, address = pub-ACM:adr, pages = "195--209", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134019", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", acknowledgement = ack-nhfb, acmid = "3134019", keywords = "Bitcoin, block withholding attack, mining, selfish mining", location = "Dallas, Texas, USA", pagecount = "15", } @InProceedings{Lajoie-Mazenc:2017:HBC, author = "Thibaut Lajoie-Mazenc and Romaric Ludinard and Emmanuelle Anceaume", booktitle = "{Proceedings of the Symposium on Applied Computing}", title = "Handling {Bitcoin} Conflicts Through a Glimpse of Structure", publisher = pub-ACM, address = pub-ACM:adr, pages = "444--449", year = "2017", DOI = "https://doi.org/10.1145/3019612.3019657", ISBN = "1-4503-4486-0", ISBN-13 = "978-1-4503-4486-9", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SAC '17", URL = "http://doi.acm.org/10.1145/3019612.3019657", acknowledgement = ack-nhfb, acmid = "3019657", keywords = "Bitcoin, blockchain fork, double-spending attack, safety", location = "Marrakech, Morocco", pagecount = "6", } @InCollection{Laskowski:2017:BEP, author = "Marek Laskowski", booktitle = "{Social, Cultural, and Behavioral Modeling}", title = "A Blockchain-Enabled Participatory Decision Support Framework", publisher = pub-SV, address = pub-SV:adr, pages = "329--334", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-60240-0_40", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-60240-0_40", acknowledgement = ack-nhfb, } @InProceedings{Laszka:2017:PPS, author = "Aron Laszka and Abhishek Dubey and Michael Walker and Doug Schmidt", booktitle = "{Proceedings of the Seventh International Conference on the Internet of Things}", title = "Providing Privacy, Safety, and Security in {IoT}-based Transactive Energy Systems Using Distributed Ledgers", publisher = pub-ACM, address = pub-ACM:adr, pages = "13:1--13:8", year = "2017", DOI = "https://doi.org/10.1145/3131542.3131562", ISBN = "1-4503-5318-5", ISBN-13 = "978-1-4503-5318-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoT '17", URL = "http://doi.acm.org/10.1145/3131542.3131562", acknowledgement = ack-nhfb, acmid = "3131562", articleno = "13", keywords = "anonymity; blockchain; internet of things; privacy; security; smart grid; transactive energy; transactive microgrid", location = "Linz, Austria", pagecount = "8", } @Book{Laurence:2017:B, author = "Tiana Laurence", title = "Blockchain", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xii + 214", year = "2017", ISBN = "1-119-36559-7 (paperback), 1-119-36561-9 ebook, 1-119-36560-0 ebook", ISBN-13 = "978-1-119-36559-4 (paperback), 978-1-119-36561-7 ebook, 978-1-119-36560-0 ebook", LCCN = "HG1710 .L38 2017", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "For dummies; Learning made easy", abstract = "Find out what Blockchain is, how it works, and what it can do for you Blockchain is the technology behind Bitcoin, the revolutionary 'virtual currency' that's changing the way people do business. While Bitcoin has enjoyed some well-deserved hype, Blockchain may be Bitcoin's most vital legacy. This is the ideal starting place for business pros looking to gain a better understanding of what Blockchain is, how it can improve the integrity of their data, and how it can work to fundamentally change their business and enhance their data security.", acknowledgement = ack-nhfb, subject = "Blockchains (Databases); Electronic funds transfers; Bitcoin; Data encryption (Computer science); Electronic commerce; Bitcoin; Blockchains (Databases); Data encryption (Computer science); Electronic commerce; Electronic funds transfers; Digitalisierung; Netzwerk; Computersicherheit", tableofcontents = "Getting started with blockchain \\ Introducing blockchain \\ Picking a blockchain \\ Getting your hands on blockchain \\ Developing your knowledge \\ Beholding the bitcoin blockchain \\ Encountering the Ethereum blockchain \\ Regarding the ripple blockchain \\ Finding the factom blockchain \\ Digging into digibyte \\ Powerful blockchain platforms \\ Getting your hands on hyperledger \\ Applying Microsoft azure \\ Getting busy on IBM bluemix \\ Industry impacts \\ Financial technology \\ Real estate \\ Insurance \\ Government \\ Other industries \\ The part of tens \\ Ten free blockchain resources \\ The ten rules to never break on the blockchain \\ Ten top blockchain projects", } @Article{Lee:2017:BBS, author = "Boohyung Lee and Jong-Hyouk Lee", title = "Blockchain-based secure firmware update for embedded devices in an {Internet of Things} environment", journal = j-J-SUPERCOMPUTING, volume = "73", number = "3", pages = "1152--1167", month = mar, year = "2017", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-016-1870-0", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "http://link.springer.com/journal/11227/73/3; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", URL = "http://link.springer.com/article/10.1007/s11227-016-1870-0", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @InCollection{Lee:2017:FVE, author = "Boohyung Lee and Sehrish Malik and Sarang Wi and Jong-Hyouk Lee", booktitle = "Quality, Reliability, Security and Robustness in Heterogeneous Networks", title = "Firmware Verification of Embedded Devices Based on a Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "52--61", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-60717-7_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering", URL = "http://link.springer.com/chapter/10.1007/978-3-319-60717-7_6", acknowledgement = ack-nhfb, } @InCollection{Leiding:2017:MRS, author = "Benjamin Leiding and Alex Norta", booktitle = "{Future Data and Security Engineering}", title = "Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity Assurance", publisher = pub-SV, address = pub-SV:adr, pages = "181--196", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70004-5_13", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70004-5_13", acknowledgement = ack-nhfb, } @InProceedings{Lemieux:2017:PAB, author = "Victoria L. Lemieux and Manu Sporny", booktitle = "{Proceedings of the 26th International Conference on World Wide Web Companion}", title = "Preserving the Archival Bond in Distributed Ledgers: A Data Model and Syntax", publisher = "International World Wide Web Conferences Steering Committee", address = "Republic and Canton of Geneva, Switzerland", pages = "1437--1443", year = "2017", DOI = "https://doi.org/10.1145/3041021.3053896", ISBN = "1-4503-4914-5", ISBN-13 = "978-1-4503-4914-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WWW '17 Companion", acknowledgement = ack-nhfb, acmid = "3053896", location = "Perth, Australia", pagecount = "7", } @InProceedings{Leung:2017:UBO, author = "Daniel Leung and Astrid Dickinger", booktitle = "Information and Communication Technologies in Tourism 2017", title = "Use of {Bitcoin} in Online Travel Product Shopping: The {European} Perspective", publisher = pub-SV, address = pub-SV:adr, pages = "741--754", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-51168-9_53", ISBN = "3-319-51168-8", ISBN-13 = "978-3-319-51168-9", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-51168-9_53", acknowledgement = ack-nhfb, } @Article{Levy:2017:BSS, author = "K. E. C. Levy", title = "Book-smart, not street-smart: blockchain-based smart contracts and the social workings of law", journal = "Engaging Science, Technology, and Society", volume = "3", number = "??", pages = "1--15", month = "????", year = "2017", ISSN = "2413-8053", ISSN-L = "2413-8053", bibdate = "Thu Nov 30 17:29:43 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://estsjournal.org/article/view/107", acknowledgement = ack-nhfb, } @Article{Lewis:2017:BFM, author = "Rebecca Lewis and John McPartland and Rajeev Ranjan", title = "Blockchain and financial market innovation", journal = "Economic Perspectives", volume = "7", number = "??", pages = "1--13", month = "????", year = "2017", DOI = "", ISSN = "0164-0682", ISSN-L = "0164-0682", bibdate = "Thu Jan 18 06:27:59 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.chicagofed.org/~/media/publications/economic-perspectives/2017/ep2017-7-pdf.pdf", acknowledgement = ack-nhfb, } @InCollection{Li:2017:DAP, author = "Shuai Li and Meilin Liu and Songjie Wei", booktitle = "{Security, Privacy, and Anonymity in Computation, Communication, and Storage}", title = "A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for {LEO} Network", publisher = pub-SV, address = pub-SV:adr, pages = "446--460", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-72389-1_36", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-72389-1_36", acknowledgement = ack-nhfb, } @InProceedings{Li:2017:DPB, author = "Zhizhou Li and Ten H. Lai", title = "$ \delta $-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining", crossref = "Garcia-Alfaro:2017:DPM", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_8", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_8", acknowledgement = ack-nhfb, } @InCollection{Li:2017:EQL, author = "Yang Li and Kai Zheng and Ying Yan and Qi Liu and Xiaofang Zhou", booktitle = "{Database Systems for Advanced Applications}", title = "{EtherQL}: A Query Layer for Blockchain System", publisher = pub-SV, address = pub-SV:adr, pages = "556--567", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-55699-4_34", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-55699-4_34", acknowledgement = ack-nhfb, } @InCollection{Li:2017:PBP, author = "Zhizhou Li and Ten H. Lai", title = "$ \delta $-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining", crossref = "Garcia-Alfaro:2017:DPM", pages = "124--142", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{Li:2017:SPS, author = "Wenting Li and S{\'e}bastien Andreina and Jens-Matthias Bohli and Ghassan Karame", title = "Securing Proof-of-Stake Blockchain Protocols", crossref = "Garcia-Alfaro:2017:DPM", pages = "297--315", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_17", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_17", acknowledgement = ack-nhfb, } @InProceedings{Li:2017:TSP, author = "Wenting Li and Alessandro Sforzin and Sergey Fedorov and Ghassan O. Karame", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "Towards Scalable and Private Industrial Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "9--14", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055531", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055531", acknowledgement = ack-nhfb, acmid = "3055531", keywords = "hyperledger; privacy; private blockchain; scalability", location = "Abu Dhabi, United Arab Emirates", pagecount = "6", } @InProceedings{Liang:2017:PBB, author = "Xueping Liang and Sachin Shetty and Deepak Tosh and Charles Kamhoua and Kevin Kwiat and Laurent Njilla", booktitle = "{Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing}", title = "{ProvChain}: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "468--477", year = "2017", DOI = "https://doi.org/10.1109/CCGRID.2017.8", ISBN = "1-5090-6610-1", ISBN-13 = "978-1-5090-6610-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCGrid '17", acknowledgement = ack-nhfb, acmid = "3101176", keywords = "Blockchain; Blockchain Cloud; Cloud Computing; Data provenance; Privacy; Reliability", location = "Madrid, Spain", pagecount = "10", } @InProceedings{Liao:2017:EPS, author = "Junfeng Liao and Xu Chen and Shuhua Li", booktitle = "Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences", title = "The Exploration of the Path of Super-sovereign Currency", publisher = pub-ACM, address = pub-ACM:adr, pages = "311--315", year = "2017", DOI = "https://doi.org/10.1145/3034950.3035001", ISBN = "1-4503-4834-3", ISBN-13 = "978-1-4503-4834-8", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICMSS '17", acknowledgement = ack-nhfb, acmid = "3035001", keywords = "Super-sovereign currency, electronic currency, path", location = "Wuhan, China", pagecount = "5", } @InProceedings{Liao:2017:IBF, author = "Kevin Liao and Jonathan Katz", title = "Incentivizing Blockchain Forks via Whale Transactions", crossref = "Jakobsson:2017:FCD", pages = "264--279", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_17", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_17", acknowledgement = ack-nhfb, } @InProceedings{Lin:2017:UBT, author = "Jun Lin and Zhiqi Shen and Chunyan Miao", booktitle = "{Proceedings of the 2Nd International Conference on Crowd Science and Engineering}", title = "Using Blockchain Technology to Build Trust in Sharing {LoRaWAN IoT}", publisher = pub-ACM, address = pub-ACM:adr, pages = "38--43", year = "2017", DOI = "https://doi.org/10.1145/3126973.3126980", ISBN = "1-4503-5375-4", ISBN-13 = "978-1-4503-5375-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICCSE'17", URL = "http://doi.acm.org/10.1145/3126973.3126980", acknowledgement = ack-nhfb, acmid = "3126980", keywords = "Blockchain; Internet of Things; LoRa; LoRaWAN", location = "Beijing, China", pagecount = "6", } @InProceedings{Lindell:2017:FST, author = "Yehuda Lindell", booktitle = "{Advances in cryptology --- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II}", title = "Fast secure two-party {ECDSA} signing", publisher = pub-SV, address = pub-SV:adr, pages = "613--644", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63715-0_21", ISBN = "3-319-63714-2 (paperback), 3-319-63715-0 (e-book)", ISBN-13 = "978-3-319-63714-3/pbk; 978-3-319-63715-0/ebook", MRclass = "94A60", bibdate = "Mon Dec 4 12:12:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Linnhoff-Popien:2017:B, author = "Claudia Linnhoff-Popien", title = "1. {Blockchain}", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "24--25", month = dec, year = "2017", DOI = "https://doi.org/10.1007/s42354-018-0007-4", ISSN = "2510-3008", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Linnhoff-Popien:2017:BGG, author = "Claudia Linnhoff-Popien and Aloysius Widmann", title = "{Blockchain --- Zum Geleit}. ({German}) [{Blockchain} --- Preface]", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "26--28", month = dec, year = "2017", DOI = "https://doi.org/10.1007/s42354-018-0008-3", ISSN = "2510-3008", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", language = "German", } @Article{Linnhoff-Popien:2017:BNB, author = "Claudia Linnhoff-Popien", title = "Blockchain --- the next big thing?", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "7--7", month = dec, year = "2017", DOI = "https://doi.org/10.1007/s42354-018-0001-x", ISSN = "2510-3008", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Linnhoff-Popien:2017:BTG, author = "Claudia Linnhoff-Popien and Aloysius Widmann", title = "Blockchain --- Zum Geleit", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "26--28", month = dec, year = "2017", DOI = "https://doi.org/10.1007/s42354-018-0008-3", ISSN = "2510-3008", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Linnhoff-Popien:2017:BTN, author = "Claudia Linnhoff-Popien", title = "Blockchain --- the next big thing?", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "7--7", month = dec, year = "2017", DOI = "https://doi.org/10.1007/s42354-018-0001-x", ISSN = "2510-3008", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Lintilhac:2017:MBP, author = "P. S. Lintilhac and A. Tourin", title = "Model-based pairs trading in the {Bitcoin} markets", journal = j-QUANT-FINANCE, volume = "17", number = "5", pages = "703--716", year = "2017", DOI = "https://doi.org/10.1080/14697688.2016.1231928", ISSN = "1469-7688 (print), 1469-7696 (electronic)", ISSN-L = "1469-7688", MRclass = "91G80 (91B24)", MRnumber = "3633172", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Quantitative Finance", journal-URL = "http://www.tandfonline.com/loi/rquf20", } @InCollection{Liu:2017:DSD, author = "Zhengjun Liu and Hui Zhao and Wen Chen and Xiaochun Cao and Haipeng Peng and Jin Yang and Tao Yang and Ping Lin", booktitle = "Theoretical Computer Science", title = "Double-Spending Detection for Fast {Bitcoin} Payment Based on Artificial Immune", publisher = pub-SV, address = pub-SV:adr, pages = "133--143", year = "2017", DOI = "https://doi.org/10.1007/978-981-10-6893-5_10", ISBN = "981-10-6893-3", ISBN-13 = "978-981-10-6893-5", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-6893-5_10", acknowledgement = ack-nhfb, } @InProceedings{Liu:2017:ESE, author = "Yi Liu and Xingtong Liu and Lei Zhang and Chaojing Tang and Hongyan Kang", editor = "{IEEE}", booktitle = "{2017 4th International Conference on Systems and Informatics (ICSAI), 11--13 November 2017, Hangzhou, China}", title = "An efficient strategy to eliminate malleability of {Bitcoin} transaction", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "960--964", month = nov, year = "2017", DOI = "https://doi.org/10.1109/ICSAI.2017.8248424", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Bitcoin wallet; cryptocurrency; Law; Peer-to-peer computing; Protocols; Public key; Standards; transaction malleability", } @Article{Lu:2017:ABB, author = "Qinghua Lu and Xiwei Xu", title = "Adaptable Blockchain-Based Systems: A Case Study for Product Traceability", journal = j-IEEE-SOFTWARE, volume = "34", number = "6", pages = "21--27", month = nov # "\slash " # dec, year = "2017", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2017.4121227", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Sat Jan 20 08:14:32 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", URL = "https://www.computer.org/csdl/mags/so/2017/06/mso2017060021-abs.html", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @InCollection{Lundbaek:2017:CGB, author = "Leif-Nissen Lundb{\ae}k and Andrea Callia D'Iddio and Michael Huth", booktitle = "{Models, Algorithms, Logics and Tools}", title = "Centrally Governed Blockchains: Optimizing Security, Cost, and Availability", publisher = pub-SV, address = pub-SV:adr, pages = "578--599", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63121-9_29", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-63121-9_29", acknowledgement = ack-nhfb, } @Article{Luther:2017:DGP, author = "William Luther", title = "{David Golumbia}, The Politics of {Bitcoin}: Software as Right-Wing Extremism", journal = "The Review of Austrian Economics", volume = "??", number = "??", pages = "213--226", month = "????", year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11138-017-0397-9", ISSN = "0889-3047 (print), 1573-7128 (electronic)", ISSN-L = "0889-3047", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11138-017-0397-9", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/11138", } @PhdThesis{Luu:2017:TSP, author = "The Loi Luu", title = "Towards Secure Public Blockchain Protocols at Scale", type = "{Ph.D.}", school = "National University of Singapore", address = "Singapore", pages = "165", year = "2017", ISBN = "1-0834-8123-1", ISBN-13 = "978-1-0834-8123-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2085943129", abstract = "In this thesis, we first analyse existing pool reward sharing protocols and show that they are vulnerable to an attack strategy called ``block withholding attack''. Our game-theoretic analysis proves that the attack is always well-incentivized, i.e. attacker gets more profit, in the long-run, but may not be so for a short duration. As a solution to resolve the mining centralization problem, we propose Smartpool, a novel protocol design for a decentralized cryptocurrency mining pool which is efficient in large scale. Our protocol leverages ``smart contracts,'' autonomous blockchain programs, to give transaction selection control back to miners while yielding low-variance payouts. As the last contribution, we propose a new distributed agreement protocol for public blockchains called Elastico that is scalable and secure even with presence of Byzantine adversary. Elastico scales transaction rates almost linearly with available computation for mining: the more the computation power in the network, the higher the number of transaction blocks selected per unit time.", acknowledgement = ack-nhfb, advisor = "PRATEEK SAXENA", keywords = "(UMI)AAI10907393; 0984:Computer science; Applied sciences; Computer science; Cryptocurrency mining", ris-m1 = "10907393", } @InProceedings{Malavolta:2017:CPP, author = "Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei and Srivatsan Ravi", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "Concurrency and Privacy with Payment-Channel Networks", publisher = pub-ACM, address = pub-ACM:adr, pages = "455--471", year = "2017", DOI = "https://doi.org/10.1145/3133956.3134096", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3134096", acknowledgement = ack-nhfb, acmid = "3134096", keywords = "Bitcoin, concurrency, payment-channel network, privacy, scalability", location = "Dallas, Texas, USA", pagecount = "17", } @Article{Mann:2017:TFA, author = "Christopher Mann and Daniel Loebenberger", title = "Two-factor authentication for the {Bitcoin} protocol", journal = j-INT-J-INFO-SEC, volume = "16", number = "2", pages = "213--226", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-016-0325-1", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-016-0325-1", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Marandi:2017:RPH, author = "Parisa Jalili Marandi and Marco Primi and Nicolas Schiper and Fernando Pedone", title = "Ring {Paxos}: High-Throughput Atomic Broadcast", journal = j-COMP-J, volume = "60", number = "6", pages = "866--882", day = "1", month = jun, year = "2017", CODEN = "CMPJA6", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Thu Nov 16 10:43:44 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2010.bib", URL = "https://academic.oup.com/comjnl/article/60/6/866/3058780", acknowledgement = ack-nhfb, fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @InCollection{Marfia:2017:BSB, author = "Gustavo Marfia and Piergiorgio Degli Esposti", booktitle = "{Reshoring of Manufacturing}", title = "Blockchain and Sensor-Based Reputation Enforcement for the Support of the Reshoring of Business Activities", publisher = pub-SV, address = pub-SV:adr, pages = "125--139", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-58883-4_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-58883-4_6", acknowledgement = ack-nhfb, } @Article{Maull:2017:DLT, author = "Roger Maull and Phil Godsiff and Catherine Mulligan and Alan Brown and Beth Kewell", title = "Distributed ledger technology: Applications and implications", journal = "Strategic Change", volume = "26", number = "5", pages = "481--489", year = "2017", CODEN = "STCHFT", DOI = "https://doi.org/10.1002/jsc.2148", ISSN = "1086-1718 (print), 1099-1697 (electronic)", ISSN-L = "1086-1718", bibdate = "Tue Jan 30 18:57:48 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1099-1697", } @InProceedings{Mc:2017:ATR, author = "Patrick Mc and Corry and Ethan Heilman and Andrew Miller", title = "Atomically Trading with {Roger}: Gambling on the Success of a Hardfork", crossref = "Garcia-Alfaro:2017:DPM", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_19", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_19", acknowledgement = ack-nhfb, } @InCollection{McCorry:2017:ATR, author = "Patrick McCorry and Ethan Heilman and Andrew Miller", title = "Atomically Trading with {Roger}: Gambling on the Success of a Hardfork", crossref = "Garcia-Alfaro:2017:DPM", pages = "334--353", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_19", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InProceedings{McCorry:2017:RAB, author = "Patrick McCorry and Siamak F. Shahandashti and Feng Hao", title = "Refund Attacks on {Bitcoin}'s Payment Protocol", crossref = "Grossklags:2017:FCD", pages = "581--599", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54970-4_34", ISBN = "3-662-54970-0", ISBN-13 = "978-3-662-54970-4", MRclass = "94A60", MRnumber = "3658659", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-54970-4_34", acknowledgement = ack-nhfb, } @InProceedings{Melo:2017:HBC, author = "Wilson S. {Melo,Jr} and Alysson Bessani and Luiz F. R. C. Carmo", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "How Blockchains Can Help Legal Metrology", publisher = pub-ACM, address = pub-ACM:adr, pages = "5:1--5:2", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152829", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152829", acknowledgement = ack-nhfb, acmid = "3152829", articleno = "5", keywords = "blockchain; internet of thing; legal metrology; measuring instruments; smart grids; software inspection", location = "Las Vegas, Nevada", pagecount = "2", } @Article{Mengelkamp:2017:BBS, author = "Esther Mengelkamp and Benedikt Notheisen and Carolin Beer and David Dauer and Christof Weinhardt", title = "A blockchain-based smart grid: towards sustainable local energy markets", journal = "Computer Science --- Research and Development", volume = "??", number = "??", pages = "1--8", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s00450-017-0360-9", ISSN = "1865-2034 (print), 1865-2042 (electronic)", ISSN-L = "1865-2034", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s00450-017-0360-9", acknowledgement = ack-nhfb, fjournal = "Computer Science --- Research and Development", journal-URL = "https://link.springer.com/journal/450", } @InProceedings{Meshkov:2017:SPR, author = "Dmitry Meshkov and Alexander Chepurnoy and Marc Jansen", title = "Short Paper: Revisiting Difficulty Control for Blockchain Systems", crossref = "Garcia-Alfaro:2017:DPM", pages = "429--436", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_25", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_25", acknowledgement = ack-nhfb, } @InProceedings{Miller:2017:ZCL, author = "A. Miller and I. Bentov", booktitle = "2017 {IEEE} European Symposium on Security and Privacy Workshops {(EuroSPW)}", title = "Zero-Collateral Lotteries in {Bitcoin} and {Ethereum}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "4--13", month = apr, year = "2017", DOI = "https://doi.org/10.1109/EuroSPW.2017.44", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7966964/", acknowledgement = ack-nhfb, keywords = "authoring languages; Bitcoin; Bitcoin implementation; Contracts; cryptocurrency-based lottery protocols; cryptographic protocols; electronic money; Ethereum-based implementation; Europe; off-chain setup phase; Privacy; Protocols; scripting language; tournament bracket construction; zero-collateral lotteries", } @InProceedings{Mirzayi:2017:BSA, author = "Sahar Mirzayi and Mohammad Mehrzad", editor = "{IEEE}", booktitle = "{2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), 26--27 October 2017, Mashhad, Iran}", title = "{Bitcoin}, an {SWOT} analysis", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "205--210", month = oct, year = "2017", DOI = "https://doi.org/10.1109/ICCKE.2017.8167876", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Algorithm design and analysis; asymmetric encryption algorithms; Bitcoin; Bitcoin generation; Bitcoin transactions; Blockchain Technology; cryptocurrencies; cryptocurrency; cryptography; decentralized virtual currency; electronic money; financial data processing; Government; hashes; History; Online banking; SWOT analysis; Virtual currency", } @MastersThesis{Mishra:2017:ARC, author = "Vineet Mishra", title = "An Approach to Recovery of Critical Data of Smart Cities Using Blockchain", type = "{M.S.}", school = "Arizona State University", address = "Tempe, AZ, USA", pages = "61", year = "2017", ISBN = "0-355-51103-7", ISBN-13 = "978-0-355-51103-1", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1990937755", abstract = "Smart cities are the next wave of rapid expansion of Internet of Things (IoT). A smart city is a designation given to a city that incorporates information and communication technologies (ICT) to enhance the quality and performance of urban services, such as energy, transportation, healthcare, communications, entertainments, education, e-commerce, businesses, city management, and utilities, to reduce resource consumption, wastage and overall costs. The overarching aim of a smart city is to enhance the quality of living for its residents and businesses, through technology. In a large ecosystem, like a smart city, many organizations and companies collaborate with the smart city government to improve the smart city. These entities may need to store and share critical data with each other. A smart city has several thousands of smart devices and sensors deployed across the city. Storing critical data in a secure and scalable manner is an important issue in a smart city. While current cloud-based services, like Splunk and ELK (Elasticsearch-Logstash-Kibana), offer a centralized view and control over the IT operations of these smart devices, it is still prone to insider attacks, data tampering, and rogue administrator problems. In this thesis, we present an approach using blockchain to recovering critical data from unauthorized modifications. We use extensive simulations based on complex adaptive system theory, for evaluation of our approach. Through mathematical proof we proved that the approach always detects an unauthorized modification of critical data.", acknowledgement = ack-nhfb, advisor = "Sik-Sang Yau", keywords = "0984:Computer science; Applied sciences; Blockchain; Computer science; Smart cities; Smart contracts", ris-m1 = "10681307", } @InProceedings{Missier:2017:MMV, author = "Paolo Missier and Shaimaa Bajoudah and Angelo Capossele and Andrea Gaglione and Michele Nati", booktitle = "{Proceedings of the Seventh International Conference on the Internet of Things}", title = "Mind My Value: A Decentralized Infrastructure for Fair and Trusted {IoT} Data Trading", publisher = pub-ACM, address = pub-ACM:adr, pages = "15:1--15:8", year = "2017", DOI = "https://doi.org/10.1145/3131542.3131564", ISBN = "1-4503-5318-5", ISBN-13 = "978-1-4503-5318-2", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoT '17", URL = "http://doi.acm.org/10.1145/3131542.3131564", acknowledgement = ack-nhfb, acmid = "3131564", articleno = "15", location = "Linz, Austria", pagecount = "8", } @Article{Mohan:2017:TBD, author = "C. Mohan", title = "Tutorial: Blockchains and Databases", journal = j-PROC-VLDB-ENDOWMENT, volume = "10", number = "12", pages = "2000--2001", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.14778/3137765.3137830", ISSN = "2150-8097", ISSN-L = "2150-8097", bibdate = "Tue Oct 10 17:16:19 MDT 2017", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "In the last few years, blockchain (also known as distributed ledger), the underlying technology of the permissionless or public Bitcoin network, has become very popular for use in private or permissioned environments. Computer companies like IBM and Microsoft, and many key players in different vertical industry segments have recognized the utility of blockchains for securely managing assets (physical/digital) other than cryptocurrencies. IBM did some pioneering work by architecting and implementing a private blockchain system, and then open sourcing it. That system, which has since then been named Fabric, is being enhanced via the Hyperledger Consortium set up under the auspices of the Linux Foundation. Other efforts in the industry include Enterprise Ethereum, R3 Corda and BigchainDB.", acknowledgement = ack-nhfb, acmid = "3137830", fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", pagecount = "2", } @InCollection{Morabito:2017:BES, author = "Vincenzo Morabito", title = "Blockchain and Enterprise Systems", crossref = "Morabito:2017:BIT", pages = "125--142", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_7", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:BG, author = "Vincenzo Morabito", title = "Blockchain Governance", crossref = "Morabito:2017:BIT", pages = "41--59", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_3", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:BP, author = "Vincenzo Morabito", title = "Blockchain Practices", crossref = "Morabito:2017:BIT", pages = "145--166", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_8", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:BPC, author = "Vincenzo Morabito", title = "The Blockchain Paradigm Change Structure", crossref = "Morabito:2017:BIT", pages = "3--20", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_1", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:BVS, author = "Vincenzo Morabito", title = "Blockchain Value System", crossref = "Morabito:2017:BIT", pages = "21--39", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_2", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:CBP, author = "Vincenzo Morabito", title = "Conclusion: The {B3} Perspective", crossref = "Morabito:2017:BIT", pages = "167--170", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_9", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:DC, author = "Vincenzo Morabito", title = "Digital Currencies", crossref = "Morabito:2017:BIT", pages = "81--100", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_5", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:SBS, author = "Vincenzo Morabito", title = "The Security of Blockchain Systems", crossref = "Morabito:2017:BIT", pages = "61--78", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_4", acknowledgement = ack-nhfb, } @InCollection{Morabito:2017:SCL, author = "Vincenzo Morabito", title = "Smart Contracts and Licensing", crossref = "Morabito:2017:BIT", pages = "101--124", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-48478-5_6", acknowledgement = ack-nhfb, } @Article{Moser:2017:PAE, author = "Malte M{\"o}ser and Rainer B{\"o}hme", title = "The price of anonymity: empirical evidence from a market for Bitcoin anonymization", journal = "J. Cybersecur.", volume = "3", number = "2", pages = "127--135", month = "????", year = "2017", CODEN = "????", DOI = "https://doi.org/10.1093/cybsec/tyx007", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cybersecurity/cybersecurity3.html#MoserB17; https://www.wikidata.org/entity/Q111687789", acknowledgement = ack-nhfb, dblp-key = "journals/cybersecurity/MoserB17", dblp-mdate = "2022-08-16", } @InProceedings{Moura:2017:BVE, author = "Teogenes Moura and Alexandre Gomes", booktitle = "{Proceedings of the 18th Annual International Conference on Digital Government Research}", title = "Blockchain Voting and Its Effects on Election Transparency and Voter Confidence", publisher = pub-ACM, address = pub-ACM:adr, pages = "574--575", year = "2017", DOI = "https://doi.org/10.1145/3085228.3085263", ISBN = "1-4503-5317-7", ISBN-13 = "978-1-4503-5317-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "dg.o '17", URL = "http://doi.acm.org/10.1145/3085228.3085263", acknowledgement = ack-nhfb, acmid = "3085263", keywords = "Blockchain; Electronic Voting Systems; Voter Confidence", location = "Staten Island, NY, USA", pagecount = "2", } @InCollection{Mytis-Gkometh:2017:NKR, author = "P. Mytis-Gkometh and G. Drosatos and P. S. Efraimidis and E. Kaldoudi", booktitle = "Precision Medicine Powered by {pHealth} and Connected Health", title = "Notarization of Knowledge Retrieval from Biomedical Repositories Using Blockchain Technology", publisher = "Springer Singapore", pages = "69--73", month = nov, year = "2017", DOI = "https://doi.org/10.1007/978-981-10-7419-6_12", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Nair:2017:BEB, author = "Malavika Nair and Nicol{\'a}s Cachanosky", title = "{Bitcoin} and entrepreneurship: breaking the network effect", journal = "The Review of Austrian Economics", volume = "30", number = "3", pages = "263--275", month = jul, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11138-016-0348-x", ISSN = "0889-3047 (print), 1573-7128 (electronic)", ISSN-L = "0889-3047", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11138-016-0348-x", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/11138", } @InProceedings{Nakamura:2017:DPS, author = "Toru Nakamura and Welderufael B. Tesfay and Shinsaku Kiyomoto and Jetzabel Serna", title = "Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences", crossref = "Garcia-Alfaro:2017:DPM", pages = "107--123", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_7", acknowledgement = ack-nhfb, } @Article{Narayanan:2017:BAP, author = "Arvind Narayanan and Jeremy Clark", title = "{Bitcoin}'s Academic Pedigree", journal = j-CACM, volume = "60", number = "12", pages = "36--45", month = dec, year = "2017", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Wed Nov 29 18:47:03 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2017/12/223058-bitcoins-academic-pedigree", abstract = "The concept of cryptocurrencies is built from forgotten ideas in research literature.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @PhdThesis{Naviglia:2017:TER, author = "Jennifer Callen Naviglia", title = "The Technological, Economic and Regulatory Challenges of Digital Currency: an Exploratory Analysis of Federal Judicial Cases Involving {Bitcoin}", type = "{D.Sc.}", school = "Robert Morris University", address = "Moon Township, PA, USA", pages = "177", year = "2017", ISBN = "0-355-65077-0", ISBN-13 = "978-0-355-65077-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2015186339", abstract = "Digital currency comes in many forms however Bitcoin stands out as the most popular. Bitcoin, released to the public in 2009, remains in the infancy stage of the technology lifecycle. Bitcoin has no regulatory body, central bank or government backing creating doubt as to the digital currency's legitimacy. Despite Bitcoin's lack of ``official'' recognition, the digital currency's popularity continues to grow as the number of merchants and vendors accepting the currency expands globally. Focusing solely on the U.S. economy and monetary system, the lack of regulation and government recognition leaves legal disputes involving users of Bitcoin in the hands of a U.S. judicial system lacking previous case law as guidance. This research paper provides an in-depth analysis of the technical, economic and regulatory challenges facing the U.S. Federal Court system involving Bitcoin. A qualitative content analysis was employed in the exploratory review of 50 federal judicial cases involving Bitcoin. Key findings include discrepancies between the U.S. Judicial System and the U.S. Internal Revenue System on what and how to categorize Bitcoin, the value of bitcoin mining equipment, and the types of federal cases coming before the U.S. Judicial Courts involving Bitcoin.", acknowledgement = ack-nhfb, advisor = "Ann Jabro", keywords = "0489:Information Technology; 0508:Finance; 0770:Banking; Applied sciences; Banking; Bitcoin; Blockchain; Digital currency; Finance; Information Technology; Monetary system; Social sciences; Virtual currency", ris-m1 = "10745672", } @InProceedings{Neisse:2017:BBA, author = "Ricardo Neisse and Gary Steri and Igor Nai-Fovino", booktitle = "{Proceedings of the 12th International Conference on Availability, Reliability and Security}", title = "A Blockchain-based Approach for Data Accountability and Provenance Tracking", publisher = pub-ACM, address = pub-ACM:adr, pages = "14:1--14:10", year = "2017", DOI = "https://doi.org/10.1145/3098954.3098958", ISBN = "1-4503-5257-X", ISBN-13 = "978-1-4503-5257-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ARES '17", URL = "http://doi.acm.org/10.1145/3098954.3098958", acknowledgement = ack-nhfb, acmid = "3098958", articleno = "14", keywords = "blockchain; data accountability; smart contracts", location = "Reggio Calabria, Italy", pagecount = "10", } @InProceedings{Neudecker:2017:CNI, author = "Till Neudecker and Hannes Hartenstein", title = "Could Network Information Facilitate Address Clustering in {Bitcoin}?", crossref = "Jakobsson:2017:FCD", pages = "155--169", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_9", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_9", acknowledgement = ack-nhfb, } @Article{Nichols:2017:NDH, author = "Shaun Nichols", title = "{NiceHash} diced up by hackers, thousands of {Bitcoin} pilfered. {Mining} outfit says its entire wallet gone, estimated \$62m", journal = j-REGISTER, volume = "??", number = "??", pages = "??--??", day = "6", month = dec, year = "2017", bibdate = "Fri Dec 08 14:36:33 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://www.bbc.com/news/technology-42275523; http://www.bleepingcomputer.com/news/security/largest-cryptocurrency-mining-market-nicehash-hacked/; http://www.theregister.co.uk/2017/12/06/nicehash_diced_up_by_hackers_thousands_of_bitcoin_pilfered/; http://www.wsj.com/articles/millions-may-be-missing-in-bitcoin-heist-1512625176", acknowledgement = ack-nhfb, fjournal = "The Register", journal-URL = "https://www.theregister.co.uk/", } @InProceedings{Nijeholt:2017:DFP, author = "Hidde Lycklama {\`a} Nijeholt and Joris Oudejans and Zekeriya Erkin", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "{DecReg}: A Framework for Preventing Double-Financing Using Blockchain Technology", publisher = pub-ACM, address = pub-ACM:adr, pages = "29--34", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055529", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055529", acknowledgement = ack-nhfb, acmid = "3055529", keywords = "blockchain; distributed trust; double financing", location = "Abu Dhabi, United Arab Emirates", pagecount = "6", } @InProceedings{Nissen:2017:NVT, author = "Bettina Nissen and Kate Symons and Ella Tallyn and Chris Speed and Deborah Maxwell and John Vines", booktitle = "{Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems}", title = "New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations", publisher = pub-ACM, address = pub-ACM:adr, pages = "352--355", year = "2017", DOI = "https://doi.org/10.1145/3064857.3064862", ISBN = "1-4503-4991-9", ISBN-13 = "978-1-4503-4991-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "DIS '17 Companion", URL = "http://doi.acm.org/10.1145/3064857.3064862", acknowledgement = ack-nhfb, acmid = "3064862", keywords = "blockchain; distributed autonomous organisations; ownership; smart contracts; value exchange", location = "Edinburgh, United Kingdom", pagecount = "4", } @Article{Nofer:2017:B, author = "Michael Nofer and Peter Gomber and Oliver Hinz and Dirk Schiereck", title = "Blockchain", journal = "Business \& Information Systems Engineering", volume = "59", number = "3", pages = "183--187", month = mar, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12599-017-0467-3", ISSN = "1867-0202 (print), 2363-7005 (electronic)", ISSN-L = "1867-0202", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12599-017-0467-3", acknowledgement = ack-nhfb, fjournal = "Business \& Information Systems Engineering", journal-URL = "https://link.springer.com/journal/12599", } @Article{Nordrum:2017:GBD, author = "A. Nordrum", title = "Govern by blockchain: {Dubai} wants one platform to rule them all, while {Illinois} will try anything", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "54--55", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048841", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Buildings; Contracts; cryptography; Economics; financial industry; Government; government data processing; public-sector blockchain experiments; Urban areas", } @Article{Nordrum:2017:ITB, author = "A. Nordrum", title = "Is it time to become a blockchain developer? [Resources Careers]", journal = j-IEEE-SPECTRUM, volume = "54", number = "9", pages = "21--21", month = sep, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8012232", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Article{Nordrum:2017:WSO, author = "A. Nordrum", title = "{Wall Street} occupies the blockchain --- Financial firms plan to move trillions in assets to blockchains in 2018", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "40--45", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048839", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; Companies; Contracts; Credit cards; Industries; Software", } @InProceedings{Norvill:2017:ALU, author = "R. Norvill and B. B. Fiz Pontiveros and R. State and I. Awan and A. Cullen", booktitle = "2017 26th International Conference on Computer Communication and Networks {(ICCCN)}", title = "Automated Labeling of Unknown Contracts in {Ethereum}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = jul, year = "2017", DOI = "https://doi.org/10.1109/ICCCN.2017.8038513", bibdate = "Thu Nov 30 15:21:10 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8038513/", acknowledgement = ack-nhfb, keywords = "automated labeling; Computer science; Contracts; crypto-currency; Cryptocurrency; cryptography; eco-environment; Electrical engineering; Ethereum network; financial data processing; Labeling; pattern clustering; smart contract; unknown contracts; unsupervised clustering", } @Article{Notheisen:2017:TRW, author = "Benedikt Notheisen and Jacob Benjamin Cholewa and Arun Prasad Shanmugam", title = "Trading Real-World Assets on Blockchain", journal = "Business \& Information Systems Engineering", volume = "59", number = "6", pages = "425--440", month = oct, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12599-017-0499-8", ISSN = "1867-0202 (print), 2363-7005 (electronic)", ISSN-L = "1867-0202", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12599-017-0499-8", acknowledgement = ack-nhfb, fjournal = "Business \& Information Systems Engineering", journal-URL = "https://link.springer.com/journal/12599", } @InProceedings{OConnor:2017:SNL, author = "Russell O'Connor", booktitle = "{Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security}", title = "{Simplicity}: A New Language for Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "107--120", year = "2017", DOI = "https://doi.org/10.1145/3139337.3139340", ISBN = "1-4503-5099-2", ISBN-13 = "978-1-4503-5099-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PLAS '17", URL = "http://doi.acm.org/10.1145/3139337.3139340", acknowledgement = ack-nhfb, acmid = "3139340", keywords = "blockchain; bounded computation; crypto-currency; formal semantics; smart contracts", location = "Dallas, Texas, USA", pagecount = "14", } @InCollection{Ojo:2017:BNG, author = "Adegboyega Ojo and Samuel Adebayo", booktitle = "{Government 3.0 --- Next Generation Government Technology Infrastructure and Services}", title = "Blockchain as a Next Generation Government Information Infrastructure: A Review of Initiatives in {D5} Countries", publisher = pub-SV, address = pub-SV:adr, pages = "283--298", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-63743-3_11", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Public Administration and Information Technology", URL = "http://link.springer.com/chapter/10.1007/978-3-319-63743-3_11", acknowledgement = ack-nhfb, } @InProceedings{OLeary:2017:EAB, author = "Kevin O'Leary and Philip O'Reilly and Joseph Feller and Rob Gleasure and Shanping Li and Jerry Cristoforo", booktitle = "{Proceedings of the 13th International Symposium on Open Collaboration}", title = "Exploring the Application of Blockchain Technology to Combat the Effects of Social Loafing in Cross Functional Group Projects", publisher = pub-ACM, address = pub-ACM:adr, pages = "13:1--13:8", year = "2017", DOI = "https://doi.org/10.1145/3125433.3125464", ISBN = "1-4503-5187-5", ISBN-13 = "978-1-4503-5187-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "OpenSym '17", URL = "http://doi.acm.org/10.1145/3125433.3125464", acknowledgement = ack-nhfb, acmid = "3125464", articleno = "13", keywords = "Blockchain; Design Science; Dispersed Groups; Intellectual Property; Intrinsic Involvement; Social Comparison; Social Loafing; Task Visibility", location = "Galway, Ireland", pagecount = "8", } @InCollection{Olnes:2017:BTS, author = "Svein {\O}lnes and Arild Jansen", booktitle = "{Electronic Government}", title = "Blockchain Technology as Support Infrastructure in e-Government", publisher = pub-SV, address = pub-SV:adr, pages = "215--227", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-64677-0_18", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-64677-0_18", acknowledgement = ack-nhfb, } @InCollection{Ouaddah:2017:TNP, author = "Aafaf Ouaddah and Anas Abou Elkalam and Abdellah Ait Ouahman", booktitle = "{Europe and MENA Cooperation Advances in Information and Communication Technologies}", title = "Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in {IoT}", publisher = pub-SV, address = pub-SV:adr, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-46568-5_53", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-46568-5_53", acknowledgement = ack-nhfb, } @InProceedings{Owe:2017:CIC, author = "Olaf Owe and Toktam Ramezanifarkhani", title = "Confidentiality of Interactions in Concurrent Object-Oriented Systems", crossref = "Garcia-Alfaro:2017:DPM", pages = "19--34", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_2", acknowledgement = ack-nhfb, } @InProceedings{Ozisik:2017:GNP, author = "A. Pinar Ozisik and Gavin Andresen and George Bissias and Amir Houmansadr and Brian Levine", title = "{Graphene}: A New Protocol for Block Propagation Using Set Reconciliation", crossref = "Garcia-Alfaro:2017:DPM", pages = "420--428", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_24", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_24", acknowledgement = ack-nhfb, } @InProceedings{Ozyilmaz:2017:ILP, author = "Kaz{\i}m R{\i}fat {\"O}zy{\i}lmaz and Arda Yurdakul", booktitle = "{Proceedings of the Thirteenth ACM International Conference on Embedded Software 2017 Companion}", title = "Integrating Low-power {IoT} Devices to a Blockchain-based Infrastructure: Work-in-progress", publisher = pub-ACM, address = pub-ACM:adr, pages = "13:1--13:2", year = "2017", DOI = "https://doi.org/10.1145/3125503.3125628", ISBN = "1-4503-5186-7", ISBN-13 = "978-1-4503-5186-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "EMSOFT '17", URL = "http://doi.acm.org/10.1145/3125503.3125628", acknowledgement = ack-nhfb, acmid = "3125628", articleno = "13", keywords = "blockchain; decentralized; Ethereum; IoT; LoRa; LPWAN; trustless", location = "Seoul, Republic of Korea", pagecount = "2", } @Article{Padon:2017:PME, author = "Oded Padon and Giuliano Losa and Mooly Sagiv and Sharon Shoham", title = "{Paxos} made {EPR}: decidable reasoning about distributed protocols", journal = j-PACMPL, volume = "1", number = "OOPSLA", pages = "108:1--108:??", month = oct, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3140568", ISSN = "2475-1421", bibdate = "Wed Jan 10 09:45:26 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", acknowledgement = ack-nhfb, articleno = "108", fjournal = "Proceedings of the ACM on Programming Languages", journal-URL = "https://pacmpl.acm.org/", } @InProceedings{Pass:2017:ABP, author = "Rafael Pass and Lior Seeman and Abhi Shelat", editor = "Jesper Buus Nielsen and Jean-S{\'e}bastien Coron", booktitle = "{Advances in cryptology --- EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30--May 4, 2017, proceedings}", title = "Analysis of the Blockchain Protocol in Asynchronous Networks", publisher = pub-SV, address = pub-SV:adr, pages = "643--673", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-56614-6_22", ISBN = "3-319-56614-8", ISBN-13 = "978-3-319-56614-6", LCCN = "QA76.9.A25 .E97 2017eb", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-56614-6_22", abstract = "The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.", acknowledgement = ack-nhfb, booktableofcontents = "Lattice attacks and constructions \\ Obfuscation and functional encryption \\ Discrete logarithm \\ Multiparty computation \\ Universal composability \\ Zero knowledge \\ Side-channel attacks and countermeasures \\ Functional encryption \\ Elliptic curves \\ Symmetric cryptanalysis \\ Provable security for symmetric cryptography \\ security models:- Blockchain \\ Memory hard functions \\ Symmetric-key constructions \\ Obfuscation \\ Quantum cryptography \\ Public-key encryption and key-exchange", } @InProceedings{Pass:2017:FFB, author = "Rafael Pass and Elaine Shi", booktitle = "{Proceedings of the ACM Symposium on Principles of Distributed Computing}", title = "{FruitChains}: A Fair Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "315--324", year = "2017", DOI = "https://doi.org/10.1145/3087801.3087809", ISBN = "1-4503-4992-7", ISBN-13 = "978-1-4503-4992-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PODC '17", URL = "http://doi.acm.org/10.1145/3087801.3087809", acknowledgement = ack-nhfb, acmid = "3087809", keywords = "blockchains; distributed consensus; fairness; nash equilibrium", location = "Washington, DC, USA", pagecount = "10", } @InCollection{Patil:2017:FBB, author = "Akash Suresh Patil and Bayu Adhi Tama and Youngho Park and Kyung-Hyune Rhee", booktitle = "Advances in Computer Science and Ubiquitous Computing", title = "A Framework for Blockchain Based Secure Smart Green House Farming", publisher = "Springer Singapore", pages = "1162--1167", month = dec, year = "2017", DOI = "https://doi.org/10.1007/978-981-10-7605-3_185", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Article{Peck:2017:BB, author = "Morgan E. Peck and Samuel K. Moore", title = "The blossoming of the blockchain", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "24--25", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048835", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "academic transcripts; airline flights; bitcoin; Bitcoin; blockchain blossoming; blockchain-based agreements; Companies; contracts; Databases; digital currency; electronic money; energy market credits; Fasteners; health care providers; Licenses; monetary transaction recording; power markets; property titles; rooftop-generated solar electricity; smart contracts; state licenses; technology link neighborhood buyers; weary travelers", } @Article{Peck:2017:BHT, author = "Morgan E. Peck", title = "Blockchains: How they work and why they'll change the world", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "26--35", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048836", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; Computer hacking; Computers; Public key", } @Article{Peck:2017:BWD, author = "Morgan E. Peck", title = "Blockchain world --- Do you need a blockchain? {This} chart will tell you if the technology can solve your problem", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "38--60", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048838", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; blockchain technology; Companies; Conferences; cryptography; data-management systems; Databases; digital ecosystem; electronic health records; health care; health care records management; Juniper Research; online identities; Oracle Corp; Packaging; Privacy; property titles; records management; relational databases; Software; supply chains", } @Article{Peck:2017:ETF, author = "Morgan E. Peck and David Wagman", title = "Energy trading for fun and profit buy your neighbor's rooftop solar power or sell your own --- it'll all be on a blockchain", journal = j-IEEE-SPECTRUM, volume = "54", number = "10", pages = "56--61", month = oct, year = "2017", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2017.8048842", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Batteries; blockchain; building integrated photovoltaics; Companies; digital currency; electricity production; electronic commerce; energy trading; Europe; feed-in tariff programs; net metering; open energy market; photovoltaic panels; Photovoltaic systems; power markets; price signals; Production; residential energy production; rooftop solar power; solar cell arrays; transactions", } @Article{Perlman:2017:BHH, author = "Radia Perlman", title = "Blockchain: Hype or Hope?", journal = j-LOGIN, volume = "42", number = "2", pages = "??--??", month = "Summer", year = "2017", CODEN = "LOGNEM", ISSN = "1044-6397", bibdate = "Tue Apr 03 15:22:28 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.usenix.org/publications/login/summer2017/perlman", abstract = "In this article, I describe the technology behind Bitcoin's blockchain, and its scalability, security, and robustness. Most of what is written about ``blockchain technology'' talks about how it will revolutionize all sorts of applications without contrasting it with alternative solutions. To complicate matters, there are all sorts of proposed variants of the original blockchain (the technology behind Bitcoin), making the definition of ``blockchain technology'' very unclear. I explain how Bitcoin's blockchain technology works, along with its performance implications.", acknowledgement = ack-nhfb, fjournal = ";login: the USENIX Association newsletter", } @Article{Pesch:2017:DTO, author = "Paulina Pesch and Rainer B{\"o}hme", title = "{Datenschutz trotz {\"o}ffentlicher Blockchain?}. ({German}) [{Privacy} despite public block chain?]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "2", pages = "93--98", month = feb, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0735-x", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0735-x", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @Article{Pierrot:2017:MBE, author = "C{\'e}cile Pierrot and Benjamin Wesolowski", title = "Malleability of the blockchain's entropy", journal = j-CRYPTOGR-COMMUN, volume = "10", number = "1", pages = "211--233", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12095-017-0264-3", ISSN = "", ISSN-L = "1936-2447", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12095-017-0264-3", acknowledgement = ack-nhfb, fjournal = "Cryptography and Communications", journal-URL = "http://link.springer.com/journal/12095", } @Article{Popper:2017:BSI, author = "Nathaniel Popper", title = "As {Bitcoin} Scrapes \$10,000, an Investment Boom Like No Other", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "27", month = nov, year = "2017", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Thu Nov 30 18:01:07 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2017/11/27/technology/bitcoin-price-10000.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the news story: ``The Dow Jones industrial average, in its biggest year, 1915, went up 82 percent, or one-tenth as much as Bitcoin has gone up this year. Amazon's red-hot stock is up only one-fifteenth as much as Bitcoin this year. \ldots{} Bitcoin is not living up to its promise as a currency routinely used for small purchases. Few people want to spend their Bitcoins if they believe the price will double in the next month.''", } @Article{Popper:2017:HWT, author = "Nathaniel Popper", title = "How the {Winklevoss} Twins Found Vindication in a {Bitcoin} Fortune", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "19", month = dec, year = "2017", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Fri Feb 02 06:21:34 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2017/12/19/technology/bitcoin-winklevoss-twins.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @InProceedings{Porru:2017:BOS, author = "Simone Porru and Andrea Pinna and Michele Marchesi and Roberto Tonelli", booktitle = "{Proceedings of the 39th International Conference on Software Engineering Companion}", title = "Blockchain-oriented Software Engineering: Challenges and New Directions", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "169--171", year = "2017", DOI = "https://doi.org/10.1109/ICSE-C.2017.142", ISBN = "1-5386-1589-4", ISBN-13 = "978-1-5386-1589-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICSE-C '17", acknowledgement = ack-nhfb, acmid = "3098401", keywords = "blockchain; cryptocurrencies; smart contracts; software engineering", location = "Buenos Aires, Argentina", pagecount = "3", } @InProceedings{Portnoff:2017:BBU, author = "Rebecca S. Portnoff and Danny Yuxing Huang and Periwinkle Doerfler and Sadia Afroz and Damon McCoy", booktitle = "{Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining}", title = "{Backpage} and {Bitcoin}: Uncovering Human Traffickers", publisher = pub-ACM, address = pub-ACM:adr, pages = "1595--1604", year = "2017", DOI = "https://doi.org/10.1145/3097983.3098082", ISBN = "1-4503-4887-4", ISBN-13 = "978-1-4503-4887-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "KDD '17", URL = "http://doi.acm.org/10.1145/3097983.3098082", acknowledgement = ack-nhfb, acmid = "3098082", keywords = "Bitcoin, human trafficking, machine learning, security", location = "Halifax, NS, Canada", pagecount = "10", } @InCollection{Qi:2017:BPI, author = "Renming Qi and Chen Feng and Zheng Liu and Nezih Mrad", booktitle = "{E-Democracy for Smart Cities}", title = "Blockchain-Powered {Internet of Things}, E-Governance and E-Democracy", publisher = pub-SV, address = pub-SV:adr, pages = "509--520", year = "2017", DOI = "https://doi.org/10.1007/978-981-10-4035-1_17", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-4035-1_17", acknowledgement = ack-nhfb, } @InProceedings{Rahman:2017:SPR, author = "Mizanur Rahman and Ruben Recabarren and Bogdan Carbunar and Dongwon Lee", booktitle = "Proceedings of the 2017 {ACM} on Web Science Conference", title = "Stateless Puzzles for Real Time Online Fraud Preemption", publisher = pub-ACM, address = pub-ACM:adr, pages = "23--32", year = "2017", DOI = "https://doi.org/10.1145/3091478.3091507", ISBN = "1-4503-4896-3", ISBN-13 = "978-1-4503-4896-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WebSci '17", acknowledgement = ack-nhfb, acmid = "3091507", keywords = "online fraud preemption, stateless puzzle", location = "Troy, New York, USA", pagecount = "10", } @InProceedings{Raju:2017:CDB, author = "Saravanan Raju and Vandita Rajesh and Jitender S. Deogun", booktitle = "{Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance}", title = "The Case for a Data Bank: An Institution to Govern Healthcare and Education", publisher = pub-ACM, address = pub-ACM:adr, pages = "538--539", year = "2017", DOI = "https://doi.org/10.1145/3047273.3047275", ISBN = "1-4503-4825-4", ISBN-13 = "978-1-4503-4825-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "ICEGOV '17", URL = "http://doi.acm.org/10.1145/3047273.3047275", acknowledgement = ack-nhfb, acmid = "3047275", keywords = "blockchain; Data bank; education; healthcare", location = "New Delhi AA, India", pagecount = "2", } @InProceedings{Ranshous:2017:EPM, author = "Stephen Ranshous and Cliff A. Joslyn and Sean Kreyling and Kathleen Nowak and Nagiza F. Samatova and Curtis L. West and Samuel Winters", title = "Exchange Pattern Mining in the {Bitcoin} Transaction Directed Hypergraph", crossref = "Jakobsson:2017:FCD", pages = "248--263", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_16", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_16", acknowledgement = ack-nhfb, } @Article{Recabarren:2017:HSB, author = "Ruben Recabarren and Bogdan Carbunar", title = "Hardening {Stratum}, the {Bitcoin Pool Mining Protocol}", journal = "Proc. Priv. Enhancing Technol.", volume = "2017", number = "3", pages = "57", month = "????", year = "2017", CODEN = "????", DOI = "https://doi.org/10.1515/popets-2017-0028", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/popets/popets2017.html#RecabarrenC17", acknowledgement = ack-nhfb, dblp-key = "journals/popets/RecabarrenC17", dblp-mdate = "2020-09-01", } @Article{ReyesMacedo:2017:WAM, author = "V{\'\i}ctor Gabriel {Reyes Macedo} and Mois{\'e}s Salinas-Rosales", title = "{WannaCry}: An{\'a}lisis del movimiento de recursos financieros en el blockchain de bitcoin. ({Spanish}) [{WannaCry}: Analysis of the movement of financial resources on the bitcoin blockchain]", journal = "Res. Comput. Sci.", volume = "137", number = "??", pages = "147--155", month = "????", year = "2017", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://rcs.cic.ipn.mx/2017_137/WannaCry_%20Analisis%20del%20movimiento%20de%20recursos%20financieros%20en%20el%20blockchain%20de%20bitcoin.pdf; https://dblp.org/db/journals/rcs/rcs137.html#MacedoS17", acknowledgement = ack-nhfb, dblp-key = "journals/rcs/MacedoS17", dblp-mdate = "2020-03-12", language = "Spanish", } @Article{Risius:2017:BRF, author = "{Dr.Marten} Risius and {Dr.Kai} Spohrer", title = "A Blockchain Research Framework", journal = "Business \& Information Systems Engineering", volume = "59", number = "6", pages = "385--409", month = dec, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12599-017-0506-0", ISSN = "1867-0202 (print), 2363-7005 (electronic)", ISSN-L = "1867-0202", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12599-017-0506-0", acknowledgement = ack-nhfb, fjournal = "Business \& Information Systems Engineering", journal-URL = "https://link.springer.com/journal/12599", } @InProceedings{Rocha:2017:SPU, author = "Henrique Rocha and St{\'e}phane Ducasse and Marcus Denker and Jason Lecerf", booktitle = "{Proceedings of the 12th Edition of the International Workshop on Smalltalk Technologies}", title = "Solidity Parsing Using {SmaCC}: Challenges and Irregularities", publisher = pub-ACM, address = pub-ACM:adr, pages = "2:1--2:9", year = "2017", DOI = "https://doi.org/10.1145/3139903.3139906", ISBN = "1-4503-5554-4", ISBN-13 = "978-1-4503-5554-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IWST '17", URL = "http://doi.acm.org/10.1145/3139903.3139906", acknowledgement = ack-nhfb, acmid = "3139906", articleno = "2", keywords = "Blockchain; Ethereum; Parser; SmaCC; Solidity", location = "Maribor, Slovenia", pagecount = "9", } @InCollection{Rodrigues:2017:BBA, author = "Bruno Rodrigues and Thomas Bocek and Andri Lareida and David Hausheer and Sina Rafati and Burkhard Stiller", booktitle = "{Security of Networks and Services in an All-Connected World}", title = "A Blockchain-Based Architecture for Collaborative {DDoS} Mitigation with Smart Contracts", publisher = pub-SV, address = pub-SV:adr, pages = "16--29", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-60774-0_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-60774-0_2", acknowledgement = ack-nhfb, } @InCollection{Rodrigues:2017:MDD, author = "Bruno Rodrigues and Thomas Bocek and Burkhard Stiller", booktitle = "{Security of Networks and Services in an All-Connected World}", title = "Multi-domain {DDoS} Mitigation Based on Blockchains", publisher = pub-SV, address = pub-SV:adr, pages = "185--190", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-60774-0_19", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-60774-0_19", acknowledgement = ack-nhfb, } @InProceedings{Rohrer:2017:TCD, author = "Elias Rohrer and Jann-Frederik La{\ss} and Florian Tschorsch", title = "Towards a Concurrent and Distributed Route Selection for Payment Channel Networks", crossref = "Garcia-Alfaro:2017:DPM", pages = "411--419", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_23", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_23", acknowledgement = ack-nhfb, } @Book{Rothstein:2017:EMS, author = "Adam Rothstein", title = "The end of money: the story of {Bitcoin}, cryptocurrencies and the blockchain revolution", publisher = "Nicholas Brealey Publishing", address = "Boston, MA", pages = "xii + 228", year = "2017", ISBN = "1-85788-669-0 (paperback), 1-85788-974-6", ISBN-13 = "978-1-85788-669-6 (paperback), 978-1-85788-974-1", LCCN = "HG256 .R67 2017", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Money; History; 21st century; Bitcoin; Electronic funds transfers", } @Article{Ruckeshauser:2017:BGD, author = "Nadine R{\"u}ckesh{\"a}user and Christian Brenig and G{\"u}nter M{\"u}ller", title = "{Blockchains als Grundlage digitaler Gesch{\"a}ftsmodelle}. ({German}) [{Blockchains} as the basis of digital business models]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "8", pages = "492--496", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0818-8", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0818-8", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @InProceedings{Ruffing:2017:VMC, author = "Tim Ruffing and Pedro Moreno-Sanchez", title = "{ValueShuffle}: Mixing Confidential Transactions for Comprehensive Transaction Privacy in {Bitcoin}", crossref = "Jakobsson:2017:FCD", pages = "133--154", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_8", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_8", acknowledgement = ack-nhfb, } @InProceedings{Sadeghi:2017:BT, author = "Omid Sadeghi and Volodymyr Paprotski and Arno Jacobsen and Vadim Berestetsky and Phil Coulthard", booktitle = "{Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering}", title = "Blockchain Technology", publisher = pub-IBM, address = pub-IBM:adr, pages = "355--355", year = "2017", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CASCON '17", URL = "http://dl.acm.org/citation.cfm?id=3172795.3172860", acknowledgement = ack-nhfb, acmid = "3172860", location = "Markham, Ontario, Canada", pagecount = "1", } @InProceedings{Sakakibara:2017:FNB, author = "Yuma Sakakibara and Kohei Nakamura and Hiroki Matsutani", booktitle = "{Proceedings of the 8th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies}", title = "An {FPGA NIC} Based Hardware Caching for Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "1:1--1:6", year = "2017", DOI = "https://doi.org/10.1145/3120895.3120897", ISBN = "1-4503-5316-9", ISBN-13 = "978-1-4503-5316-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "HEART2017", URL = "http://doi.acm.org/10.1145/3120895.3120897", acknowledgement = ack-nhfb, acmid = "3120897", articleno = "1", keywords = "10Gbit Ethernet; Blockchain; FPGAs", location = "Bochum, Germany", pagecount = "6", } @InProceedings{Salimitari:2017:PMB, author = "Mehrdad Salimitari and Mainak Chatterjee and Murat Yuksel and Eduardo Pasiliao", editor = "{IEEE}", booktitle = "{2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), 15--17 October 2017, San Jose, CA, USA}", title = "Profit Maximization for {Bitcoin} Pool Mining: A Prospect Theoretic Approach", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "267--274", month = oct, year = "2017", DOI = "https://doi.org/10.1109/CIC.2017.00043", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin mining; Collaboration; Conferences; Internet; pools; prospect theory; utility", } @InProceedings{Sallal:2017:PAA, author = "Muntadher Fadhil Sallal and Gareth Owenson and Mo Adda", booktitle = "2017 {IEEE 37th} International Conference on Distributed Computing Systems {(ICDCS)}", title = "Proximity Awareness Approach to Enhance Propagation Delay on the {Bitcoin} Peer-to-Peer Network", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "2411--2416", month = jun, year = "2017", DOI = "https://doi.org/10.1109/ICDCS.2017.53", ISSN = "1063-6927", ISSN-L = "1063-6927", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "BCBPT; Clustering Evaluation; Delays; financial data processing; History; peer-to-peer computing; Peer-to-peer computing; peer-to-peer electronic currency system; Propagation delay; Protocols; protocols; proximity awareness approach; transaction verification; {Bitcoin}; {Bitcoin} clustering based ping time protocol; {Bitcoin} peer-to-peer network", } @InProceedings{Samavi:2017:FWB, author = "Reza Samavi and Thomas E. Doyle and Thodoros Topologlou", booktitle = "{Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering}", title = "The First Workshop on Blockchain \& {eHealth}: Towards Provable Privacy \& Security in Data Intensive Health Research", publisher = pub-IBM, address = pub-IBM:adr, pages = "333--336", year = "2017", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CASCON '17", URL = "http://dl.acm.org/citation.cfm?id=3172795.3172850", acknowledgement = ack-nhfb, acmid = "3172850", location = "Markham, Ontario, Canada", pagecount = "4", } @InProceedings{Sapirshtein:2017:OSM, author = "Ayelet Sapirshtein and Yonatan Sompolinsky and Aviv Zohar", title = "Optimal Selfish Mining Strategies in {Bitcoin}", crossref = "Grossklags:2017:FCD", pages = "515--532", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54970-4_30", ISBN = "3-662-54970-0", ISBN-13 = "978-3-662-54970-4", MRclass = "94A60", MRnumber = "3658655", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-54970-4_30", acknowledgement = ack-nhfb, } @InProceedings{Sas:2017:DTE, author = "Corina Sas and Irni Eliana Khairuddin", booktitle = "{Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems}", title = "Design for Trust: An Exploration of the Challenges and Opportunities of {Bitcoin} Users", publisher = pub-ACM, address = pub-ACM:adr, pages = "6499--6510", year = "2017", DOI = "https://doi.org/10.1145/3025453.3025886", ISBN = "1-4503-4655-3", ISBN-13 = "978-1-4503-4655-9", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CHI '17", URL = "http://doi.acm.org/10.1145/3025453.3025886", acknowledgement = ack-nhfb, acmid = "3025886", keywords = "bitcoin users; blockchain; dishonest traders; risks; trust", location = "Denver, Colorado, USA", pagecount = "12", } @InProceedings{Schrijvers:2017:ICB, author = "Okke Schrijvers and Joseph Bonneau and Dan Boneh and Tim Roughgarden", title = "Incentive Compatibility of {Bitcoin} Mining Pool Reward Functions", crossref = "Grossklags:2017:FCD", pages = "477--498", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54970-4_28", ISBN = "3-662-54970-0", ISBN-13 = "978-3-662-54970-4", MRclass = "94A60", MRnumber = "3658653", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-54970-4_28", acknowledgement = ack-nhfb, } @InCollection{Seebacher:2017:BTE, author = "Stefan Seebacher and Ronny Sch{\"u}ritz", booktitle = "{Exploring Services Science}", title = "Blockchain Technology as an Enabler of Service Systems: A Structured Literature Review", publisher = pub-SV, address = pub-SV:adr, pages = "12--23", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-56925-3_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Lecture Notes in Business Information Processing", URL = "http://link.springer.com/chapter/10.1007/978-3-319-56925-3_2", acknowledgement = ack-nhfb, } @InProceedings{Shafagh:2017:TBB, author = "Hossein Shafagh and Lukas Burkhalter and Anwar Hithnawi and Simon Duquennoy", booktitle = "{Proceedings of the 2017 on Cloud Computing Security Workshop}", title = "Towards Blockchain-based Auditable Storage and Sharing of {IoT} Data", publisher = pub-ACM, address = pub-ACM:adr, pages = "45--50", year = "2017", DOI = "https://doi.org/10.1145/3140649.3140656", ISBN = "1-4503-5204-9", ISBN-13 = "978-1-4503-5204-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCSW '17", URL = "http://doi.acm.org/10.1145/3140649.3140656", acknowledgement = ack-nhfb, acmid = "3140656", keywords = "access control; blockchain; cloud; edge; iot; security; time-series", location = "Dallas, Texas, USA", pagecount = "6", } @InProceedings{Sharma:2017:SDI, author = "Vishal Sharma and Ilsun You and G{\"o}khan Kul", booktitle = "{Proceedings of the 2017 International Workshop on Managing Insider Security Threats}", title = "Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks Using Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "81--84", year = "2017", DOI = "https://doi.org/10.1145/3139923.3139932", ISBN = "1-4503-5177-8", ISBN-13 = "978-1-4503-5177-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "MIST '17", URL = "http://doi.acm.org/10.1145/3139923.3139932", acknowledgement = ack-nhfb, acmid = "3139932", keywords = "blockchain; drones; security; threats; uavs; ultra-dense networks", location = "Dallas, Texas, USA", pagecount = "4", } @Article{Sharwood:2017:EMS, author = "Simon Sharwood", title = "{Elon Musk} says he's not {Satoshi Nakamoto} and is pretty rubbish at {Bitcoin}: He had some once, but lost them down the back of the sofa", journal = j-REGISTER, volume = "??", number = "??", pages = "??--??", day = "29", month = nov, year = "2017", bibdate = "Fri Dec 08 14:39:27 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.theregister.co.uk/2017/11/29/elon_musk_says_he_is_not_satoshi_nakamoto/", acknowledgement = ack-nhfb, fjournal = "The Register", journal-URL = "https://www.theregister.co.uk/", } @InProceedings{Sheehan:2017:DMP, author = "David Sheehan and Rob Gleasure and Joe Feller and Phillip O'Reilly and Shanping Li and Jerry Cristiforo", booktitle = "{Proceedings of the 13th International Symposium on Open Collaboration}", title = "Does Miner Pooling Impact {Bitcoin}'s Ability to Stay Decentralized?", publisher = pub-ACM, address = pub-ACM:adr, pages = "25:1--25:4", year = "2017", DOI = "https://doi.org/10.1145/3125433.3125462", ISBN = "1-4503-5187-5", ISBN-13 = "978-1-4503-5187-4", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "OpenSym '17", URL = "http://doi.acm.org/10.1145/3125433.3125462", acknowledgement = ack-nhfb, acmid = "3125462", articleno = "25", keywords = "Bitcoin; Blockchain; decentralization; mining; mining pools", location = "Galway, Ireland", pagecount = "4", } @MastersThesis{Shubbar:2017:UMI, author = "Safa Shubbar", title = "Ultrasound Medical Imaging Systems Using Telemedicine and Blockchain for Remote Monitoring of Responses to Neoadjuvant Chemotherapy in Women's Breast Cancer: Concept and Implementation", type = "{M.S.}", school = "Kent State University", address = "Kent, OH, USA", pages = "133", year = "2017", ISBN = "0-438-09718-1", ISBN-13 = "978-0-438-09718-6", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/matlab.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2059846207", abstract = "Malignant tumors are a worldwide concern. Breast cancer is the most common cause of death among women and is ranked as the second most serious malignant tumor in women, after lung cancer. Consequently, different techniques and technologies have been studied, researched, and developed to detect breast cancer at an early stage. Early diagnosis contributes to the preservation of lives in both developed and developing countries. The survival rate increases dramatically when the cancer tumors are discovered via a screening process before the appearance of cancer symptoms. Therefore, monitoring the responses of breast cancer patients and detecting the presence of new lesions are the main intended outcomes of this research. In this research, we use a breast ultrasound imaging technique to monitor the response of breast cancer patients who receive neoadjuvant chemotherapy (the systemic therapy of breast cancer before surgical therapy), as well as detecting new tumors which may arise during treatment. In this technique, the Support Vector Machine (SVM) algorithm is used for image classification, and the regionprops tool in Matlab is used for calculating the tumor size. SVM is a supervised learning method that is used for classification and regression predictive problems. In this work, SVM is considered as a binary classifier by which the abnormalities in the breast tissues can be distinguished, and then it can be determined whether these abnormalities are cancerous or not. To establish remote healthcare to monitor cancerous tumors treatments, telecommunication infrastructure through primarily Teleradiology and blockchain technology along with smart contract will be used. Blockchain technology is deemed as one of the main components of Bitcoin cryptocurrency. The smart contract concept is a collection of code that is governing something important or valuable in the blockchain. This remote healthcare will be achieved through specialized medical centers as well as technologies in patient homes. Based on prior research in the area of medical imaging techniques, the Support Vector Machines algorithm has the capability to achieve precise approximations with fast convergence. Additionally, the SVM algorithm has other features (e.g., it is computationally less expensive and yields good results based on strong mathematical foundations) which satisfy the best requirements of breast imaging technology.", acknowledgement = ack-nhfb, advisor = "Austin Melton", keywords = "0574:Medical imaging; 0984:Computer science; Applied sciences; Computer science; Health and environmental sciences; Medical imaging; Neoadjuvant chemotherapy; Svm algorithm; Telemedicine and blockchain; Ultrasound breast cancer imaging", ris-m1 = "10891755", } @Article{Sillaber:2017:LCS, author = "Christian Sillaber and Bernhard Waltl", title = "Life Cycle of Smart Contracts in Blockchain Ecosystems", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "8", pages = "497--500", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0819-7", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0819-7", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", } @InCollection{Sixt:2017:ADB, author = "Elfriede Sixt", title = "{Aktuelle Daten zur Bitcoin-{\"O}kosph{\"a}re}. ({German}) [{Current} data on the {Bitcoin} Ecosphere]", crossref = "Sixt:2017:BAD", pages = "17--28", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_3", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_3", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:B, author = "Elfriede Sixt", title = "{Bitcoin 2.0}", crossref = "Sixt:2017:BAD", pages = "163--171", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_13", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_13", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:BF, author = "Elfriede Sixt", title = "{Bitcoin und die Finanzindustrie}. ({German}) [{Bitcoin} and the financial industry]", crossref = "Sixt:2017:BAD", pages = "173--186", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_14", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_14", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:BZ, author = "Elfriede Sixt", title = "{Bitcoin als Zahlungsmittel}. ({German}) [{Bitcoin} as currency]", crossref = "Sixt:2017:BAD", pages = "77--89", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_7", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_7", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:E, author = "Elfriede Sixt", title = "{Ethereum}", crossref = "Sixt:2017:BAD", pages = "189--194", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_16", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 15:51:20 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_16", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:FBN, author = "Elfriede Sixt", title = "{Funktionsweise des Bitcoin-Netzwerks}. ({German}) [{How} the {Bitcoin} network works]", crossref = "Sixt:2017:BAD", pages = "29--44", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_4", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_4", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:GBK, author = "Elfriede Sixt", title = "{Die Gratis-Bitcoin-{\"O}kosph{\"a}re}. ({German}) [{The} free {Bitcoin} Ecosphere]", crossref = "Sixt:2017:BAD", pages = "141--144", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_11", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_11", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:LBS, author = "Elfriede Sixt", title = "{Limitationen des Bitcoin-Systems}. ({German}) [Limitations of {Bitcoin} systems]", crossref = "Sixt:2017:BAD", pages = "91--110", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_8", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_8", acknowledgement = ack-nhfb, language = "German", } @InCollection{Sixt:2017:LFL, author = "Elfriede Sixt", title = "{L{\"o}sungsans{\"a}tze f{\"u}r die Limitationen des Bitcoin-Systems}. ({German}) [{Solving} the limitations of the {Bitcoin} system]", crossref = "Sixt:2017:BAD", pages = "111--117", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2_9", ISBN = "3-658-02844-0", ISBN-13 = "978-3-658-02844-2", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-02844-2_9", acknowledgement = ack-nhfb, language = "German", } @InCollection{Solat:2017:BAZ, author = "Siamak Solat and Maria Potop-Butucaru", booktitle = "Stabilization, Safety, and Security of Distributed Systems", title = "Brief Announcement: {ZeroBlock}: Timestamp-Free Prevention of Block-Withholding Attack in {Bitcoin}", publisher = pub-SV, address = pub-SV:adr, pages = "356--360", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-69084-1_25", ISBN = "3-319-69084-1", ISBN-13 = "978-3-319-69084-1", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-69084-1_25", acknowledgement = ack-nhfb, } @Article{Sompolinsky:2017:BUI, author = "Yonatan Sompolinsky and Aviv Zohar", title = "{Bitcoin}'s Underlying Incentives", journal = j-QUEUE, volume = "15", number = "5", pages = "50:29--50:52", month = sep # "\slash " # oct, year = "2017", CODEN = "AQCUAE", DOI = "https://doi.org/10.1145/3155112.3168362", ISSN = "1542-7730 (print), 1542-7749 (electronic)", ISSN-L = "1542-7730", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/queue.bib", URL = "http://queue.acm.org/detail.cfm?id=3168362", abstract = "The unseen economic forces that govern the Bitcoin protocol.", acknowledgement = ack-nhfb, acmid = "3168362", articleno = "50", fjournal = "ACM Queue: Tomorrow's Computing Today", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J882", pagecount = "24", } @InProceedings{Spathoulas:2017:PPP, author = "Georgios Spathoulas and Paraskevi Vennou and Alexandros Loukidis", booktitle = "Proceedings of the 21st Pan-Hellenic Conference on Informatics", title = "Privacy Preserving Platform for Profitable Mobile Crowd Sensing and Users' Adoption", publisher = pub-ACM, address = pub-ACM:adr, pages = "30:1--30:6", year = "2017", DOI = "https://doi.org/10.1145/3139367.3139403", ISBN = "1-4503-5355-X", ISBN-13 = "978-1-4503-5355-7", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "PCI 2017", acknowledgement = ack-nhfb, acmid = "3139403", articleno = "30", keywords = "Bitcoin, mobile crowd sensing, privacy, survey", location = "Larissa, Greece", pagecount = "6", } @InProceedings{Sporny:2017:LDW, author = "Manu Sporny", booktitle = "{Proceedings of the 26th International Conference on World Wide Web Companion}", title = "{LD-DL'17 Workshop} Keynote Talk By {Many Sporny}: Building Better Blockchains Via Linked Data", publisher = "International World Wide Web Conferences Steering Committee", address = "Republic and Canton of Geneva, Switzerland", pages = "1429--1429", year = "2017", DOI = "https://doi.org/10.1145/3041021.3053899", ISBN = "1-4503-4914-5", ISBN-13 = "978-1-4503-4914-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WWW '17 Companion", acknowledgement = ack-nhfb, acmid = "3053899", keywords = "blockchain; digital signatures; domain modeling; graph normalization; http; json-ld; semantics", location = "Perth, Australia", pagecount = "1", } @InProceedings{Steger:2017:SWA, author = "Marco Steger and Ali Dorri and Salil S. Kanhere and Kay R{\"o}mer and Raja Jurdak and Michael Karner", booktitle = "{Advanced Microsystems for Automotive Applications 2017}", title = "Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept", publisher = pub-SV, address = pub-SV:adr, pages = "137--149", month = aug, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-66972-4_12", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-66972-4_12", acknowledgement = ack-nhfb, } @Misc{Stevens:2017:WBS, author = "M. M. J. Stevens", title = "Who broke the {SHA1} Algorithm (And What Does It Mean for {Bitcoin})?", howpublished = "Web document.", month = feb, year = "2017", bibdate = "Mon Dec 04 15:17:31 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://ir.cwi.nl/pub/26510", acknowledgement = ack-nhfb, } @Article{Stommel:2017:BOG, author = "Sebastian Stommel", title = "{Blockchain-{\"O}kosysteme}. ({German}) [{Blockchain} ecosystems]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "1", pages = "7--12", month = dec, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0716-0", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0716-0", acknowledgement = ack-nhfb, language = "German", } @InProceedings{Stoykov:2017:VFB, author = "Lyubomir Stoykov and Kaiwen Zhang and Hans-Arno Jacobsen", booktitle = "{Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos}", title = "{VIBES}: Fast Blockchain Simulations for Large-scale Peer-to-peer Networks: Demo", publisher = pub-ACM, address = pub-ACM:adr, pages = "19--20", year = "2017", DOI = "https://doi.org/10.1145/3155016.3155020", ISBN = "1-4503-5201-4", ISBN-13 = "978-1-4503-5201-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Middleware '17", URL = "http://doi.acm.org/10.1145/3155016.3155020", acknowledgement = ack-nhfb, acmid = "3155020", keywords = "blockchain; simulation", location = "Las Vegas, Nevada", pagecount = "2", } @InProceedings{Sun:2017:RCA, author = "Shi-Feng Sun and Man Ho Au and Joseph K. Liu and Tsz Hon Yuen", booktitle = "Computer Security --- {ESORICS 2017}", title = "{RingCT 2.0}: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero", publisher = pub-SV, address = pub-SV:adr, pages = "456--474", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-66399-9_25", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-66399-9_25", acknowledgement = ack-nhfb, } @InProceedings{Sutton:2017:BEP, author = "Andrew Sutton and Reza Samavi", booktitle = "{The Semantic Web --- ISWC 2017}", title = "Blockchain Enabled Privacy Audit Logs", publisher = pub-SV, address = pub-SV:adr, pages = "645--660", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-68288-4_38", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-68288-4_38", acknowledgement = ack-nhfb, } @InProceedings{Svetinovic:2017:BEI, author = "Davor Svetinovic", booktitle = "{Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security}", title = "Blockchain Engineering for the {Internet of Things}: Systems Security Perspective", publisher = pub-ACM, address = pub-ACM:adr, pages = "1--1", year = "2017", DOI = "https://doi.org/10.1145/3055245.3055256", ISBN = "1-4503-4969-2", ISBN-13 = "978-1-4503-4969-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IoTPTS '17", URL = "http://doi.acm.org/10.1145/3055245.3055256", acknowledgement = ack-nhfb, acmid = "3055256", keywords = "IoT, Bitcoin, blockchain, privacy, systems security, trust", location = "Abu Dhabi, United Arab Emirates", pagecount = "1", } @InProceedings{Tackmann:2017:SET, author = "Bj{\"o}rn Tackmann", title = "Secure Event Tickets on a Blockchain", crossref = "Garcia-Alfaro:2017:DPM", pages = "437--444", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_26", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_26", acknowledgement = ack-nhfb, } @Book{TakkalBataille:2017:BMA, author = "Adli {Takkal Bataille} and Jacques Favier and Jean-Joseph Goux", title = "{Bitcoin}, la monnaie ac{\'e}phale. ({French}) [{Bitcoin}: the headless currency]", publisher = "CNRS {\'e}ditions", address = "Paris, France", pages = "270", year = "2017", ISBN = "2-271-11554-X (paperback)", ISBN-13 = "978-2-271-11554-6 (paperback)", LCCN = "HG1710 .T34 2017", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, language = "French", subject = "Bitcoin; Electronic funds transfers; Currency question", } @Article{Taylor:2017:EBH, author = "Michael Bedford Taylor", title = "The Evolution of {Bitcoin} Hardware", journal = j-COMPUTER, volume = "50", number = "9", pages = "58--66", month = sep, year = "2017", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2017.3571056", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "https://www.computer.org/csdl/mags/co/2017/09/mco2017090058-abs.html", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "application specific integrated circuits; application-specific integrated circuit; ASIC; ASIC clouds; ASICMiner; AvalonBitFury; Bitmain; blockchain; Butterfly Labs; cloud; computer centres; cryptocurrencies; cryptocurrency; cryptography; Data mining; datacenter; datacenters; digital currency; Exchange rates; Field programmable gate arrays; financial technology; GPU; Graphics processing units; graphics processing units; Hardware; hardware; hashing; homebrew machines; planet-scale computing; {Bitcoin}; {Bitcoin} hardware", } @InCollection{Tech:2017:BTO, author = "Robin P. G. Tech and Konstanze E. K. Neumann and Wendelin Michel", booktitle = "{Interdisziplin{\"a}re Perspektiven zur Zukunft der Wertsch{\"o}pfung}", title = "Blockchain-Technologie und Open-Source- Sensornetzwerke", publisher = pub-SV, address = pub-SV:adr, pages = "93--108", month = dec, year = "2017", DOI = "https://doi.org/10.1007/978-3-658-20265-1_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/gnu.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-20265-1_8", acknowledgement = ack-nhfb, } @Article{Tessler:2017:BQC, author = "Louis Tessler and Tim Byrnes", title = "Bitcoin and quantum computing", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1711.04235; https://dblp.org/db/journals/corr/corr1711.html#abs-1711-04235", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1711-04235", dblp-mdate = "2018-08-13", } @InProceedings{Third:2017:LDI, author = "Allan Third and John Domingue", booktitle = "{Proceedings of the 26th International Conference on World Wide Web Companion}", title = "Linked Data Indexing of Distributed Ledgers", publisher = "International World Wide Web Conferences Steering Committee", address = "Republic and Canton of Geneva, Switzerland", pages = "1431--1436", year = "2017", DOI = "https://doi.org/10.1145/3041021.3053895", ISBN = "1-4503-4914-5", ISBN-13 = "978-1-4503-4914-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "WWW '17 Companion", acknowledgement = ack-nhfb, acmid = "3053895", keywords = "blockchains; distributed ledgers; linked data; semantic indexing", location = "Perth, Australia", pagecount = "6", } @InCollection{Tian:2017:CCT, author = "Haibo Tian and Jiejie He and Liqing Fu", booktitle = "{Information Security Practice and Experience}", title = "{Contract Coin}: Toward Practical Contract Signing on Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "43--61", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-72359-4_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-72359-4_3", acknowledgement = ack-nhfb, } @InProceedings{Tomescu:2017:CEN, author = "A. Tomescu and S. Devadas", booktitle = "2017 {IEEE} Symposium on Security and Privacy {(SP)}", title = "{Catena}: Efficient Non-equivocation via {Bitcoin}", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "393--409", month = may, year = "2017", DOI = "https://doi.org/10.1109/SP.2017.19", ISSN = "1081-6011 (print), 2375-1207 (electronic)", ISSN-L = "1081-6011", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7958589/", acknowledgement = ack-nhfb, keywords = "adversarial server; Bandwidth; bitcoinj library; Catena; CONIKS; efficiently-verifiable {Bitcoin} witnessing scheme; file servers; Java; key transparency scheme; nonequivocation; OP\_RETURN transaction chain; Prototypes; Public key; public key cryptography; public-key directory; Servers; Software; {Bitcoin}; {Bitcoin} blockchain", } @InProceedings{Tosh:2017:SIB, author = "Deepak K. Tosh and Sachin Shetty and Xueping Liang and Charles A. Kamhoua and Kevin A. Kwiat and Laurent Njilla", booktitle = "{Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing}", title = "Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "458--467", year = "2017", DOI = "https://doi.org/10.1109/CCGRID.2017.111", ISBN = "1-5090-6610-1", ISBN-13 = "978-1-5090-6610-0", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCGrid '17", acknowledgement = ack-nhfb, acmid = "3101175", keywords = "block mining; block withholding; Blockchain; blockchain security and vulnerability; cloud computing; data provenance; distributed ledger; pool mining; proof-of-work", location = "Madrid, Spain", pagecount = "10", } @InProceedings{Toyoda:2017:IHY, author = "Kentaroh Toyoda and Tomoaki Ohtsuki and P. Takis Mathiopoulos", editor = "{IEEE}", booktitle = "{GLOBECOM 2017 --- 2017 IEEE Global Communications Conference, 4--8 December 2017, Singapore}", title = "Identification of High Yielding Investment Programs in {Bitcoin} via Transactions Pattern Analysis", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = dec, year = "2017", DOI = "https://doi.org/10.1109/GLOCOM.2017.8254420", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Feature extraction; Investment; Pattern analysis; Roads", } @Article{Treleaven:2017:BTF, author = "Philip Treleaven and Richard Gendal Brown and Danny Yang", title = "Blockchain Technology in Finance", journal = j-COMPUTER, volume = "50", number = "9", pages = "14--17", month = sep, year = "2017", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Mon Oct 2 08:46:55 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "https://www.computer.org/csdl/mags/co/2017/09/mco2017090014.html", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @InProceedings{Urien:2017:TSB, author = "P. Urien", booktitle = "2017 Third International Conference on Mobile and Secure Services {(MobiSecServ)}", title = "Towards secure {Bitcoin} fast trading: Designing secure elements for digital currency", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--5", month = feb, year = "2017", DOI = "https://doi.org/10.1109/MOBISECSERV.2017.7886560", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/7886560/", acknowledgement = ack-nhfb, keywords = "Bitcoin; Blochchain; cryptography; digital currency; electronic money; financial data processing; Gold; Investment; Online banking; Production; Public key; secure element; Secure Elements; Security; Servers; transaction processing; {Bitcoin} fast trading; {Bitcoin} transaction", } @Article{Urquhart:2017:PCB, author = "Andrew Urquhart", title = "Price clustering in {Bitcoin}", journal = j-ECONOM-LETT, volume = "159", number = "??", pages = "145--148", month = oct, year = "2017", CODEN = "ECLEDS", ISSN = "0165-1765 (print), 1873-7374 (electronic)", ISSN-L = "0165-1765", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0165176517303233", acknowledgement = ack-nhfb, fjournal = "Economics Letters", journal-URL = "https://www.sciencedirect.com/science/journal/01651765", } @InProceedings{Vallois:2017:BTC, author = "Valentin Vallois and Fouad Amine Guenane", editor = "{IEEE}", booktitle = "{2017 1st Cyber Security in Networking Conference (CSNet), 18--20 October 2017, Rio de Janeiro, Brazil}", title = "{Bitcoin} transaction: From the creation to validation, a protocol overview", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--7", month = oct, year = "2017", DOI = "https://doi.org/10.1109/CSNET.2017.8241988", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Blockchain; Data structures; Database; Databases; Protocols; Public key; Standards; Transaction; Validation", } @InProceedings{vanderHeijden:2017:BSR, author = "Rens W. van der Heijden and Felix Engelmann and David M{\"o}dinger and Franziska Sch{\"o}nig and Frank Kargl", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "{Blackchain}: Scalability for Resource-constrained Accountable Vehicle-to-x Communication", publisher = pub-ACM, address = pub-ACM:adr, pages = "4:1--4:5", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152828", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152828", acknowledgement = ack-nhfb, acmid = "3152828", articleno = "4", keywords = "accountability; distributed ledger; VANET", location = "Las Vegas, Nevada", pagecount = "5", } @Article{VanDerHorst:2017:PMI, author = "L. {Van Der Horst} and K. K. R. Choo and N. A. Le-Khac", title = "Process Memory Investigation of the {Bitcoin} Clients {Electrum} and {Bitcoin Core}", journal = j-IEEE-ACCESS, volume = "5", number = "", pages = "22385--22398", year = "2017", DOI = "https://doi.org/10.1109/ACCESS.2017.2759766", ISSN = "2169-3536", ISSN-L = "2169-3536", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Access", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639", keywords = "Bitcoin; bitcoin client; bitcoin core; bitcoin forensics; cryptocurrency forensics; Digital forensics; electrum forensics; Forensics; memory forensics; Protocols; Public key; Software", } @InProceedings{Vasek:2017:BBD, author = "Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore", title = "The {Bitcoin} Brain Drain: Examining the Use and Abuse of {Bitcoin} Brain Wallets", crossref = "Jakobsson:2017:FCD", pages = "609--618", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54970-4_36", ISBN = "3-662-54970-0", ISBN-13 = "978-3-662-54970-4", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-54970-4_36", acknowledgement = ack-nhfb, } @PhdThesis{Vasek:2017:MBB, author = "Marie Vasek", title = "Measuring {Bitcoin}-Based Cybercrime", type = "{Ph.D.}", school = "The University of Tulsa", address = "Tulsa, OK, USA", pages = "99", year = "2017", ISBN = "1-369-72482-9", ISBN-13 = "978-1-369-72482-0", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1896552050", abstract = "Bitcoin is a decentralized, digital, public currency invented in 2009 by the pseudonymous Satoshi Nakamoto. The decentralized nature of the currency makes it attractive to fraudsters who can transact along with every other user. The digital nature makes it attractive for online businesses. The public nature makes it attractive for businesses who want to imbue trust in their customers as to their cash holdings. Unfortunately, the combination of these features also makes it ripe for cybercriminals. In turn, the public nature of the currency makes it feasible for researchers to be able to measure the prevalence and profits of attacks. We leverage the public nature of Bitcoin to measure cybercrime. First, we investigate distributed denial of service attacks carried out against various Bitcoin services. We find that Bitcoin currency exchanges, mining pools, gambling operators, online wallets, and financial services are much more likely to be attacked than other services. Next we present the first empirical analysis of Bitcoin-based scams: operations established with fraudulent intent. We find that at least \$11 million has been contributed to the scams from 13,000 distinct victims. Furthermore, we present evidence that the most successful scams depend on large contributions from a very small number of victims. We then investigate Ponzi schemes advertised on the Bitcoin forum and the ecosystem that perpetuates them. We find that the more scammers and victims post, the shorter the scam lifetime. Likewise, scams posted by users who register their account on the same day (39\% of the total) are found to be much shorter lived. Finally we analyze Bitcoin brain wallets --- Bitcoin secured by the hash of a password or passphrase. We find that most are depleted of money within a day, many within seconds of creation.", acknowledgement = ack-nhfb, advisor = "Tyler Moore", keywords = "0984:Computer science; Applied sciences; Bitcoin; Computer science; Currency exchanges; Cybercrime", ris-m1 = "10269183", } @InProceedings{Velner:2017:SCM, author = "Yaron Velner and Jason Teutsch and Loi Luu", title = "Smart Contracts Make {Bitcoin} Mining Pools Vulnerable", crossref = "Jakobsson:2017:FCD", pages = "298--316", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0_19", ISBN = "3-319-70278-5", ISBN-13 = "978-3-319-70278-0", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70278-0_19", acknowledgement = ack-nhfb, } @Article{Venkatakrishnan:2017:DRBa, author = "Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath", title = "{Dandelion}: Redesigning the Bitcoin Network for Anonymity", journal = "CoRR", volume = "abs/1701.04439", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1701.04439; https://dblp.org/db/journals/corr/corr1701.html#Venkatakrishnan17", acknowledgement = ack-nhfb, dblp-key = "journals/corr/Venkatakrishnan17", dblp-mdate = "2022-04-20", } @Article{Venkatakrishnan:2017:DRBb, author = "Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath", title = "{Dandelion}: Redesigning the {Bitcoin} Network for Anonymity", journal = j-SIGMETRICS, volume = "45", number = "1", pages = "57--57", month = jun, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3143314.3078528", ISBN = "1-4503-5032-1", ISBN-13 = "978-1-4503-5032-7", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Mon Sep 18 17:31:18 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", series = "SIGMETRICS '17 Abstracts", abstract = "Cryptocurrencies are digital currencies that provide cryptographic verification of transactions. In recent years, they have transitioned from an academic research topic to a multi-billion dollar industry. Bitcoin is the best-known example of a cryptocurrency. Cryptocurrencies exhibit two key properties: egalitarianism and transparency. In this context, egalitarianism means that no single party wields disproportionate power over the network's operation. This diffusion of power is achieved by asking other network nodes (e.g., other Bitcoin users) to validate transactions, instead of the traditional method of using a centralized authority for this purpose. Moreover, all transactions and communications are managed over a fully-distributed, peer-to-peer (P2P) network. Cryptocurrencies are transparent in the sense that all transactions are verified and recorded with cryptographic integrity guarantees; this prevents fraudulent activity like double-spending of money. Transparency is achieved through a combination of clever cryptographic protocols and the publication of transactions in a ledger known as a blockchain. This blockchain serves as a public record of every financial transaction in the network. A property that Bitcoin does not provide is anonymity. Each user is identified in the network by a public, cryptographic key. If one were to link such a key to its owner's human identity, the owner's financial history could be partially learned from the public blockchain. In practice, it is possible to link public keys to identities through a number of channels, including the networking protocols on which Bitcoin is built. This is a massive privacy violation, and can be dangerous for deanonymized users.", acknowledgement = ack-nhfb, acmid = "3078528", fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", keywords = "Bitcoin; cryptocurrency; network anonymity; peer-to-peer", location = "Urbana-Champaign, Illinois, USA", pagecount = "1", } @Article{Venkatakrishnan:2017:DRBc, author = "Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath", title = "{Dandelion}: Redesigning the {Bitcoin} Network for Anonymity", journal = j-POMACS, volume = "1", number = "1", pages = "22:1--22:34", month = jun, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3084459", ISSN = "2476-1249", ISSN-L = "2476-1249", bibdate = "Fri Jun 16 09:11:52 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/pomacs.bib", URL = "http://dl.acm.org/citation.cfm?id=3084459", abstract = "Bitcoin and other cryptocurrencies have surged in popularity over the last decade. Although Bitcoin does not claim to provide anonymity for its users, it enjoys a public perception of being a privacy preserving financial system. In reality, cryptocurrencies publish users' entire transaction histories in plaintext, albeit under a pseudonym; this is required for transaction validation. Therefore, if a user's pseudonym can be linked to their human identity, the privacy fallout can be significant. Recently, researchers have demonstrated deanonymization attacks that exploit weaknesses in the Bitcoin network's peer-to-peer (P2P) networking protocols. In particular, the P2P network currently forwards content in a structured way that allows observers to deanonymize users. In this work, we redesign the P2P network from first principles with the goal of providing strong, provable anonymity guarantees. We propose a simple networking policy called Dandelion which provides quasi-optimal, network-wide anonymity, with minimal cost to the network's utility. We also discuss practical implementation challenges and propose heuristic solutions.", acknowledgement = ack-nhfb, articleno = "22", fjournal = "Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)", journal-URL = "http://dl.acm.org/pub.cfm?id=J1567", } @InProceedings{Viswam:2017:EBF, author = "A. Viswam and G. Darsan", booktitle = "2017 International Conference on Circuit, Power and Computing Technologies {(ICCPCT)}", title = "An efficient {Bitcoin} fraud detection in social media networks", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--4", month = apr, year = "2017", DOI = "https://doi.org/10.1109/ICCPCT.2017.8074262", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/string-matching.bib", acknowledgement = ack-nhfb, keywords = "anonymous users; bitcoin concept; classifier; Data mining; Databases; efficient bitcoin fraud detection; extraction; Feature extraction; financial data processing; fraud; fraud identities; Friend Relationship User Identification; FRUI algorithm; identical users; Internet; Na{\"\i}ve-Bayes; pattern matching; preprocessing; Privacy; social media network sites; Social network services; social networking (online); social networking site; Training; transaction processing; {Bitcoin}", } @InProceedings{Vo:2017:BBD, author = "Hoang Tam Vo and Lenin Mehedy and Mukesh Mohania and Ermyas Abebe", booktitle = "{Proceedings of the 2017 ACM on Conference on Information and Knowledge Management}", title = "Blockchain-based Data Management and Analytics for Micro-insurance Applications", publisher = pub-ACM, address = pub-ACM:adr, pages = "2539--2542", year = "2017", DOI = "https://doi.org/10.1145/3132847.3133172", ISBN = "1-4503-4918-8", ISBN-13 = "978-1-4503-4918-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CIKM '17", URL = "http://doi.acm.org/10.1145/3132847.3133172", acknowledgement = ack-nhfb, acmid = "3133172", keywords = "blockchain; data analytics; data management; information management; information retrieval", location = "Singapore, Singapore", pagecount = "4", } @InProceedings{Vo:2017:VBR, author = "Nhi N. Y. Vo and Guandong Xu", editor = "{IEEE}", booktitle = "{2017 International Conference on Behavioral, Economic, Socio-cultural Computing (BESC), 16--18 October 2017, Krakow, Poland}", title = "The volatility of {Bitcoin} returns and its correlation to financial markets", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "1--6", month = oct, year = "2017", DOI = "https://doi.org/10.1109/BESC.2017.8256365", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Autoregressive processes; Bitcoin; Correlation; cryptocurrency; Exchange rates; statistical finance; Time series analysis; volatility modeling", } @Article{Vranken:2017:SBB, author = "Harald Vranken", title = "Sustainability of {Bitcoin} and blockchains", journal = "Current Opinion in Environmental Sustainability", volume = "28", number = "??", pages = "1--9", month = oct, year = "2017", CODEN = "????", ISSN = "1877-3435 (print), 1877-3443 (electronic)", ISSN-L = "1877-3435", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1877343517300015", acknowledgement = ack-nhfb, fjournal = "Current Opinion in Environmental Sustainability", } @InProceedings{Vukolic:2017:RPB, author = "Marko Vukoli{\'c}", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "Rethinking Permissioned Blockchains", publisher = pub-ACM, address = pub-ACM:adr, pages = "3--7", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055526", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055526", acknowledgement = ack-nhfb, acmid = "3055526", keywords = "blockchain; Byzantine fault-tolerance; consensus; hyperledger fabric; system architecture", location = "Abu Dhabi, United Arab Emirates", pagecount = "5", } @InProceedings{Wagner:2017:PDT, author = "Paul Wagner and Pascal Birnstill and Erik Krempel and Sebastian Bretthauer and J{\"u}rgen Beyerer", title = "Privacy Dashcam --- Towards Lawful Use of Dashcams Through Enforcement of External Anonymization", crossref = "Garcia-Alfaro:2017:DPM", pages = "183--201", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0_11", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67816-0_11", acknowledgement = ack-nhfb, } @InProceedings{Walker:2017:PPT, author = "Michael A. Walker and Abhishek Dubey and Aron Laszka and Douglas C. Schmidt", booktitle = "{Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things}", title = "{PlaTIBART}: A Platform for Transactive {IoT} Blockchain Applications with Repeatable Testing", publisher = pub-ACM, address = pub-ACM:adr, pages = "17--22", year = "2017", DOI = "https://doi.org/10.1145/3152141.3152392", ISBN = "1-4503-5170-0", ISBN-13 = "978-1-4503-5170-6", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "M4IoT '17", URL = "http://doi.acm.org/10.1145/3152141.3152392", acknowledgement = ack-nhfb, acmid = "3152392", keywords = "blockchain; design patterns; internet of things; testing", location = "Las Vegas, Nevada", pagecount = "6", } @InProceedings{Wan:2017:BCB, author = "Zhiyuan Wan and David Lo and Xin Xia and Liang Cai", booktitle = "{Proceedings of the 14th International Conference on Mining Software Repositories}", title = "Bug Characteristics in Blockchain Systems: A Large-scale Empirical Study", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "413--424", year = "2017", DOI = "https://doi.org/10.1109/MSR.2017.59", ISBN = "1-5386-1544-4", ISBN-13 = "978-1-5386-1544-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "MSR '17", acknowledgement = ack-nhfb, acmid = "3104238", location = "Buenos Aires, Argentina", pagecount = "12", } @Article{Wang:2017:ABS, author = "Qi Wang and Xiangxue Li and Yu Yu", title = "Anonymity for {Bitcoin} from Secure Escrow Address", journal = j-IEEE-ACCESS, volume = "??", number = "??", pages = "1--1", month = "????", year = "2017", DOI = "https://doi.org/10.1109/ACCESS.2017.2787563", ISSN = "2169-3536", ISSN-L = "2169-3536", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Access", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639", keywords = "Address Shuffling; Anonymity; Bitcoin; Distribute Key Generation; Encryption; Indexes; Privacy; Protocols; Public key", } @InProceedings{Wang:2017:BRC, author = "Hui Wang and Yuanyuan Cen and Xuefeng Li", booktitle = "{Proceedings of the 6th International Conference on Informatics, Environment, Energy and Applications}", title = "Blockchain Router: A Cross-Chain Communication Protocol", publisher = pub-ACM, address = pub-ACM:adr, pages = "94--97", year = "2017", DOI = "https://doi.org/10.1145/3070617.3070634", ISBN = "1-4503-5230-8", ISBN-13 = "978-1-4503-5230-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "IEEA '17", URL = "http://doi.acm.org/10.1145/3070617.3070634", acknowledgement = ack-nhfb, acmid = "3070634", keywords = "Blockchain technology; communication; economic model; network", location = "Jeju, Republic of Korea", pagecount = "4", } @Article{Wang:2017:DVP, author = "Huaqun Wang and Debiao He and Yimu Ji", title = "Designated-verifier proof of assets for {Bitcoin} exchange using elliptic curve cryptography", journal = j-FUT-GEN-COMP-SYS, volume = "??", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1731350X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2017:PTP, author = "Qin Wang and Bo Qin and Jiankun Hu and Fu Xiao", title = "Preserving transaction privacy in {Bitcoin}", journal = j-FUT-GEN-COMP-SYS, volume = "??", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318393", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @InProceedings{Warszawski:2017:ACR, author = "Todd Warszawski and Peter Bailis", booktitle = "Proceedings of the 2017 {ACM} International Conference on Management of Data", title = "{ACIDRain}: Concurrency-Related Attacks on Database-Backed {Web} Applications", publisher = pub-ACM, address = pub-ACM:adr, pages = "5--20", year = "2017", DOI = "https://doi.org/10.1145/3035918.3064037", ISBN = "1-4503-4197-7", ISBN-13 = "978-1-4503-4197-4", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SIGMOD '17", acknowledgement = ack-nhfb, acmid = "3064037", location = "Chicago, Illinois, USA", pagecount = "16", } @Book{Wattenhofer:2017:DLT, author = "Roger Wattenhofer", title = "Distributed ledger technology: the science of the blockchain", publisher = "Inverted Forest Publishing", address = "Aalborg, Danmark", edition = "Second revised", pages = "vi + 162", year = "2017", ISBN = "1-5442-3210-1", ISBN-13 = "978-1-5442-3210-2", LCCN = "????", bibdate = "Thu Nov 30 17:45:45 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, remark = "Literaturangaben.", subject = "Computersicherheit; Verteiltes Datenbanksystem; Regionalw{\"a}hrung; Bitcoin", } @Article{Wiefling:2017:ABA, author = "Stephan Wiefling and Luigi {Lo Iacono} and Frederik Sandbrink", title = "{Anwendung der Blockchain au{\ss}erhalb von Geldw{\"a}hrungen}. ({German}) [{Application} of blockchain outside cash currencies]", journal = "{Datenschutz und Datensicherheit --- DuD}", volume = "41", number = "8", pages = "482--486", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s11623-017-0816-x", ISSN = "1614-0702 (print), 1862-2607 (electronic)", ISSN-L = "1614-0702", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11623-017-0816-x", acknowledgement = ack-nhfb, fjournal = "{Datenschutz und Datensicherheit --- DuD}", journal-URL = "https://link.springer.com/journal/11623", language = "German", } @InCollection{Wijaya:2017:NBB, author = "Dimaz Ankaa Wijaya and Joseph K. Liu and Dony Ariadi Suwarsono and Peng Zhang", booktitle = "{Provable Security}", title = "A New Blockchain-Based Value-Added Tax System", publisher = pub-SV, address = pub-SV:adr, pages = "471--486", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-68637-0_28", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-68637-0_28", acknowledgement = ack-nhfb, } @MastersThesis{Wu:2017:DBL, author = "Haoyan Wu", title = "A Distributed Blockchain Ledger for Supply Chain", type = "{M.S.E.C.E.}", school = "Purdue University", address = "West Lafayette, IN, USA", pages = "68", year = "2017", ISBN = "0-355-30619-0", ISBN-13 = "978-0-355-30619-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/1980717693", abstract = "Affordable and reliable supply chain visibility is becoming increasingly important as the complexity of the network underlying supply chains is becoming orders of magnitudes higher compared to a decade ago. Moreover, this increase in complexity is starting to reflect on the cost of goods and their availability to the consumers. Optimizing the physical distribution phase in supply chain by providing increased visibility to trading partners can directly reduce product cost. Current supply chain information systems often lack the ability to cost-effectively relay ground truth information in near real time to all stakeholders and most importantly to the supplier and the customer during the transport of the shipment. This thesis presents a solution that addresses this gap through a distributed architecture. The solution enables small, medium and large businesses to interact in a dynamic and shipment-centric manner through a private blockchain sub-ledger that digitizes the transfer of custody for each shipment. Information in this private ledger is augmented by a public event ledger that reflects the movement of the shipment in real time. Third party monitors are engaged in the validation of the geolocation of the shipments by posting their physical proximity in the form of events to the public ledger.", acknowledgement = ack-nhfb, advisor = "Zina B. Miled", keywords = "0464:Computer Engineering; Applied sciences; Blockchain; Computer Engineering; Hybrid peer-to-peer; Ledgers; Nosql; Supply chain", ris-m1 = "10615112", } @Article{Wu:2017:SJB, author = "Qianhong Wu and Xiuwen Zhou and Bo Qin and Jiankun Hu and Jianwei Liu and Yong Ding", title = "Secure joint {Bitcoin} trading with partially blind fuzzy signatures", journal = j-SOFT-COMP, volume = "21", number = "11", pages = "3123--3134", month = dec, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s00500-015-1997-6", ISSN = "1195-3934", ISSN-L = "1195-3934", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s00500-015-1997-6", acknowledgement = ack-nhfb, fjournal = "Soft computing: newsletter of the {Canadian Society for Fuzzy Information and Neural Systems}", } @InCollection{Xia:2017:ETH, author = "Bingqing Xia and Dongyao Ji and Gang Yao", booktitle = "{Advances in Information and Computer Security}", title = "Enhanced {TLS} Handshake Authentication with Blockchain and Smart Contract (Short Paper)", publisher = pub-SV, address = pub-SV:adr, pages = "56--66", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-64200-0_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-64200-0_4", acknowledgement = ack-nhfb, } @InProceedings{Xing:2017:PBT, author = "Qianqian Xing and Baosheng Wang and Xiaofeng Wang", booktitle = "{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}", title = "Poster: {BGPCoin}: A Trustworthy Blockchain-based Resource Management Solution for {BGP} Security", publisher = pub-ACM, address = pub-ACM:adr, pages = "2591--2593", year = "2017", DOI = "https://doi.org/10.1145/3133956.3138828", ISBN = "1-4503-4946-3", ISBN-13 = "978-1-4503-4946-8", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CCS '17", URL = "http://doi.acm.org/10.1145/3133956.3138828", acknowledgement = ack-nhfb, acmid = "3138828", keywords = "bgp security; blockchain; origin authentication; rpki", location = "Dallas, Texas, USA", pagecount = "3", } @Article{Xu:2017:BBD, author = "Quanqing Xu and Chao Jin and Mohamed Faruq {Bin Mohamed Rasid} and Bharadwaj Veeravalli and Khin Mi Mi Aung", title = "Blockchain-based decentralized content trust for {Docker} images", journal = j-MULTIMEDIA-TOOLS-APPLIC, volume = "??", number = "??", month = oct, year = "2017", CODEN = "MTAPFB", DOI = "https://doi.org/10.1007/s11042-017-5224-6", ISSN = "1380-7501 (print), 1573-7721 (electronic)", ISSN-L = "1380-7501", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11042-017-5224-6", acknowledgement = ack-nhfb, fjournal = "Multimedia Tools and Applications", journal-URL = "https://link.springer.com/journal/11042", } @InCollection{Xu:2017:BBS, author = "Quanqing Xu and Khin Mi Mi Aung and Yongqing Zhu and Khai Leong Yong", booktitle = "New Advances in the {Internet of Things}", title = "A Blockchain-Based Storage System for Data Analytics in the {Internet of Things}", publisher = pub-SV, address = pub-SV:adr, pages = "119--138", month = jun, year = "2017", DOI = "https://doi.org/10.1007/978-3-319-58190-3_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Xu:2017:CBC, author = "Yuqin Xu and Qingzhong Li and Xingpin Min and Lizhen Cui and Zongshui Xiao and Lanju Kong", booktitle = "Collaborate Computing: Networking, Applications and Worksharing", title = "E-commerce Blockchain Consensus Mechanism for Supporting High-Throughput and Real-Time Transaction", publisher = pub-SV, address = pub-SV:adr, pages = "490--496", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-59288-6_46", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-59288-6_46", acknowledgement = ack-nhfb, } @InProceedings{Xu:2017:EHP, author = "Yuqin Xu and Shangli Zhao and Lanju Kong and Yongqing Zheng and Shidong Zhang and Qingzhong Li", booktitle = "Theoretical Aspects of Computing --- {ICTAC 2017}", title = "{ECBC}: A High Performance Educational Certificate Blockchain with Efficient Query", publisher = pub-SV, address = pub-SV:adr, pages = "288--304", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67729-3_17", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67729-3_17", acknowledgement = ack-nhfb, } @InProceedings{Xu:2017:ELU, author = "Lei Xu and Lin Chen and Zhimin Gao and Shouhuai Xu and Weidong Shi", booktitle = "{Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers}", title = "{EPBC}: Efficient Public Blockchain Client for Lightweight Users", publisher = pub-ACM, address = pub-ACM:adr, pages = "1:1--1:6", year = "2017", DOI = "https://doi.org/10.1145/3152824.3152825", ISBN = "1-4503-5173-5", ISBN-13 = "978-1-4503-5173-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SERIAL '17", URL = "http://doi.acm.org/10.1145/3152824.3152825", acknowledgement = ack-nhfb, acmid = "3152825", articleno = "1", keywords = "accumulator; blockchain; light weight client", location = "Las Vegas, Nevada", pagecount = "6", } @InProceedings{Xu:2017:ESE, author = "Lei Xu and Nolan Shah and Lin Chen and Nour Diallo and Zhimin Gao and Yang Lu and Weidong Shi", booktitle = "{Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts}", title = "Enabling the Sharing Economy: Privacy Respecting Contract Based on Public Blockchain", publisher = pub-ACM, address = pub-ACM:adr, pages = "15--21", year = "2017", DOI = "https://doi.org/10.1145/3055518.3055527", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "BCC '17", URL = "http://doi.acm.org/10.1145/3055518.3055527", acknowledgement = ack-nhfb, acmid = "3055527", keywords = "IoT; privacy; public blockchain; sharing economy", location = "Abu Dhabi, United Arab Emirates", pagecount = "7", } @Article{Yermack:2017:CGB, author = "David Yermack", title = "Corporate Governance and Blockchains", journal = j-REV-FINANCE, volume = "21", number = "1", pages = "7--31", month = mar, year = "2017", DOI = "https://doi.org/10.1093/rof/rfw074", ISSN = "1572-3097 (print), 1875-824X (electronic)", ISSN-L = "1572-3097", bibdate = "Sat Jan 20 16:55:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://academic.oup.com/rof/article/21/1/7/2888422", acknowledgement = ack-nhfb, fjournal = "Review of Finance", journal-URL = "https://academic.oup.com/rof/issue", } @InProceedings{Yin:2017:FEP, author = "Haohua Sun Yin and Ravi Vatrapu", editor = "{IEEE}", booktitle = "{2017 IEEE International Conference on Big Data (Big Data), 11--14 December 2017, Boston, MA, USA}", title = "A first estimation of the proportion of cybercriminal entities in the {Bitcoin} ecosystem using supervised machine learning", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "3690--3699", month = dec, year = "2017", DOI = "https://doi.org/10.1109/BigData.2017.8258365", bibdate = "Sun Jan 21 12:22:33 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; Blockchain; Cryptocurrency; Cybercrime; Ecosystem; Ecosystems; Machine Learning; Malware; Peer-to-peer computing; Public key; Ransomware; Supervised Learning", } @InProceedings{Yu:2017:FDA, author = "X. Yu and M. T. Shiwen and Y. Li and R. Deng Huijie", booktitle = "2017 {IEEE} Conference on Dependable and Secure Computing", title = "Fair deposits against double-spending for {Bitcoin} transactions", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "44--51", month = aug, year = "2017", DOI = "https://doi.org/10.1109/DESEC.2017.8073796", ISSN = "", bibdate = "Thu Nov 30 15:24:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, keywords = "Bitcoin; collusion attacks; Contracts; cryptographic primitive called accountable assertions; cryptography; decentralized nonequivocation contracts; deposit coins; design fair deposits; double spending; electronic money; Force; malicious payer; payer colludes; payer issues; Protocols; Public key; victim payee; {Bitcoin} credentials; {Bitcoin} deposit; {Bitcoin} network; {Bitcoin} transactions", } @InProceedings{Zamyatin:2017:SFS, author = "A. Zamyatin and K. Wolter and S. Werner and P. G. Harrison and C. E. A. Mulligan and W. J. Knottenbelt", booktitle = "2017 {IEEE 25th} International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS)}", title = "Swimming with Fishes and Sharks: Beneath the Surface of Queue-Based {Ethereum} Mining Pools", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "99--109", month = sep, year = "2017", DOI = "https://doi.org/10.1109/MASCOTS.2017.22", ISSN = "1526-7539 (print), 2375-0227 (electronic)", ISSN-L = "1526-7539", bibdate = "Thu Nov 30 15:21:10 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ieeexplore.ieee.org/document/8107436/", acknowledgement = ack-nhfb, keywords = "Analytical models; Bitcoin; Computational modeling; cryptocurrency; Data mining; Peer-to-peer computing; queueing model; Simulation; Writing", } @Article{Zhang:2017:IEB, author = "Yu Zhang and Jiangtao Wen", title = "The {IoT} electric business model: Using blockchain technology for the {Internet of Things}", journal = "Peer-to-Peer Networking and Applications", volume = "10", number = "4", pages = "983--994", month = jul, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s12083-016-0456-1", ISSN = "1936-6442 (print), 1936-6450 (electronic)", ISSN-L = "1936-6442", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s12083-016-0456-1", acknowledgement = ack-nhfb, journal-URL = "https://link.springer.com/journal/12083", } @InProceedings{Zhang:2017:NPB, author = "Ren Zhang and Bart Preneel", booktitle = "Proceedings of the 13th International Conference on Emerging Networking {EXperiments} and Technologies", title = "On the Necessity of a Prescribed Block Validity Consensus: Analyzing {Bitcoin} Unlimited Mining Protocol", publisher = pub-ACM, address = pub-ACM:adr, pages = "108--119", year = "2017", DOI = "https://doi.org/10.1145/3143361.3143389", ISBN = "1-4503-5422-X", ISBN-13 = "978-1-4503-5422-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CoNEXT '17", acknowledgement = ack-nhfb, acmid = "3143389", keywords = "Bitcoin Unlimited, cryptocurrency, incentive compatibility", location = "Incheon, Republic of Korea", pagecount = "12", } @InProceedings{Zhang:2017:PPB, author = "Ren Zhang and Bart Preneel", booktitle = "Topics in cryptology --- {CT-RSA 2017}", title = "Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in {Bitcoin}", volume = "10159", publisher = pub-SV, address = pub-SV:adr, pages = "277--292", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-52153-4_16", ISBN = "3-319-52152-7 (paperback), 3-319-52153-5 (e-book)", ISBN-13 = "978-3-319-52152-7 (paperback), 978-3-319-52153-4 (e-book)", MRclass = "94A60", MRnumber = "3630870", bibdate = "Mon Dec 4 12:18:39 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-52153-4_16", ZMnumber = "06705254", acknowledgement = ack-nhfb, } @Article{Zhao:2017:EOB, author = "J. Leon Zhao and Shaokun Fan and Jiaqi Yan", title = "Erratum to: {Overview of business innovations and research opportunities in blockchain and introduction to the special issue}", journal = "Financial Innovation", volume = "3", number = "1", month = may, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-017-0059-8", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See \cite{Zhao:2016:OBI}.", URL = "http://link.springer.com/article/10.1186/s40854-017-0059-8", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @Article{Zheng:2017:PHA, author = "Jianjun Zheng and Qian Lin and Jiatao Xu and Cheng Wei and Chuwei Zeng and Pingan Yang and Yunfan Zhang", title = "{PaxosStore}: high-availability storage made practical in {WeChat}", journal = j-PROC-VLDB-ENDOWMENT, volume = "10", number = "12", pages = "1730--1741", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.14778/3137765.3137778", ISSN = "2150-8097", ISSN-L = "2150-8097", bibdate = "Tue Oct 10 17:16:19 MDT 2017", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "In this paper, we present PaxosStore, a high-availability storage system developed to support the comprehensive business of WeChat. It employs a combinational design in the storage layer to engage multiple storage engines constructed for different storage models. PaxosStore is characteristic of extracting the Paxos-based distributed consensus protocol as a middleware that is universally accessible to the underlying multi-model storage engines. This facilitates tuning, maintaining, scaling and extending the storage engines. According to our experience in engineering practice, to achieve a practical consistent read/write protocol is far more complex than its theory. To tackle such engineering complexity, we propose a layered design of the Paxos-based storage protocol stack, where PaxosLog, the key data structure used in the protocol, is devised to bridge the programming-oriented consistent read/write to the storage-oriented Paxos procedure. Additionally, we present optimizations based on Paxos that made fault-tolerance more efficient. Discussion throughout the paper primarily focuses on pragmatic solutions that could be insightful for building practical distributed storage systems.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @Article{Zhu:2017:AIF, author = "Yechen Zhu and David Dickinson and Jianjun Li", title = "Analysis on the influence factors of {Bitcoin}'s price based on {VEC} model", journal = "Financial Innovation", volume = "3", number = "1", pages = "21--39", month = mar, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-017-0054-0", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See erratum \cite{Zhu:2017:EAI}.", URL = "http://link.springer.com/article/10.1186/s40854-017-0054-0", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @Article{Zhu:2017:EAI, author = "Yechen Zhu and David Dickinson and Jianjun Li", title = "Erratum to: {Analysis on the influence factors of Bitcoins price based on VEC model}", journal = "Financial Innovation", volume = "3", number = "1", pages = "??--??", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1186/s40854-017-0057-x", ISSN = "2199-4730", ISSN-L = "2199-4730", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See \cite{Zhu:2017:AIF}.", URL = "http://link.springer.com/article/10.1186/s40854-017-0057-x", acknowledgement = ack-nhfb, fjournal = "Financial Innovation", journal-URL = "https://jfin-swufe.springeropen.com/", } @Article{Ziegeldorf:2017:SAD, author = "Jan Henrik Ziegeldorf and Roman Matzutt and Martin Henze and Fred Grossmann and Klaus Wehrle", title = "Secure and anonymous decentralized {Bitcoin} mixing", journal = j-FUT-GEN-COMP-SYS, volume = "??", number = "??", pages = "??--??", month = "????", year = "2017", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X16301297", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @InProceedings{Zohar:2017:RTD, author = "Aviv Zohar", booktitle = "Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory of Computing", title = "Recent Trends in Decentralized Cryptocurrencies (Invited Talk)", publisher = pub-ACM, address = pub-ACM:adr, pages = "1--1", year = "2017", DOI = "https://doi.org/10.1145/3055399.3079074", ISBN = "1-4503-4528-X", ISBN-13 = "978-1-4503-4528-6", bibdate = "Fri Dec 1 12:47:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "STOC 2017", acknowledgement = ack-nhfb, acmid = "3079074", keywords = "Bitcoin, Cryptocurrencies", location = "Montreal, Canada", pagecount = "1", } @InCollection{Zolotavkin:2017:ICP, author = "Yevhen Zolotavkin and Julian Garc{\'\i}a and Carsten Rudolph", booktitle = "Decision and Game Theory for Security", title = "Incentive Compatibility of Pay Per Last {$N$} Shares in {Bitcoin} Mining Pools", publisher = pub-SV, address = pub-SV:adr, pages = "21--39", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-68711-7_2", ISBN = "3-319-68710-7 (paperback), 3-319-68711-5 (e-book)", ISBN-13 = "978-3-319-68710-0 (paperback), 978-3-319-68711-7 (e-book)", MRclass = "68P25 91A80", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-68711-7_2", ZMnumber = "06798996", acknowledgement = ack-nhfb, } @InProceedings{Zupan:2017:HDP, author = "Nejc Zupan and Kaiwen Zhang and Hans-Arno Jacobsen", booktitle = "{Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos}", title = "{Hyperpubsub}: A Decentralized, Permissioned, Publish\slash Subscribe Service Using Blockchains: Demo", publisher = pub-ACM, address = pub-ACM:adr, pages = "15--16", year = "2017", DOI = "https://doi.org/10.1145/3155016.3155018", ISBN = "1-4503-5201-4", ISBN-13 = "978-1-4503-5201-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Middleware '17", URL = "http://doi.acm.org/10.1145/3155016.3155018", acknowledgement = ack-nhfb, acmid = "3155018", keywords = "blockchain; hyperledger; kafka; publish/subscribe", location = "Las Vegas, Nevada", pagecount = "2", } @Misc{Abel:2018:HCE, author = "Robert Abel", title = "Hacked cryptocurrency exchange to reimburse customers after largest heist in history", howpublished = "Web story.", day = "29", month = jan, year = "2018", bibdate = "Tue Jan 30 14:30:13 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.scmagazine.com/tokyo-based-cryptocurrency-exchange-coincheck-sunday-told-customers-it-would-be-repaying-about-90-percent-of-stolen-funds/article/740219/", abstract = "Tokyo-based cryptocurrency exchange Coincheck Sunday told customers it would be repaying about 90 percent of the \$534 million worth of NEM coin stolen by hackers just two days prior in one of the largest crypto-heists.\par The firm said it would repay roughly 260,000 owners of the cryptocurrency in Japanese yen although the company is still working on how and when it will fulfill its promise, according to Reuters.", acknowledgement = ack-nhfb, remark = "From the end of the story: ``In a separate theft, hackers made off with at least \$150,000 Worth of Ethereum from Experty ICO, after cybercriminals tricked Experty ICO participants into sending Ethereum funds to the scammers wallet address.''", } @Misc{Abrams:2018:OBB, author = "Lawrence Abrams", title = "{Opera} Blocks In-Browser {CryptoCurrency} Mining in New Mobile Browser Versions", howpublished = "Web blog.", day = "22", month = jan, year = "2018", bibdate = "Tue Jan 23 12:32:04 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.bleepingcomputer.com/news/security/opera-blocks-in-browser-cryptocurrency-mining-in-new-mobile-browser-versions/", acknowledgement = ack-nhfb, remark = "From the story: ``Opera released new versions of their mobile browser today that blocks in-browser cryptocurrency mining as long as the built-in ad blocker is enabled. This feature has already been present in the desktop version of Opera since December \ldots{}''.", } @InCollection{Adams:2018:BGD, author = "Richard Adams and Beth Kewell and Glenn Parry", title = "Blockchain for Good? Digital Ledger Technology and Sustainable Development Goals", crossref = "LealFilho:2018:HSS", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-67122-2_7", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-67122-2_7", acknowledgement = ack-nhfb, } @MastersThesis{Al-Samaraee:2018:RPD, author = "Suray Al-Samaraee", title = "Reliable Platoon Data Provenance Using Blockchain", type = "{M.S.}", school = "Southern Illinois University at Carbondale", address = "Carbondale, IL, USA", pages = "91", year = "2018", ISBN = "0-438-91427-9", ISBN-13 = "978-0-438-91427-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2191129898", abstract = "This thesis proposes a unique adaptation of blockchain technology in information exchanges among various vehicle members traveling in a platoon. The main aim is to protect the privacy and security of platoon members while providing a quick sharing of telemetry data. A database schema is used alongside the proposed algorithm. To improve platoon security, blockchain cryptography is applied. The researcher has identified major protocols for a cryptographic authentication among vehicles travelling within a platoon. The algorithm of integrity and authentication is therefore proposed. The work gives consideration of the types of cyber-attack on platoons and their proposed remedies.", acknowledgement = ack-nhfb, advisor = "Henry Hexmoor", keywords = "0984:Computer science; Applied sciences; Computer science", ris-m1 = "10977806", } @MastersThesis{Aleshi:2018:SAM, author = "Ahrash Aleshi", title = "{Secure Aircraft Maintenance Records Using Blockchain (SAMR)}", type = "{M.Sc.C.}", school = "Embry-Riddle Aeronautical University", address = "Daytona Beach, FL, USA", pages = "71", year = "2018", ISBN = "0-355-85746-4", ISBN-13 = "978-0-355-85746-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2035443375", abstract = "We propose to enhance the security and transparency of aircraft maintenance records in the aviation industry through the use of blockchain technology. A physical aircraft maintenance logbook is susceptible to being lost or destroyed. A nonexistent aircraft maintenance logbook hurts the confidence in integrity and reputation of the aircraft. Furthermore, fraud can occur through forgery of FAA personnel signatures and the installation of non-official aircraft parts. The scope of this work is to develop a secure blockchain that can store aircraft service records and information in a digital distributed ledger. By keeping the maintenance logbook on a digital ledger, records can be stored indefinitely in a trusted environment with the integrity of records guaranteed. Additionally, to achieve being a distributed ledger, a consensus algorithm PoET is used to display the global state accurately to all users. The SAMR blockchain uses the Linux Foundations open sourced software ``Hyperledger'' to facilitate an environment that mimics a real-world implementation. The Python Programming Language was used for SAMR's implementation of the blockchain logic through creation of a permission-based blockchain for holding the maintenance records.", acknowledgement = ack-nhfb, advisor = "Remzi Seker", keywords = "0464:Computer Engineering; Applied sciences; Computer Engineering", ris-m1 = "10791528", } @Book{Alexander:2018:RXE, author = "Roman Alexander", title = "{Ripple und XRP f{\"u}r Einsteiger: Das Handbuch f{\"u}r den XRP-Coin und die Blockchain Technologie (Kryptow{\"a}hrungen)}. ({German}) [{Ripple} and {XRP} for Beginners: The Manual for the {XRP} coin and Blockchain technology (Crypto currencies)]", publisher = "????", address = "????", pages = "85 (est.)", year = "2018", ISBN = "1-976895-92-8", ISBN-13 = "978-1-976895-92-0", bibdate = "Wed Jan 24 16:28:03 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://crypto-pay.org", acknowledgement = ack-nhfb, language = "German", } @Article{Alharby:2018:BSF, author = "Maher Alharby and Aad van Moorsel", title = "{BlockSim}: a Simulation Framework for Blockchain Systems", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "135--138", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308956", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "Both in the design and deployment of blockchains many configuration choices need to be made. Investigating different implementation and design choices is not feasible or practical on real systems. Therefore, we propose BlockSim as a framework to build discrete-event dynamic system models for blockchain systems. BlockSim is organized in three layers: incentive layer, connector layer and system layer and is implemented in Python. This paper introduces BlockSim, with a particular emphasis on the modeling and simulation of block creation through the Proof of Work consensus algorithm.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @Article{Ali:2018:ZMN, author = "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen Lee and Feng Hao", title = "{ZombieCoin 2.0}: managing next-generation botnets using {Bitcoin}", journal = j-INT-J-INFO-SEC, volume = "??", number = "??", pages = "456--468", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-017-0379-8", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10207-017-0379-8", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @MastersThesis{Alvebrink:2018:IBA, author = "Johan {\"A}lvebrink", title = "Investigation of blockchain applicability to {Internet of Things} within supply chains", type = "{Master's}", school = "Uppsala Universitet", address = "Uppsala, Sweden", year = "2018", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2101259101", abstract = "Internet of Things (IoT) means that physical objects will be able to interact and communicate via embedded systems. This will lead to a distributed network of devices that can communicate with both humans and each other. One application area is in improving supply chain management. The goal in supply chains is to move a product or a service from the producer to the customer as efficient as possible. Implementation of IoT will have many benefits but it also raises security issues that can affect integrity, security and privacy for both individuals and companies.", acknowledgement = ack-nhfb, advisor = "Rickard Grassman and Olivia Dahlquist", keywords = "(UMI)AAI10986952; Social sciences", ris-m1 = "10986952", } @InProceedings{Amani:2018:TVE, author = "Sidney Amani and Myriam B{\'e}gel and Maksym Bortin and Mark Staples", booktitle = "{Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs}", title = "Towards Verifying {Ethereum} Smart Contract Bytecode in {Isabelle\slash HOL}", publisher = pub-ACM, address = pub-ACM:adr, pages = "66--77", year = "2018", DOI = "https://doi.org/10.1145/3167084", ISBN = "1-4503-5586-2", ISBN-13 = "978-1-4503-5586-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CPP 2018", URL = "http://doi.acm.org/10.1145/3167084", acknowledgement = ack-nhfb, acmid = "3167084", keywords = "blockchain; Ethereum; formal verification; Isabelle/HOL; smart contracts", location = "Los Angeles, CA, USA", pagecount = "12", } @MastersThesis{Andersson:2018:EBC, author = "Marcus Andersson", title = "Embracing blockchain: the challenges of collaborative innovation within the financial industry", type = "{Master's}", school = "Uppsala Universitet", address = "Uppsala, Sweden", year = "2018", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2101261427", abstract = "Creating standardized infrastructures for new technologies has become a frequent event in recent years, forcing competing firms to together collaborate in order to develop and mutually agree on a common standard. This is due to technologies such as blockchain (distributed ledger) technology that need interoperability to reach its full potential, making the collaboration aspect crucial for organizations that want to adapt to the technology. Therefore, this study's purpose is to identify and analyze the challenges of creating such a standardized infrastructure. A case study was used to analyze these challenges, which involved experts of blockchain technology and three Nordic banks connected to the blockchain consortium R3. First, a pre-study took place with the help of blockchain experts, who helped identify potential problems regarding blockchain (distributed ledger) technology. Secondly, a main study was conducted consisting of four interviews with key persons representing the banks, in addition to collecting secondary data via news articles, and press releases. With the help of co-opetition theory and a technical description of blockchain (distributed ledger) technology, an analytical model was developed to support the analysis of the data collection. The analysis focus on aspects of co-opetition drivers, co-opetition capabilities, co-opetition dynamics and blockchain aspects, which were used to showcase the challenges of collaborating on creating a standardized infrastructure. The result of this study highlights the importance of learning and educational aspects, the size of a cooperation and threats from other competing solutions, which generates challenges. In addition to the identified challenges, this study has also contributed to an understanding of how these aspects can come to affect a collaboration.", acknowledgement = ack-nhfb, advisor = "Leon Caesarius", keywords = "(UMI)AAI10986910; Social sciences", ris-m1 = "10986910", } @InProceedings{Aniello:2018:BBS, author = "Leonardo Aniello and Roberto Baldoni and Federico Lombardi", booktitle = "{Proceedings of 5th International Conference in Software Engineering for Defence Applications}", title = "A Blockchain-Based Solution for Enabling Log-Based Resolution of Disputes in Multi-party Transactions", publisher = pub-SV, address = pub-SV:adr, pages = "53--58", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-70578-1_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Advances in Intelligent Systems and Computing", URL = "http://link.springer.com/chapter/10.1007/978-3-319-70578-1_6", acknowledgement = ack-nhfb, } @Misc{Anonymous:2018:BFN, author = "Anonymous", title = "{Bitcoin} Full Node on {FreeBSD}", howpublished = "Web site.", year = "2018", bibdate = "Thu Mar 15 08:45:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://bsdmag.org/5374-2/", acknowledgement = ack-nhfb, tableofcontents = "What is a Bitcoin? \\ What is a Bitcoin Wallet? \\ What is a Blockchain? \\ What is Mining? \\ What is Pooled Mining? \\ What is a Full Node? \\ What is a Bitcoind? \\ How To Start Bitcoind To Be Full Node?", } @Article{Anonymous:2018:BOC, author = "Anonymous", title = "Bitcoin and other cryptocurrencies are useless: For blockchains, the jury is still out", journal = j-ECONOMIST, volume = "??", number = "??", pages = "??--??", day = "30", month = aug, year = "2018", CODEN = "EONOEH", ISSN = "0013-0613 (print), 1476-8860 (electronic)", ISSN-L = "0013-0613", bibdate = "Mon Sep 03 14:45:27 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.economist.com/leaders/2018/08/30/bitcoin-and-other-cryptocurrencies-are-useless", acknowledgement = ack-nhfb, fjournal = "The Economist", } @Misc{Anonymous:2018:BS, author = "Anonymous", title = "Blockchain size", howpublished = "Web chart.", month = jan, year = "2018", bibdate = "Tue Jan 23 10:57:32 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://blockchain.info/charts/blocks-size", acknowledgement = ack-nhfb, remark = "This site tracks the total size of Bitcoin block headers and transactions. On 23 January 2018, it reached 152,584 MB of data, and growth over the past year is almost linear.", } @Article{Anonymous:2018:CCH, author = "Anonymous", title = "Crypto-currencies hit by hacking attacks, theft and fraud", journal = j-NETWORK-SECURITY, volume = "2018", number = "2", pages = "1--2", month = feb, year = "2018", CODEN = "NTSCF5", ISSN = "1353-4858 (print), 1872-9371 (electronic)", ISSN-L = "1353-4858", bibdate = "Thu Sep 12 12:57:47 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/network-security.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1353485818300114", acknowledgement = ack-nhfb, fjournal = "Network Security", journal-URL = "https://www.sciencedirect.com/journal/network-security", } @Article{Anonymous:2018:CLV, author = "Anonymous", title = "Countries Look to Virtual Currencies to Sidestep Sanctions", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "3", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Feb 20 07:55:10 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/03/technology/russia-venezuela-virtual-currencies.html", abstract = "Russia and Venezuela have floated plans to make homegrown virtual currencies that would put them outside the global financial and banking system.", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Misc{Anonymous:2018:CMC, author = "Anonymous", title = "Cryptocurrency Market Capitalizations", howpublished = "Web site", month = jan, year = "2018", bibdate = "Tue Jan 23 10:59:06 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://coinmarketcap.com/", acknowledgement = ack-nhfb, remark = "This site reports dynamically updated financial summary data on almost 1500 digital currencies, sorted by descending market capitalization. The leader in that table on 23 January 2018 is Bitcoin (stock symbol BTC), with a market capitalization of USD 188B and a Bitcoin price of USD 11207. The next table entry is Ethereum, with a market capitalization of USD 97B, followed by Ripple with USD 53B, and Bitcoin Cash with USD 28B.", } @Misc{Anonymous:2018:GST, author = "Anonymous", title = "{Gibbard--Satterthwaite} theorem", howpublished = "Online encyclopedia article", year = "2018", bibdate = "Sun Jan 21 13:43:55 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://en.wikipedia.org/wiki/Gibbard%E2%80%93Satterthwaite_theorem", acknowledgement = ack-nhfb, remark = "From the introduction: ``In social choice theory, the Gibbard--Satterthwaite theorem is a result published independently by philosopher Allan Gibbard in 1973 and economist Mark Satterthwaite in 1975. It deals with deterministic ordinal electoral systems that choose a single winner.'' This may have relevance for some digital currencies when there are multiple candidates for ledger updates.", } @Misc{Anonymous:2018:IPA, author = "Anonymous", title = "{Iceland} police arrest suspected {Bitcoin} server thieves", howpublished = "BBC News Web story.", day = "5", month = mar, year = "2018", bibdate = "Tue Mar 06 14:26:58 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.bbc.com/news/technology-43288495", abstract = "Police in Iceland have arrested 11 people suspected of stealing more than 600 computers that were being used to mine crypto-currencies, reports AP.", acknowledgement = ack-nhfb, remark = "From the story: ``In February, Iceland's HS Orka power generation company said it was seeing an `exponential' rise in the amount of energy being used in these data centres to mine and verify crypto-currency transactions. For the first time, it said, the energy required for coin mining had exceeded that used by Iceland's 340,000 inhabitants to power their homes.''", } @Article{Anonymous:2018:KIO, author = "Anonymous", title = "{Kodak} to Issue Its Own Virtual Currency: {DealBook} Briefing", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "9", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Wed Jan 31 15:39:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/09/business/dealbook/jana-apple-tech.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Article{Anonymous:2018:NKB, author = "Anonymous", title = "{North Korea} blamed for {WannaCry}, {PoS} attacks and {Bitcoin} phishing", journal = j-NETWORK-SECURITY, volume = "2018", number = "1", pages = "1--2", month = jan, year = "2018", CODEN = "NTSCF5", ISSN = "1353-4858 (print), 1872-9371 (electronic)", ISSN-L = "1353-4858", bibdate = "Thu Sep 12 12:57:45 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/network-security.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1353485818300011", acknowledgement = ack-nhfb, fjournal = "Network Security", journal-URL = "https://www.sciencedirect.com/journal/network-security", } @Misc{Anonymous:2018:UUR, author = "Anonymous", title = "Urgent update regarding deposits of {NEM}", howpublished = "Web site.", day = "26", month = jan, year = "2018", bibdate = "Tue Jan 30 14:37:28 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://coincheck.com/en/blog/4673", abstract = "Depositing NEM on Coincheck is currently being restricted. Deposits made to your account will not be reflected in your balance, and we advise all users to refrain from making deposits until the restriction has been lifted.", acknowledgement = ack-nhfb, } @Article{Anonymous:2018:VCD, author = "Anonymous", title = "{Venezuela} Cryptocurrency to Draw Investment From {Turkey}, {Qatar} --- Official", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "16", month = feb, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Feb 20 07:51:10 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/reuters/2018/02/16/technology/16reuters-crypto-currency-venezuela.html", abstract = "Venezuela's new ``petro'' cryptocurrency will attract investments from Turkey, Qatar, the United States and Europe, the country's cryptocurrency regulator said on Friday.", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Article{Anta:2018:FID, author = "Antonio Fern{\'a}ndez Anta and Kishori Konwar and Chryssis Georgiou and Nicolas Nicolaou", title = "Formalizing and Implementing Distributed Ledger Objects", journal = j-SIGACT, volume = "49", number = "2", pages = "58--76", month = jun, year = "2018", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/3232679.3232691", ISSN = "0163-5700 (print), 1943-5827 (electronic)", bibdate = "Sun Jul 29 14:55:35 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", abstract = "Despite the hype about blockchains and distributed ledgers, formal abstractions of these objects are scarce1. To face this issue, in this paper we provide a proper formulation of a distributed ledger object. In brief, we define a ledger object as a sequence of records, and we provide the operations and the properties that such an object should support. Implementation of a ledger object on top of multiple (possibly geographically dispersed) computing devices gives rise to the distributed ledger object. In contrast to the centralized object, distribution allows operations to be applied concurrently on the ledger, introducing challenges on the consistency of the ledger in each participant. We provide the definitions of three well known consistency guarantees in terms of the operations supported by the ledger object: (1) atomic consistency (linearizability), (2) sequential consistency, and (3) eventual consistency. We then provide implementations of distributed ledgers on asynchronous message passing crash- prone systems using an Atomic Broadcast service, and show that they provide eventual, sequential or atomic consistency semantics respectively. We conclude with a variation of the ledger the validated ledger which requires that each record in the ledger satisfies a particular validation rule.", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @Article{Arnosti:2018:BNO, author = "Nick Arnosti and S. Matthew Weinberg", title = "Bitcoin: a Natural Oligopoly", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1811.08572; https://dblp.org/db/journals/corr/corr1811.html#abs-1811-08572", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1811-08572", dblp-mdate = "2018-11-26", } @MastersThesis{Banerjee:2018:DPM, author = "Agniva Banerjee", title = "Data Privacy Management Using Privacy Compliant Blockchain Structures", type = "{M.S.}", school = "University of Maryland, Baltimore County", address = "Baltimore County, MD, USA", pages = "82", year = "2018", ISBN = "0-438-41990-1", ISBN-13 = "978-0-438-41990-2", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2103904485", abstract = "An important requirement of any information management system is to protect data and resources against leak or improper modifications, while at the same time ensure data availability to legitimate users. Moreover, systems handling personal data must also track its provenance and be regularly audited to comply with regulations. By assuring auditable, privacy policy compliant actions, we can also guarantee that areas where privacy policies have been technically enforced are highlighted. As part of this thesis, we have built a novel framework to automatically track details about how a consumer's private data is stored, used and shared by a Cloud provider. We have created a semantically rich data privacy ontology and integrated it with the properties of blockchain, to develop an automated access-control and audit mechanism that enforces users' data privacy policies when sharing their data across third parties. Our blockchain based data-sharing solution addresses two of the most critical challenges specifically: transaction verification and permissioned data obfuscation. Our solution ensures accountability for data sharing in cloud, by incorporating a secure and efficient system for End-to-End provenance. We concur that decisions regarding the collection, sharing, and use of Personally Identifiable Information (PII) must take into account both ethical and privacy considerations.", acknowledgement = ack-nhfb, advisor = "Karuna Pande Joshi", keywords = "0984:Computer science; Applied sciences; Big-data; Blockchain; Computer science; Ontology; Privacy policy; Semantic web", ris-m1 = "10829123", } @Article{Barnett:2018:ADR, author = "Jeremy Barnett and Philip Treleaven", title = "Algorithmic Dispute Resolution --- The Automation of Professional Dispute Resolution Using {AI} and Blockchain Technologies", journal = j-COMP-J, volume = "61", number = "3", pages = "399--408", day = "1", month = mar, year = "2018", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/bxx103", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Fri Aug 3 11:54:12 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2010.bib", URL = "http://academic.oup.com/comjnl/article/61/3/399/4608879", acknowledgement = ack-nhfb, fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Misc{Barth:2018:CMS, author = "Bradley Barth", title = "{ComboJack} malware steals digital payments, cryptocurrency, by modifying info saved to clipboards", howpublished = "SC Magazine Web story.", day = "6", month = mar, year = "2018", bibdate = "Sat Mar 10 08:45:24 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.scmagazine.com/combojack-malware-steals-digital-payments-cryptocurrency-by-modifying-info-saved-to-clipboards/article/749086/", abstract = "Researchers have discovered a new malware that steals cryptocurrency and other electronic funds by surreptitiously modifying wallet or payment information whenever victims copy it to their devices' clipboards. Instead of pasting the same information that they just copied, victims instead unknowingly paste malicious wallet or payment information that was hard-coded into the malware; consequently, they end up sending funds to the cybercriminal instead of the intended party.", acknowledgement = ack-nhfb, } @Article{Beck:2018:BBR, author = "Roman Beck", title = "Beyond {Bitcoin}: The Rise of Blockchain World", journal = j-COMPUTER, volume = "51", number = "2", pages = "54--58", month = feb, year = "2018", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Mar 1 07:59:42 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", URL = "https://www.computer.org/csdl/mags/co/2018/02/mco2018020054.html", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @MastersThesis{Beegel:2018:IQC, author = "Ryan Beegel", title = "The Impact of Quantum Computing on Blockchain Security", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "47", year = "2018", ISBN = "0-355-90841-7", ISBN-13 = "978-0-355-90841-1", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2039675779", abstract = "The rise in popularity of cryptocurrencies such as Bitcoin has created a new target for malicious actors. At the same time, the significant breakthroughs in quantum computing have many security experts concerned about the impact these advanced machines can have on system security. The purpose of this research was to analyze the potential use of quantum computers to compromise the security of blockchain and technologies that rely on it such as Bitcoin. Multiple possible threats to blockchain exist and are outlined in this paper. These threats include Shor's Algorithm, Grover's Algorithm, and the design of blockchain itself. These threats all prove that with the right advancements in quantum computing power, blockchain security is at risk. Along with the threats, possible mitigating solutions are also outlined, including areas such as quantum resistant ledgers, building unified communities to resolve these issues, post-quantum RSA, and more. The research then also discusses alternatives to blockchain and what their advantages may be. These include technologies such as IOTA, Hashgraph, Byteball and more.", acknowledgement = ack-nhfb, advisor = "Christopher Riddell", keywords = "0489:Information Technology; 0984:Computer science; Applied sciences; Blockchain; Computer science; Cybersecurity; Information Technology; Public-key encryption; Quantum computing", ris-m1 = "10812382", } @PhdThesis{Bellinger:2018:RBM, author = "Matthew Bellinger", title = "The Rhetoric of {Bitcoin}: Money, Politics, and the Construction of Blockchain Communities", type = "{Ph.D.}", school = "University of Washington", address = "Seattle, WA, USA", pages = "223", year = "2018", ISBN = "0-438-86971-0", ISBN-13 = "978-0-438-86971-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2186898171", abstract = "The rise of Bitcoin and related digital currencies has been accompanied by a proliferation of discourse about these technologies, including debates about their value and status as forms of money. This dissertation examines digital currency discourse from a rhetorical perspective, and traces the development and impact of a key trope of early Bitcoin discourse-the application of commodity money rhetoric to Bitcoin-to understand the rhetorical construction of Bitcoin. It argues that early attempts to establish Bitcoin as a form of money, which figured Bitcoin as a ``natural'' entity beyond the reach of community politics, produced an unanticipated rhetorical fallout: the displacement of the politics of the Bitcoin community onto the development of Bitcoin as a technology. It further argues that this early displacement continues to influence the rhetorical dynamics of Bitcoin and its heirs by shaping subsequent debates over digital currency governance and valuation.", acknowledgement = ack-nhfb, advisor = "Christine Harold", keywords = "0459:Communication; 0626:Sociology; 0681:Rhetoric; Blockchain; Communication; Communication and the arts; Cryptocurrency; Digital currency; Language, literature and linguistics; Money; Rhetoric; Social sciences; Sociology", ris-m1 = "10932199", } @InCollection{Bhardwaj:2018:BTD, author = "Shweta Bhardwaj and Manish Kaushik", booktitle = "{Smart Computing and Informatics}", title = "Blockchain --- Technology to Drive the Future", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-981-10-5547-8_28", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-5547-8_28", acknowledgement = ack-nhfb, } @Misc{Biasini:2018:RWM, author = "Nick Biasini and Edmund Brumaghin and Warren Mercer and Josh Reynolds and Azim Khodijbaev and David Liebenberg", title = "Ransom Where? {Malicious} Cryptocurrency Miners Takeover, Generating Millions: The Dark Side of the Digital Gold Rush", howpublished = "Web article", day = "31", month = jan, year = "2018", bibdate = "Fri Feb 02 18:22:09 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://blog.talosintelligence.com/2018/01/malicious-xmr-mining.html", acknowledgement = ack-nhfb, } @Article{Blau:2018:PDS, author = "Benjamin M. Blau", title = "Price dynamics and speculative trading in {Bitcoin}", journal = "Research in International Business and Finance", volume = "43", number = "??", pages = "15--21", month = jan, year = "2018", CODEN = "????", ISSN = "0275-5319 (print), 1878-3384 (electronic)", ISSN-L = "0275-5319", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0275531917304750", acknowledgement = ack-nhfb, fjournal = "Research in International Business and Finance", } @InCollection{Blocher:2018:CSB, author = "Walter Blocher", booktitle = "{Entgrenzungen des Konsums}", title = "{C2B statt B2C? --- Auswirkungen von Blockchain, Smart Contracts \& Co. auf die Rolle des Verbrauchers}. ({German}) [{C2B} instead of {B2C}? --- Impact of Blockchain, Smart Contracts \& Co. on the role of the consumer]", publisher = pub-SV, address = pub-SV:adr, pages = "87--107", month = oct, year = "2018", DOI = "https://doi.org/10.1007/978-3-658-19339-3_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-19339-3_6", acknowledgement = ack-nhfb, language = "German", } @InCollection{Bocek:2018:SCB, author = "Thomas Bocek and Burkhard Stiller", title = "Smart Contracts --- Blockchains in the Wings", crossref = "Linnhoff-Popien:2018:DMU", year = "2018", DOI = "https://doi.org/10.1007/978-3-662-49275-8_19", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-49275-8_19", acknowledgement = ack-nhfb, } @Article{Boireau:2018:SBA, author = "Olivier Boireau", title = "Securing the blockchain against hackers", journal = j-NETWORK-SECURITY, volume = "2018", number = "1", pages = "8--11", month = jan, year = "2018", CODEN = "NTSCF5", DOI = "https://doi.org/10.1016/S1353-4858(18)30006-0", ISSN = "1353-4858 (print), 1872-9371 (electronic)", ISSN-L = "1353-4858", bibdate = "Thu Sep 12 12:57:45 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/network-security.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1353485818300060", acknowledgement = ack-nhfb, fjournal = "Network Security", journal-URL = "https://www.sciencedirect.com/journal/network-security", } @InCollection{Brunnler:2018:LBU, author = "Kai Br{\"u}nnler and Dandolo Flumini and Thomas Studer", booktitle = "{Logical Foundations of Computer Science}", title = "A Logic of Blockchain Updates", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-72056-2_7", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-72056-2_7", acknowledgement = ack-nhfb, } @Article{Buerkle:2018:KLG, author = "Tom Buerkle", title = "{Kodak} Last-Gasp Hope: {KodakCoin}", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "9", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Wed Jan 31 15:39:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/09/business/dealbook/kodak-bitcoin.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Book{Burniske:2018:CII, author = "Chris Burniske and Jack Tatar", title = "Cryptoassets: the innovative investor's guide to {Bitcoin} and beyond", publisher = pub-MCGRAW-HILL, address = pub-MCGRAW-HILL:adr, pages = "????", year = "2018", ISBN = "1-260-02667-1", ISBN-13 = "978-1-260-02667-2", LCCN = "HG1710 .B86 2018", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Bitcoin; Electronic funds transfers; Investments", } @Book{Campbell-Verduyn:2018:BBC, editor = "Malcolm Campbell-Verduyn", title = "{Bitcoin} and beyond: cryptocurrencies, blockchains and global governance", publisher = pub-ROUTLEDGE, address = pub-ROUTLEDGE:adr, pages = "????", year = "2018", ISBN = "0-415-79214-2 (hardcover), 1-315-21190-4 (e-book)", ISBN-13 = "978-0-415-79214-1 (hardcover), 978-1-315-21190-9 (e-book)", LCCN = "HG1710 .B545 2018", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "RIPE series in global political economy", acknowledgement = ack-nhfb, subject = "Bitcoin; Electronic funds transfers; Financial institutions; International finance", } @Article{Chatterjee:2018:BEI, author = "Jyotir Moy Chatterjee and Le Hoang Son and Srijani Ghatak and Raghvendra Kumar and Manju Khari", title = "{BitCoin} exclusively informational money: a valuable review from 2010 to 2017", journal = j-QUAL-QUANT, volume = "??", number = "??", pages = "191--198", month = "????", year = "2018", CODEN = "QQEJAV", DOI = "https://doi.org/10.1007/s11135-017-0605-5", ISSN = "0033-5177 (print), 1573-7845 (electronic)", ISSN-L = "0033-5177", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s11135-017-0605-5", acknowledgement = ack-nhfb, fjournal = "Quality \& Quantity", } @Article{Chen:2018:EBT, author = "Guang Chen and Bing Xu and Manli Lu and Nian-Shing Chen", title = "Exploring blockchain technology and its potential applications for education", journal = "Smart Learning Environments", volume = "5", number = "1", month = jan, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1186/s40561-017-0050-x", ISSN = "", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1186/s40561-017-0050-x", acknowledgement = ack-nhfb, } @Article{Chen:2018:TCA, author = "Rui-Yang Chen", title = "A traceability chain algorithm for artificial neural networks using {T-S} fuzzy cognitive maps in blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "80", number = "??", pages = "198--210", month = mar, year = "2018", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Sat Dec 2 16:58:42 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1730064X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Chen:2018:TMI, author = "Lin Chen and Lei Xu and Zhimin Gao and Yang Lu and Weidong Shi", title = "Tyranny of the Majority: On the {(Im)possibility} of Correctness of Smart Contracts", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "30--37", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111240", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040030-abs.html", acknowledgement = ack-nhfb, journal-URL = "https://publications.computer.org/security-and-privacy/", } @InCollection{Chen:2018:UVB, author = "Chen Chen and Zhuyun Qi and Yirui Liu and Kai Lei", booktitle = "{Smart Computing and Communication}", title = "Using Virtualization for Blockchain Testing", publisher = pub-SV, address = pub-SV:adr, pages = "289--299", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-73830-7_29", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", series = ser-LNCS, URL = "http://link.springer.com/chapter/10.1007/978-3-319-73830-7_29", acknowledgement = ack-nhfb, } @MastersThesis{Chiang:2018:BTC, author = "Chun-Wei Chiang", title = "Blockchain for Trustful Collaborations Between Immigrants, Citizens and Governments", type = "{M.S.}", school = "West Virginia University", address = "Morgantown, WV, USA", pages = "51", year = "2018", ISBN = "0-438-32088-3", ISBN-13 = "978-0-438-32088-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2102140616", abstract = "Immigrants usually are pro-social towards their hometowns and try to improve them. However, the lack of trust in their government can drive immigrants to work individually. As a result, their pro-social activities are usually limited in impact and scope. Although blockchain technology have the potential to solve the trust issue, people are not familiar with the technology and they have no idea why it is trustworthy. Previous research showed that the adopting user interface properly can increase people's trust in technology. This paper studies the interface factors that ease collaborations between immigrants and their home governments. We specifically focus on Mexican immigrants in the US who want to improve their rural communities. We identify that for Mexican immigrants having clear workflows of how their money flows and a sense of control over this workflow is important for collaborating with their government. Based on these findings, we create a blockchain based system for building trust between governments and immigrants by: (1) decentralizing the power of the government and giving more agency to citizens; (2) fighting corruption; and (3) enhancing fiscal transparency in community development projects. We finish by discussing design implications of our work and future directions.", acknowledgement = ack-nhfb, advisor = "Saiph Savage", keywords = "0984:Computer science; Applied sciences; Blockchain; Computer science; Empower; Mobile interface", ris-m1 = "10825287", } @Misc{Cimpanu:2018:MSC, author = "Catalin Cimpanu", title = "\$3.3 Million Stolen From {Coinsecure Bitcoin Exchange}, Inside Job Suspected", howpublished = "BleepingComputer Web story.", day = "12", month = apr, year = "2018", bibdate = "Mon Apr 16 14:22:26 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.bleepingcomputer.com/news/security/33-million-stolen-from-coinsecure-bitcoin-exchange-inside-job-suspected/", abstract = "The CEO of Coinsecure, an India-based cryptocurrency exchange, has accused his CSO of stealing 438 Bitcoin around \$3.3 million at today's exchange rate from the exchange's main wallet.\par Coinsecure announced the theft of the 438 BTC today, via two images posted on its homepage. The first image contained a statement signed by the Coinsecure team announcing the incident, and the second was a scanned copy of a police complaint Coinsecure CEO Mohit Kalra filed with New Delhi police.", acknowledgement = ack-nhfb, } @Misc{Cimpanu:2018:MSM, author = "Catalin Cimpanu", title = "{Microsoft} Stops Malware Campaign That Tried to Infect 400,000 Users in 12 Hours", howpublished = "BleepingComputer Web story.", day = "8", month = mar, year = "2018", bibdate = "Sat Mar 10 08:49:40 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.bleepingcomputer.com/news/security/microsoft-stops-malware-campaign-that-tried-to-infect-400-000-users-in-12-hours/", abstract = "Microsoft revealed today that Windows Defender stopped a massive malware distribution campaign that attempted to infect over 400,000 users with a cryptocurrency miner during a 12-hour period on March 6, 2018. The Redmond-based OS maker attributes the detections to computers infected with the Dofoil malware --- also known as Smoke Loader --- a popular malware downloader.", acknowledgement = ack-nhfb, } @Article{Conti:2018:ESR, author = "Mauro Conti and Ankit Gangwal and Sushmita Ruj", title = "On the economic significance of ransomware campaigns: a {Bitcoin} transactions perspective", journal = j-COMPUT-SECUR, volume = "79", number = "??", pages = "162--189", month = nov, year = "2018", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:46:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304334", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Conti:2018:SSP, author = "Mauro Conti and Sandeep Kumar E and Chhagan Lal and Sushmita Ruj", title = "A Survey on Security and Privacy Issues of Bitcoin", journal = "IEEE Commun. Surv. Tutorials", volume = "20", number = "4", pages = "3416--3452", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/COMST.2018.2842460", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/comsur/comsur20.html#ContiELR18", acknowledgement = ack-nhfb, dblp-key = "journals/comsur/ContiELR18", dblp-mdate = "2022-06-23", } @Article{Cross:2018:WMC, author = "Tim Cross", title = "What to make of cryptocurrencies and blockchains", journal = j-ECONOMIST, volume = "??", number = "??", pages = "??--??", day = "30", month = aug, year = "2018", CODEN = "EONOEH", ISSN = "0013-0613 (print), 1476-8860 (electronic)", ISSN-L = "0013-0613", bibdate = "Mon Sep 03 14:47:14 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.economist.com/technology-quarterly/2018/08/30/what-to-make-of-cryptocurrencies-and-blockchains", acknowledgement = ack-nhfb, fjournal = "The Economist", } @Article{Davidson:2018:BEI, author = "Sinclair Davidson and Primavera de Filippi and Jason Potts", title = "Blockchains and the Economic Institutions of Capitalism", journal = "Journal of Institutional Economics", volume = "??", number = "??", pages = "1--20", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1017/S1744137417000200", ISSN = "1744-1374 (print), 1744-1382 (electronic)", ISSN-L = "1744-1374", bibdate = "Sat Jan 20 17:02:42 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Institutional Economics", journal-URL = "https://www.cambridge.org/core/journals/journal-of-institutional-economics", remark = "In press: no volume/issue/pages assignment yet.", } @Misc{De:2018:UCM, author = "Nikhilesh De", title = "{US} City Mulls 18-Month Moratorium on {Bitcoin} Mining", howpublished = "Coindesk Web article.", day = "6", month = mar, year = "2018", bibdate = "Sat Mar 10 08:40:31 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.coindesk.com/us-city-mulls-18-month-moratorium-bitcoin-mining/", abstract = "A city in the U.S. state of New York could put an 18-month halt on new bitcoin mining operations in the area amid concerns from local officials. Plattsburgh, according to reports, is weighing a proposed law that would impose a ``moratorium on commercial mining operations'' until city officials can consider ``zoning and land use laws and municipal lightning department regulations.'' It was spurred by concerns over excessive power use in the area, drawn from Plattsburgh's access to hydroelectrical resources.", acknowledgement = ack-nhfb, } @Book{DeFilippi:2018:BLR, author = "Primavera {De Filippi} and Aaron Wright", title = "Blockchain and the law: the rule of code", publisher = pub-HARVARD, address = pub-HARVARD:adr, pages = "????", year = "2018", ISBN = "0-674-97642-8 (hardcover)", ISBN-13 = "978-0-674-97642-9 (hardcover)", LCCN = "QA76.9.D32 D44 2018", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "Blockchain technology enables the creation of decentralized currencies, decentralized applications powered by smart contracts, self-executing digital agreements, and intelligent assets that can be controlled over the Internet. Blockchains also enable the development of new governance systems with more democratic or participatory decision-making, and decentralized (autonomous) organizations that can operate over a network of computers without any human intervention. These applications have led many to compare the blockchain to the Internet, with accompanying predictions that this technology will shift the balance of power away from centralized authorities in the field of communications, business, and even politics or law. Blockchain and the Law explores the benefits and drawbacks of this emerging decentralized technology and argues that its widespread deployment will lead to expansion of what we term lex cryptographia: rules administered through self-executing smart contracts.", acknowledgement = ack-nhfb, subject = "Blockchains (Databases); Technology and law; Data encryption (Computer science); Internet in public administration", tableofcontents = "Part I. The technology: Blockchains, Bitcoin, and decentralized computing platforms \\ Characteristics of blockchains \\ Part II. Blockchains, finance, and contracts: Digital currencies and decentralized payment systems \\ Smart contracts as legal contracts \\ Smart securities and derivatives \\ Part III. Blockchains and information systems: Tamper-resistant, certified, and authenticated data \\ Resilient and tamper-resistant information systems \\ Part IV. Organizations and automation: The future of organizations \\ Decentralized autonomous organizations \\ Blockchain of things \\ Part V. Regulating decentralized, blockchain-based systems: Modes of regulation \\ Code as law", } @Article{Delgado-Segura:2018:BPK, author = "Sergi Delgado-Segura and Cristina P{\'e}rez-Sol{\`a} and Jordi Herrera-Joancomart{\'\i} and Guillermo Navarro-Arribas", title = "{Bitcoin} private key locked transactions", journal = j-INFO-PROC-LETT, volume = "140", number = "??", pages = "34--36", month = dec, year = "2018", CODEN = "IFPLAT", DOI = "https://doi.org/10.1016/j.ipl.2018.08.004", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Fri Sep 14 08:04:51 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0020019018301698", acknowledgement = ack-nhfb, fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", } @Article{Delgado-Segura:2018:TDB, author = "Sergi Delgado-Segura and Surya Bakshi and Cristina P{\'e}rez-Sol{\`a} and James Litton and Andrew Pachulski and Andrew Miller and Bobby Bhattacharjee", title = "{TxProbe}: Discovering Bitcoin's Network Topology Using Orphan Transactions", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1812.00942; https://dblp.org/db/journals/corr/corr1812.html#abs-1812-00942", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1812-00942", dblp-mdate = "2019-07-08", } @InCollection{Dhillon:2018:BD, author = "Vikram Dhillon and David Metcalf and Max Hooper", title = "Behold the Dreamers", crossref = "Dhillon:2018:BEA", pages = "1--5", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_1", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_1", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:BHC, author = "Vikram Dhillon and David Metcalf and Max Hooper", title = "Blockchain in Health Care", crossref = "Dhillon:2018:BEA", pages = "125--138", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_9", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:BS, author = "Vikram Dhillon and David Metcalf and Max Hooper", title = "Blockchain in Science", crossref = "Dhillon:2018:BEA", pages = "111--124", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_8", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_8", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:DH, author = "Vikram Dhillon and David Metcalf and Max Hooper", title = "The {DAO} Hacked", crossref = "Dhillon:2018:BEA", pages = "67--78", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_6", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_6", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:DO, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "Decentralized Organizations", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "47--66", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_5", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:ETH, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "{Ethereum} Tokens: High-Performance Computing", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "79--109", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_7", ISBN = "1-4842-3081-7", ISBN-13 = "978-1-4842-3081-7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_7", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:FB, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "Foundations of Blockchain", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "15--24", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_3", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:GRM, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "The Gold Rush: Mining {Bitcoin}", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "7--14", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_2", ISBN = "1-4842-3081-7", ISBN-13 = "978-1-4842-3081-7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_2", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:HP, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "The Hyperledger Project", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "139--149", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_10", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_10", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:RDB, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "Recent Developments in Blockchain", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "151--181", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_11", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_11", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:TRF, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "Technological Revolutions and Financial Capital", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "183--196", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_12", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_12", acknowledgement = ack-nhfb, } @InCollection{Dhillon:2018:UE, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "{Blockchain Enabled Applications}", title = "Unpacking {Ethereum}", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "25--45", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7_4", ISBN = "1-4842-3081-7", ISBN-13 = "978-1-4842-3081-7", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-1-4842-3081-7_4", acknowledgement = ack-nhfb, } @Article{DiFrancescoMaesa:2018:DDA, author = "Damiano {Di Francesco Maesa} and Andrea Marino and Laura Ricci", title = "Data-driven analysis of {Bitcoin} properties: exploiting the users graph", journal = "International Journal of Data Science and Analytics", volume = "??", number = "??", pages = "215--229", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s41060-017-0074-x", ISSN = "2364-4168", ISSN-L = "2364-415X", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s41060-017-0074-x", acknowledgement = ack-nhfb, } @Article{Dinh:2018:ABD, author = "Thang N. Dinh and My T. Thai", title = "{AI} and Blockchain: A Disruptive Integration", journal = j-COMPUTER, volume = "51", number = "9", pages = "48--53", month = sep, year = "2018", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2018.3620971", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Oct 11 14:15:10 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", URL = "https://www.computer.org/csdl/mags/co/2018/09/mco2018090048-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @PhdThesis{Dozier:2018:BBG, author = "Priya D. Dozier", title = "Banking on Blockchain: a Grounded Theory Study of the Innovation Evaluation Process", type = "{D.B.A.}", school = "University of South Florida", address = "Tampa, FL, USA", pages = "118", year = "2018", ISBN = "0-438-77912-6", ISBN-13 = "978-0-438-77912-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2167167651", abstract = "Blockchain technology emerged as the underlying database structure for Bitcoin, a cryptocurrency, in 2008. Interest in blockchain by the Financial Services industry grew because of its purported transparency, security, and trust elements which resulted in over \$240 million in venture capital funds raised by blockchain firms mostly from banks in the first half of 2017. The purpose of this study was to examine the underlying innovation evaluation process that Financial Services organizations employed as they evaluated blockchain technology. In this research study, blockchain was considered a technology innovation, which drove the research question: ``How do financial services organizations evaluate blockchain technology for potential use?'' The study followed the grounded theory methodology to address the research question by gathering data from semi-structured interviews of participants involved in the blockchain evaluation at Financial Services organizations. In total, 19 individuals representing 12 organizations participated in the study and provided insights into how their organizations are evaluating blockchain technology. Results indicated that organizations understand how the technology works, are organizing resources to evaluate it, are identifying use cases, and are employing strategies to test it. Together, these processes contribute to the creation of a Proof of Value model to explain the processes organizations are engaged in to evaluate blockchain. Academic and practical implications are noted as well as limitations and opportunities for future research.", acknowledgement = ack-nhfb, advisor = "Gaole Chen and Troy A. Montgomery", keywords = "0310:Business administration; 0454:Management; 0770:Banking; Banking; Blockchain; Business administration; Distributed ledger; Financial services; Grounded theory; Innovation; Management; Proof of value; Social sciences", ris-m1 = "10976164", } @Article{Dunphy:2018:FLI, author = "Paul Dunphy and Fabien A. P. Petitcolas", title = "A First Look at Identity Management Schemes on the Blockchain", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "20--29", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111247", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040020-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", } @Article{ElBansarkhani:2018:PSD, author = "Rachid {El Bansarkhani} and Matthias Geihs and Johannes Buchmann", title = "{PQChain}: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "57--65", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111246", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040057-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", } @InCollection{Epishkina:2018:DCH, author = "Anna Epishkina and Sergey Zapechnikov", booktitle = "{Biologically Inspired Cognitive Architectures (BICA) for Young Scientists}", title = "Discovering and Clustering Hidden Time Patterns in Blockchain Ledger", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-63940-6_35", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-63940-6_35", acknowledgement = ack-nhfb, } @MastersThesis{Escalante:2018:ORT, author = "Marty Escalante", title = "{Onion Router TOR}, Blockchain Technology and Cybercriminals", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "49", year = "2018", ISBN = "0-438-71164-5", ISBN-13 = "978-0-438-71164-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2154847289", abstract = "Investigators and Law Enforcement Agencies face many challenges when analyzing and investigating a cybercrime. Several of the difficulties encountered are a direct result of the creation of the anonymity software being freely available in the Internet. The purpose of this paper was to examine on how anonymity software such as the TOR Network, presents a challenge during a cybercrime investigation and how the tool is furnishing cybercriminals to successfully evade taxes, launder funds and infuse ransomware data online. The goal of this research is to bring awareness of the issue of anonymity tools, initially created to provide privacy, but with the evolution in technology and increase popularity of the Internet, hackers and cybercriminals have adopted this technology combined with cryptocurrencies peer-to-peer functionality such as Bitcoin, to remain hidden from law enforcement and investigators advance detection software.", acknowledgement = ack-nhfb, advisor = "Christopher Riddell and Duane Corbo", keywords = "0984:Computer science; Applied sciences; Blockchain; Computer science; Cryptocurrencies; Cybersecurity; Network anonymity; Onion router TOR; Riddel, Christopher", ris-m1 = "10982330", } @Article{Eyal:2018:MEB, author = "Ittay Eyal and Emin G{\"u}n Sirer", title = "Majority is not enough: Bitcoin mining is vulnerable", journal = j-CACM, volume = "61", number = "7", pages = "95--102", month = jul, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3212998", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jun 26 11:16:13 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2018/7/229033/fulltext", abstract = "The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners' revenue is larger than their fair share. The attack can have significant consequences for Bitcoin: Rational miners will prefer to join the attackers, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any coalition size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by a coalition that command less than 1/4 of the resources. This threshold is lower than the wrongly assumed 1/2 bound, but better than the current reality where a coalition of any size can compromise the system.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Misc{Farivar:2018:BTS, author = "Cyrus Farivar", title = "{Bitcoin} thirst spurs {Icelandic} heist --- {``Grand} theft on a scale unseen before''. ``{Everything} points to this being a highly organized crime,'' {Iceland} police say.", howpublished = "ArsTechnica Web site.", day = "2", month = mar, year = "2018", bibdate = "Tue Mar 06 14:31:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arstechnica.com/tech-policy/2018/03/bitcoin-thirst-spurs-icelandic-heist-grand-theft-on-a-scale-unseen-before/", abstract = "Eleven people have been arrested in Iceland as a result of what local media are calling the ``Big Bitcoin Heist'' --- 600 mining computers were recently stolen from Icelandic data centers in four separate burglaries between December 2017 and January 2018.", acknowledgement = ack-nhfb, } @Misc{Farivar:2018:CWW, author = "Cyrus Farivar", title = "{Coinbase}: We will send data on 13,000 users to {IRS}: {Bitcoin} startup says if concerned, ``seek legal advice from an attorney promptly''", howpublished = "Web article.", day = "26", month = feb, year = "2018", bibdate = "Tue Feb 27 16:25:43 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arstechnica.com/tech-policy/2018/02/coinbase-we-will-send-data-on-13000-users-to-irs/; https://support.coinbase.com/customer/portal/articles/2924446", abstract = "After over a year of legal wrangling, Coinbase has now formally notified its customers that it will be complying with a court order and handing over the user data for about 13,000 of its customers to the Internal Revenue Service. The company, which is one of the world's largest Bitcoin exchanges, sent out an email to the affected users on Friday, February 23.", acknowledgement = ack-nhfb, } @Misc{Firsh:2018:ZDV, author = "Alexey Firsh", title = "Zero-day vulnerability in {Telegram}: Cybercriminals exploited {Telegram} flaw to launch multipurpose attacks", howpublished = "Web story.", day = "13", month = feb, year = "2018", bibdate = "Fri Feb 16 17:03:58 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://securelist.com/zero-day-vulnerability-in-telegram/83800/", acknowledgement = ack-nhfb, remark = "This attack exploits a Unicode bidirectional command directive to reverse text for display, with the result that a string that displays as `xyzsj.png' (and thus appears to be a harmless PNG graphics file) is actually `xyzgnp.js', pointing to a JavaScript code file of malware.", } @Misc{Gallagher:2018:IHR, author = "Sean Gallagher", title = "Info-highway robbery --- Two new cryptocurrency heists make off with over \${400M} worth of blockchange. {Coincheck} sincerely apologizes for the inconvenience.", howpublished = "Web story", day = "26", month = jan, year = "2018", bibdate = "Tue Jan 30 14:40:13 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arstechnica.com/information-technology/2018/01/two-new-cryptocurrency-heists-make-off-with-over-400m-worth-of-blockchange/", acknowledgement = ack-nhfb, remark-01 = "From the story: ``This is the biggest theft in the history of the world.''.", remark-02 = "From the story: ``This latest theft comes a week after it was revealed that the relatively small sum of \$4 million worth of IOTA cryptocurrency had been stolen from investors wallets. \ldots{} What actually happened was a lot of unfortunate users were generating their unique seed (which is what you derive your password from) from a false website, a phishing website. \ldots{} That essentially means that they gave away their private key to a thief.", } @Article{Gatteschi:2018:BSC, author = "Valentina Gatteschi and Fabrizio Lamberti and Claudio Demartini and Chiara Pranteda and V{\'\i}ctor Santamar{\'\i}a", title = "Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough?", journal = j-FUTURE-INTERNET, volume = "10", number = "2", pages = "20", day = "20", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.3390/fi10020020", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:50:59 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/10/2/20", abstract = "Blockchain is receiving increasing attention from academy and industry, since it is considered a breakthrough technology that could bring huge benefits to many different sectors. In 2017, Gartner positioned blockchain close to the peak of inflated expectations, acknowledging the enthusiasm for this technology that is now largely discussed by media. In this scenario, the risk to adopt it in the wake of enthusiasm, without objectively judging its actual added value is rather high. Insurance is one the sectors that, among others, started to carefully investigate the possibilities of blockchain. For this specific sector, however, the hype cycle shows that the technology is still in the innovation trigger phase, meaning that the spectrum of possible applications has not been fully explored yet. Insurers, as with many other companies not necessarily active only in the financial sector, are currently requested to make a hard decision, that is, whether to adopt blockchain or not, and they will only know if they were right in 3-5 years. The objective of this paper is to support actors involved in this decision process by illustrating what a blockchain is, analyzing its advantages and disadvantages, as well as discussing several use cases taken from the insurance sector, which could easily be extended to other domains.", acknowledgement = ack-nhfb, } @Article{Gencer:2018:DBE, author = "Adem Efe Gencer and Soumya Basu and Ittay Eyal and Robbert van Renesse and Emin G{\"u}n Sirer", title = "Decentralization in Bitcoin and {Ethereum} Networks", journal = "CoRR", volume = "abs/1801.03998", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1801.03998; https://dblp.org/db/journals/corr/corr1801.html#abs-1801-03998", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1801-03998", dblp-mdate = "2020-04-01", } @Article{Genkin:2018:PDC, author = "Daniel Genkin and Dimitrios Papadopoulos and Charalampos Papamanthou", title = "Privacy in decentralized cryptocurrencies", journal = j-CACM, volume = "61", number = "6", pages = "78--88", month = jun, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3132696", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jun 5 14:47:04 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2018/6/228028/fulltext", abstract = "When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Georgiadis:2018:CPA, author = "Evangelos Georgiadis and Doron Zeilberger", title = "A Combinatorial-Probabilistic Analysis of Bitcoin Attacks", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1808.05255; https://dblp.org/db/journals/corr/corr1808.html#abs-1808-05255", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1808-05255", dblp-mdate = "2018-09-02", } @Article{Giechaskiel:2018:WCC, author = "Ilias Giechaskiel and Cas Cremers and Kasper B. Rasmussen", title = "When the Crypto in Cryptocurrencies Breaks: {Bitcoin} Security under Broken Primitives", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "46--56", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111253", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040046-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", } @MastersThesis{Girase:2018:PDV, author = "Rohan Girase", title = "Personal data vault management system and secured data access to service provider using blockchain technology", type = "{M.S.}", school = "University of Massachusetts Lowell", address = "Lowell, MA, USA", pages = "37", year = "2018", ISBN = "0-438-00636-4", ISBN-13 = "978-0-438-00636-2", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2050554654", abstract = "The usage of data sharing applications has been increasing dramatically. With the use of the Internet there lies a growing concern about information security and surveillance. Moreover, these systems require third-party intervention to authenticate and legitimatize transactions. These third parties collect and control the data, resulting in potential security breaches. It is certain that there is lack of trust among users. Some of these issues can be partially addressed by Blockchain technology. Blockchain is a peer-to-peer distributed ledger technology containing a continuously growing list of records, called blocks. Data is shared among peers in a way that each peer has an exact same copy of the data that is available on the Blockchain ledger. As the underlying infrastructure of cryptocurrencies in general, and Bitcoin in particular, Blockchain has demonstrated that trust and audit of transactions can be enforced using a decentralized network of peers sharing a public ledger. We propose a system that uses blockchain technology to implement automated access control of personal data without involving any third-party intervention. Bitcoin only stores currency transactions. Unlike Bitcoin, our system stores and shares a large variety of personal data on secured channels. The proposed system implements a protocol to maintain access control lists as permitted by the owner of the data. Thus, allowing users to own their personal data and control its sharing and access to it. In the future, this system can be applied to other applications in which multiple participants can trust the authenticity and validity of data even though they do not necessarily truest each other.", acknowledgement = ack-nhfb, advisor = "Haim Levkowitz", keywords = "0464:Computer Engineering; 0723:Information science; 0984:Computer science; Applied sciences; Bitcoin; Blockchain; Communication and the arts; Computer Engineering; Computer science; Cryptography; Hyperledger Fabric; Information science; Personal Data Vault; Secured Data Access", ris-m1 = "10836925", } @Misc{Goodin:2018:NBI, author = "Dan Goodin", title = "New botnet infects cryptocurrency mining computers, replaces wallet address: Attacker has generated about \$2,000 in digital coin so far in a scam that remains active.", howpublished = "ArsTechnica Web site.", day = "17", month = jan, year = "2018", bibdate = "Thu Feb 15 07:05:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arstechnica.com/information-technology/2018/01/in-the-wild-malware-preys-on-computers-dedicated-to-mining-cryptocurrency/", abstract = "Satori --- the malware family that wrangles routers, security cameras, and other Internet-connected devices into potent botnets --- is crashing the cryptocurrency party with a new variant that surreptitiously infects computers dedicated to the mining of digital coins.", acknowledgement = ack-nhfb, } @Article{Grech:2018:MSG, author = "Neville Grech and Michael Kong and Anton Jurisevic and Lexi Brent and Bernhard Scholz and Yannis Smaragdakis", title = "{MadMax}: surviving out-of-gas conditions in {Ethereum} smart contracts", journal = j-PACMPL, volume = "2", number = "OOPSLA", pages = "116:1--116:27", month = oct, year = "2018", DOI = "https://doi.org/10.1145/3276486", bibdate = "Sat Aug 8 07:56:30 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3276486", abstract = "Ethereum is a distributed blockchain platform, serving as an ecosystem for smart contracts: full-fledged inter-communicating programs that capture the transaction logic of an account. Unlike programs in mainstream languages, a gas limit restricts the execution of an Ethereum smart contract: execution proceeds as long as gas is available. Thus, gas is a valuable resource that can be manipulated by an attacker to provoke unwanted behavior in a victim's smart contract (e.g., wasting or blocking funds of said victim). Gas-focused vulnerabilities exploit undesired behavior when a contract (directly or through other interacting contracts) runs out of gas. Such vulnerabilities are among the hardest for programmers to protect against, as out-of-gas behavior may be uncommon in non-attack scenarios and reasoning about it is far from trivial. In this paper, we classify and identify gas-focused vulnerabilities, and present MadMax: a static program analysis technique to automatically detect gas-focused vulnerabilities with very high confidence. Our approach combines a control-flow-analysis-based decompiler and declarative program-structure queries. The combined analysis captures high-level domain-specific concepts (such as ``dynamic data structure storage'' and ``safely resumable loops'') and achieves high precision and scalability. MadMax analyzes the entirety of smart contracts in the Ethereum blockchain in just 10 hours (with decompilation timeouts in 8\% of the cases) and flags contracts with a (highly volatile) monetary value of over \$2.8B as vulnerable. Manual inspection of a sample of flagged contracts shows that 81\% of the sampled warnings do indeed lead to vulnerabilities, which we report on in our experiment.", acknowledgement = ack-nhfb, articleno = "116", fjournal = "Proceedings of the ACM on Programming Languages", journal-URL = "https://pacmpl.acm.org/", } @Article{Grunspan:2018:PBW, author = "C. Grunspan and R. Perez-Marco", title = "On profitability of block withholding strategies", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "126--126", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308953", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "We present recent developments in the understanding of the profitability block withholding strategies in Bitcoin mining and other Proof-of-Work based blockchains. Block withholding strategies (like selfish, stubborn, trailing or catch-up mining) are rogue mining strategies that violate the rules of the Bitcoin protocol. The authors found recently the exact model based on iterative games to evaluate the profitability per unit time. With a novel application of martingale techniques and Doob's Stopping Time Theorem we compute their profitability in close-form. We can then compare in parameter space these strategies and honest mining, and decide which one is more profitable.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @Article{Guo:2018:PST, author = "Tian Guo and Nino Antulov-Fantulin", title = "Predicting short-term Bitcoin price fluctuations from buy and sell orders", journal = "CoRR", volume = "abs/1802.04065", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1802.04065; https://dblp.org/db/journals/corr/corr1802.html#abs-1802-04065", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1802-04065", dblp-mdate = "2019-06-03", } @Article{Halaburda:2018:EBD, author = "Hanna Halaburda", title = "Economic and business dimensions: Blockchain revolution without the blockchain?", journal = j-CACM, volume = "61", number = "7", pages = "27--29", month = jul, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3225619", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jun 26 11:16:13 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2018/7/229049/fulltext", abstract = "Most of the suggested benefits of blockchain technologies do not come from elements unique to the blockchain.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @InCollection{Halim:2018:BSH, author = "Norul Suhaliana bt Abd Halim and Md Arafatur Rahman and Saiful Azad and Muhammad Nomani Kabir", booktitle = "{Recent Trends in Information and Communication Technology}", title = "Blockchain Security Hole: Issues and Solutions", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-59427-9_76", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-59427-9_76", acknowledgement = ack-nhfb, } @Article{Hammi:2018:BTD, author = "Mohamed Tahar Hammi and Badis Hammi and Patrick Bellot and Ahmed Serhrouchni", title = "Bubbles of Trust: a decentralized blockchain-based authentication system for {IoT}", journal = j-COMPUT-SECUR, volume = "78", number = "??", pages = "126--142", month = sep, year = "2018", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:46:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300890", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Hellemans:2018:MCM, author = "Tim Hellemans and Benny {Van Houdt} and Daniel S. Menasche and Mandar Datar and Swapnil Dhamal and Corinne Touati", title = "Mining competition in a multi-cryptocurrency ecosystem at the network edge: a congestion game approach", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "114--117", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308950", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "We model the competition over several blockchains characterizing multiple cryptocurrencies as a non-cooperative game. Then, we specialize our results to two instances of the general game, showing properties of the Nash equilibrium. In particular, leveraging results about congestion games, we establish the existence of pure Nash equilibria and provide efficient algorithms for finding such equilibria.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @Article{Henry:2018:BAP, author = "Ryan Henry and Amir Herzberg and Aniket Kate", title = "Blockchain Access Privacy: Challenges and Directions", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "38--45", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111245", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040038-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", } @InCollection{Hofmann:2018:BIWa, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Background {I} --- What Is Buyer-Led Supply Chain Finance?", crossref = "Hofmann:2018:SCF", pages = "7--23", month = aug, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_2", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:BIWb, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Background {II} --- What Is Reverse Securitisation?", crossref = "Hofmann:2018:SCF", pages = "25--34", month = aug, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_3", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_3", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:BIWc, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Background {III} --- What Is Blockchain Technology?", crossref = "Hofmann:2018:SCF", pages = "35--49", month = aug, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_4", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_4", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:BWBa, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Background {I} --- What Is Buyer-Led Supply Chain Finance?", crossref = "Hofmann:2018:SCF", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_2", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_2", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:CWC, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Conclusion --- What Can We Learn from Blockchain-Driven Supply Chain Finance?", crossref = "Hofmann:2018:SCF", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_7", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_7", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:CWO, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Concept --- Where Are the Opportunities of Blockchain-Driven Supply Chain Finance?", crossref = "Hofmann:2018:SCF", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_5", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_5", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:DHD, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Discussion --- How Does the Full Potential of Blockchain Technology in Supply Chain Finance Look Like?", crossref = "Hofmann:2018:SCF", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_6", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_6", acknowledgement = ack-nhfb, } @InCollection{Hofmann:2018:IWP, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", title = "Introduction --- Why to Pay Attention on Blockchain-Driven Supply Chain Finance?", crossref = "Hofmann:2018:SCF", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9_1", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62371-9_1", acknowledgement = ack-nhfb, } @Article{Holden:2018:WRF, author = "Richard Holden and Anup Malani", title = "Why the {I.R.S.} Fears {Bitcoin}", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "22", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Mon Jan 22 20:13:34 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/22/opinion/irs-bitcoin-fear.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Misc{Hollister:2018:TSP, author = "Sean Hollister", title = "Thieves steal 600 powerful bitcoin-mining computers in huge heist. {In} {Iceland}, police are hoping a power surge will lead them to the criminals' stash.", howpublished = "Web story.", day = "2", month = mar, year = "2018", bibdate = "Tue Mar 06 14:29:31 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.cnet.com/news/iceland-big-bitcoin-heist-cryptocurrency-mining-computers/", abstract = "600 powerful servers specifically designed to mine bitcoin. (What is bitcoin? Here's everything you need to know.) Plus 600 graphics cards, 100 processors, 100 power supplies, 100 motherboards and 100 sets of computer memory. According to The Associated Press and Visir, those are the items a coordinated group of Icelandic thieves has stolen. And though 11 people have reportedly been arrested and at least two are still in custody, none of the stolen computers have yet been found by police.", acknowledgement = ack-nhfb, } @InCollection{Hopf:2018:RBT, author = "Stefan Hopf and Arnold Picot", booktitle = "{Interdisziplin{\"a}re Perspektiven zur Zukunft der Wertsch{\"o}pfung}", title = "Revolutioniert Blockchain-Technologie das Management von Eigentumsrechten und Transaktionskosten?", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-658-20265-1_9", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-20265-1_9", acknowledgement = ack-nhfb, } @InCollection{Hsiao:2018:DVS, author = "Jen-Ho Hsiao and Raylin Tso and Chien-Ming Chen and Mu-En Wu", booktitle = "{Advances in Computer Science and Ubiquitous Computing}", title = "Decentralized E-Voting Systems Based on the Blockchain Technology", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-981-10-7605-3_50", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-7605-3_50", acknowledgement = ack-nhfb, } @Article{Huang:2018:BBF, author = "Hui Huang and Xiaofeng Chen and Qianhong Wu and Xinyi Huang and Jian Shen", title = "{Bitcoin}-based fair payments for outsourcing computations of fog devices", journal = j-FUT-GEN-COMP-SYS, volume = "78 (part 2)", number = "??", pages = "850--858", month = jan, year = "2018", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Sep 25 09:24:12 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X16307579", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ibba:2018:ICO, author = "Simona Ibba and Andrea Pinna and Maria Ilaria Lunesu and Michele Marchesi and Roberto Tonelli", title = "Initial Coin Offerings and Agile Practices", journal = j-FUTURE-INTERNET, volume = "10", number = "11", pages = "103", day = "23", month = oct, year = "2018", CODEN = "????", DOI = "https://doi.org/10.3390/fi10110103", ISSN = "1999-5903", ISSN-L = "1999-5903", bibdate = "Thu Nov 21 16:51:03 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/10/11/103", abstract = "An ICO (Initial Coin Offering) is an innovative way to fund projects based on blockchain. The funding is based on the selling of tokens by means of decentralized applications called smart contracts written in Solidity, a programming language specific for Ethereum blockchain. The ICOs work in a volatile context and it is crucial that the team is capable of handling constant changes. The Agile methods, proven practices enabling to develop software in presence of changing requirements, could be a means for managing uncertainty. The main goals of this work are to understand software engineering activities related to ICOs, recognize the ICOs developed using Agile methods, and make a comparison between ICOs and Agile ICOs. In addition, we perform a deeper analysis of Agile ICOs concerning project planning, software development, and code features. Our work shows that the roles of the people involved in an ICO can be compared to the typical roles of the SCRUM methodology. The majority of Agile ICOs use tool of testing before storing smart contract on blockchain. Finally, the application of volumetric and complexity software metrics shows that the files of Agile ICOs is on average shorter and less complex than in other smart contracts.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Ito:2018:BIS, author = "Joi Ito", title = "The Big {ICO} Swindle: Many cryptocurrency speculators are banking on the theory that someone dumber than them will buy their tokens for more than they paid. That's a pretty good bet \ldots{} until it isn't.", journal = j-WIRED, volume = "??", number = "??", pages = "??--??", day = "2", month = jan, year = "2018", CODEN = "WREDEM", ISSN = "1059-1028 (print), 1078-3148 (electronic)", ISSN-L = "1059-1028", bibdate = "Mon Feb 05 12:48:41 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.wired.com/story/ico-cryptocurrency-irresponsibility/", acknowledgement = ack-nhfb, fjournal = "Wired", journal-URL = "http://www.wired.com", keywords = "initial coin offering (ICO)", } @InProceedings{Jabbar:2018:IGI, author = "Karim Jabbar and Pernille Bj{\o}rn", booktitle = "{Proceedings of the 2018 ACM Conference on Supporting Groupwork}", title = "Infrastructural Grind: Introducing Blockchain Technology in the Shipping Domain", publisher = pub-ACM, address = pub-ACM:adr, pages = "297--308", year = "2018", DOI = "https://doi.org/10.1145/3148330.3148345", ISBN = "1-4503-5562-5", ISBN-13 = "978-1-4503-5562-9", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "GROUP '18", URL = "http://doi.acm.org/10.1145/3148330.3148345", acknowledgement = ack-nhfb, acmid = "3148345", keywords = "blockchain; embeddedness; entrepreneurship; information infrastructures; shipping; socio-technical; supply chain", location = "Sanibel Island, Florida, USA", pagecount = "12", } @Article{Jabbar:2018:PIV, author = "Karim Jabbar and Pernille Bj{\o}rn", title = "Permeability, Interoperability, and Velocity: Entangled Dimensions of Infrastructural Grind at the Intersection of Blockchain and Shipping", journal = j-TSC, volume = "1", number = "3", pages = "10:1--10:??", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3288800", ISSN = "2469-7818 (print), 2469-7826 (electronic)", bibdate = "Fri Dec 6 16:55:51 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tsc.bib", URL = "https://dl.acm.org/citation.cfm?id=3288800", abstract = "Blockchain can potentially be appropriated as a social computing technology, which enables transactions across people and artefacts via a large socio-technical information infrastructure constituted by the actions of multiple people and computers. However, Blockchain is not a social computing technology a priori; instead to emerge as one, much effort and work is required to radically transform existing domains, including wrestling with traditions, standards, and legacy. In this article, we expand on previous work on Blockchain as an information infrastructure, and on the notion of infrastructural grind. Infrastructural grind allows us to analytically explore how the emerging Blockchain technology is appropriated into established business domains, in our case the shipping industry. We present ethnographic data unpacking three different accounts of infrastructural grind taking place at the intersection of the shipping and the Blockchain information infrastructures. The results demonstrate that infrastructural grind occurs as a result of various infrastructuring activities taking place at different intersections between the two infrastructures and is constituted of the sum of these activities. We propose a framework in which infrastructural grind is constituted of three entangled dimensions: permeability, interoperability, and velocity. These socio-technical dimensions relate to infrastructural properties such as legacy, embeddedness, and standards, as well as to technical properties of specific solutions deployed at specific points of infrastructural grind. Our analysis shows that these dimensions are enacted differently along the shipping supply chain, and depending on the dynamic interplay between them at various points of infrastructural grind. At different points in time, the infrastructural grind between Blockchain and the shipping domain will thus manifest itself differently and at differential velocity.", acknowledgement = ack-nhfb, articleno = "10", fjournal = "ACM Transactions on Social Computing (TSC)", journal-URL = "http://dl.acm.org/pub.cfm?id=J1546", } @Article{Jain:2018:DOT, author = "Samvit Jain and Edward W. Felten and Steven Goldfeder", title = "Determining an optimal threshold on the online reserves of a bitcoin exchange", journal = "J. Cybersecur.", volume = "4", number = "1", pages = "tyy003", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1093/cybsec/tyy003", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cybersecurity/cybersecurity4.html#JainFG18", acknowledgement = ack-nhfb, dblp-key = "journals/cybersecurity/JainFG18", dblp-mdate = "2020-05-22", } @MastersThesis{Jassani:2018:BAE, author = "Nafisa Amir Ali Jassani", title = "Blockchain Application for Education", type = "{M.S.}", school = "University of Houston", address = "Houston, TX, USA", pages = "71", year = "2018", ISBN = "0-438-83972-2", ISBN-13 = "978-0-438-83972-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2186631083", abstract = "The contemporary job market continues to grow increasingly competitive. In this high-pressure environment, job-seekers may try to forge their qualifications in order to get ahead. There are many cases in which an employee is fired after it is discovered that they are unable to perform their jobs due to lying on their resumes. To avoid this, companies perform background checks. Considerable amount of time and money are spent in the process, causing inconvenience for both the recruiters and the applicants. This problem can be avoided if the details written on the profile of a graduating student applicant are independently recorded and corroborated by the educational institute and the employers themselves. In this work, I present an application that aims to achieve this by recording the student's qualications on Blockchain. The decentralized nature of blockchain enables the application to be used by users all over the globe. This suits the global nature of the job market and enables employers to even verify qualifications completed by an applicant in another country. Bitcoin, Ethereum, and Hyperledger are the most used technologies for developing Blockchain applications. Hyperledger supports the development of applications which have intangible assets. Additionally, the permissioned nature of the blockchain network makes Hyperledger suitable for developing this application. It ensures that only legitimate entities can join the network and checks to see that these entities are who they claim to be. The access control rules enable the users to perform only the functions they are authorized for. This application can be used by students not only to record their skills but also to request endorsements from verifiable sources. These endorsements may come from specific peers handpicked by the individual, they may also come from a selection of random peers, ensuring that the individual requesting the endorsement is not influencing them. This work also demonstrates the working of the application on both the playground and through the REST API.", acknowledgement = ack-nhfb, advisor = "Weidong Shi", keywords = "0984:Computer science; Against resume forging; Application; Applied sciences; Blockchain; Computer science; Education; Endorsements; Hyperledger; Permissioned network; Validation", ris-m1 = "13836644", } @Article{Javarone:2018:MDS, author = "Marco Alberto Javarone and Craig Steven Wright", title = "Modeling a Double-Spending Detection System for the Bitcoin Network", journal = "CoRR", volume = "abs/1809.07678", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1809.07678; https://dblp.org/db/journals/corr/corr1809.html#abs-1809-07678", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1809-07678", dblp-mdate = "2018-10-05", } @MastersThesis{Johnson:2018:BTS, author = "Josalyn Johnson", title = "Blockchain Technology Securing Healthcare Information and Technology", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "61", year = "2018", ISBN = "0-438-75732-7", ISBN-13 = "978-0-438-75732-5", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2163264294", abstract = "The purpose of this capstone research was to explore whether blockchain technology would be a viable solution to assist in securing for electronic protected health information (ePHI). Electronic protected information can come in the form of names, social security number, credit card information, and so on. All this information is of great value to cybercriminals that take advantage of a healthcare organizations weak security points. Protecting this information will protect the patients against fraud, abuse, and identity theft. This study gives a brief overview of what block chain is, how it is being utilized within other industries to secure information within those industries, and how it can be structured to secure ePHI. The literature found surrounding this top demonstrated that blockchain can be used to secure ePHI. The recommendations of this research if for the healthcare industry to collaborate and work with vendors utilizing blockchain to continue to find ways to implement blockchain as a security option.", acknowledgement = ack-nhfb, advisor = "Rampaul Hollington", keywords = "0489:Information Technology; Applied sciences; Blockchain technology; Electronic health records; Electronic medical records; Healthcare information technology; Information security; Information Technology", ris-m1 = "13423845", } @MastersThesis{Kadariya:2018:CBB, author = "Laxmi Kadariya", title = "Concurrency in Blockchain Based Smartpool with Transactional Memory", type = "{M.S.C.S.}", school = "University of Nevada, Las Vegas", address = "Las Vegas, NV, USA", pages = "75", year = "2018", ISBN = "0-438-46045-6", ISBN-13 = "978-0-438-46045-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2124203495", abstract = "Blockchain is the buzzword in today's modern technological world. It is an undeniably ingenious invention of the 21st century. Blockchain was first coined and used by a cryptocurrency named Bitcoin. Since then bitcoin and blockchain are so popular that every single person is taking on bitcoin these days and the price of bitcoin has leaped to a staggering price in the last year and so.Today several other cryptocurrencies have adapted the blockchain technology. Blockchain in cryptocurrencies is formed by chaining of blocks. These blocks are created by the nodes called miners through the process called Proof of Work(PoW). Mining Pools are formed as a collection of miners which collectively tries to solve a puzzle. However, most of the mining pools are centralized. P2Pool is the first decentralized mining pool in Bitcoin but is not that popular as the number of messages exchanged among the miners is a scalar multiple of the number of shares. SmartPool is a decentralized mining pool with the throughput equal to that of the traditional pool. However, the verification of blocks is done in a sequential manner. We propose a non-blocking concurrency mechanism in a decentralized mining pool for the verification of blocks in a blockchain. Smart contract in SmartPool is concurrently executed using a transactional memory approach without the use of locks. Since the SmartPool mining implemented in ethereum can be applied to Bitcoin, this concurrency method proposed in ethereum smart contracts can be applicable in Bitcoin as well.", acknowledgement = ack-nhfb, advisor = "Ajoy Kumar Datta", keywords = "0464:Computer Engineering; 0984:Computer science; Applied sciences; Computer Engineering; Computer science", ris-m1 = "10824582", } @Misc{Kanaracus:2018:CMM, author = "Christopher Kanaracus", title = "Crypto Miners May Be the `New Payload of Choice' for Attackers", howpublished = "Web article.", day = "1", month = feb, year = "2018", bibdate = "Fri Feb 02 18:18:14 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://blog.talosintelligence.com/2018/01/malicious-xmr-mining.html", abstract = "Ransomware has been a favorite and time-tested tool for cybercriminals, but the rise of cryptocurrency has given them a broad new target with key strategic advantages, leading to a sharp uptick in crypto mining botnets, researchers at Cisco Talos say.", acknowledgement = ack-nhfb, } @Article{Karame:2018:BSP, author = "Ghassan Karame and Srdjan Capkun", title = "Blockchain Security and Privacy", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "11--12", month = jul # "\slash " # aug, year = "2018", CODEN = "????", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040011.html", acknowledgement = ack-nhfb, journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", } @Misc{Kerner:2018:CRE, author = "Sean Michael Kerner", title = "{Cisco} Reveals the Economics of Crypto-Currency Mining Attacks", howpublished = "Web article.", day = "31", month = jan, year = "2018", bibdate = "Fri Feb 02 18:20:09 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.eweek.com/security/cisco-reveals-the-economics-of-crypto-currency-mining-attacks", acknowledgement = ack-nhfb, } @Misc{Kerner:2018:WUE, author = "Sean Michael Kerner", title = "Water Utility in {Europe} Hit by Cryptocurrency Malware Mining Attack: Unauthorized cryptocurrency mining attacks come to industrial control systems for the first time, as cryptojacking attacks continue to grow.", howpublished = "Web article", day = "7", month = feb, year = "2018", bibdate = "Thu Feb 15 07:07:32 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack", abstract = "Unauthorized cryptocurrency mining attacks, sometimes referred to as ``cryptojacking'' have found a new target operational technology used in critical industrial infrastructure. Security firm Radiflow, discovered that cryptocurrency mining malware was found in the network of a water utility provider in Europe. The attack is the first public discovery of an unauthorized cryptocurrency miner impacting industrial controls systems (ICS) or SCADA (supervisory control and data acquisition) servers.", acknowledgement = ack-nhfb, keywords = "Kfir; Monero cryptocurrency; Radiflow; Windows XP", } @Article{Khalilov:2018:SAP, author = "Merve Can Kus Khalilov and Albert Levi", title = "A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems", journal = "IEEE Commun. Surv. Tutorials", volume = "20", number = "3", pages = "2543--2585", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/COMST.2018.2818623", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/comsur/comsur20.html#KhalilovL18; https://www.wikidata.org/entity/Q111689117", acknowledgement = ack-nhfb, dblp-key = "journals/comsur/KhalilovL18", dblp-mdate = "2022-08-16", } @Article{Khan:2018:ISR, author = "Minhaj Ahmad Khan and Khaled Salah", title = "{IoT} security: Review, blockchain solutions, and open challenges", journal = j-FUT-GEN-COMP-SYS, volume = "82", number = "??", pages = "395--411", month = may, year = "2018", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.11.022", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Sun Feb 18 14:42:10 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X17315765", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @InCollection{Kim:2018:BBS, author = "Yoohwan Kim and Juyeon Jo", booktitle = "{Applied Computing \& Information Technology}", title = "Binary Blockchain: Solving the Mining Congestion Problem by Dynamically Adjusting the Mining Capacity", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-64051-8_3", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-64051-8_3", acknowledgement = ack-nhfb, } @InCollection{Knirsch:2018:PPS, author = "Fabian Knirsch and Andreas Unterweger and G{\"u}nther Eibl and Dominik Engel", booktitle = "{Sustainable Cloud and Energy Services}", title = "Privacy-Preserving Smart Grid Tariff Decisions with Blockchain-Based Smart Contracts", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62238-5_4", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-62238-5_4", acknowledgement = ack-nhfb, } @Article{Koops:2018:PCT, author = "David T. Koops", title = "Predicting the confirmation time of Bitcoin transactions", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1809.10596; https://dblp.org/db/journals/corr/corr1809.html#abs-1809-10596", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1809-10596", dblp-mdate = "2018-10-05", } @InCollection{Korschinowski:2018:BWB, author = "Sven Korschinowski and Maximilian Forster and Luca Reulecke", booktitle = "{Praxishandbuch Digital Banking}", title = "Blockchain --- wie Banken die Technologie aus Prozess- und Produkt-Sicht nutzen k{\"o}nnen", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-658-18890-0_13", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-658-18890-0_13", acknowledgement = ack-nhfb, } @Article{Kow:2018:ICP, author = "Yong Ming Kow and Caitlin Lustig", title = "Imaginaries and Crystallization Processes in Bitcoin Infrastructuring", journal = "Comput. Support. Cooperative Work.", volume = "27", number = "2", pages = "209--232", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s10606-017-9300-2", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cscw/cscw27.html#KowL18", acknowledgement = ack-nhfb, dblp-key = "journals/cscw/KowL18", dblp-mdate = "2020-06-05", } @Article{Krugman:2018:BBF, author = "Paul Krugman", title = "Bubble, Bubble, Fraud and Trouble", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "29", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Fri Feb 02 06:11:50 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/29/opinion/bitcoin-bubble-fraud.html", abstract = "The other day my barber asked me whether he should put all his money in Bitcoin. And the truth is that if he'd bought Bitcoin, say, a year ago he'd be feeling pretty good right now. On the other hand, Dutch speculators who bought tulip bulbs in 1635 also felt pretty good for a while, until tulip prices collapsed in early 1637.", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Article{Kshetri:2018:BEH, author = "Nir Kshetri", title = "Blockchain and Electronic Healthcare Records {[Cybertrust]}", journal = j-COMPUTER, volume = "51", number = "12", pages = "59--63", month = dec, year = "2018", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2018.2880021", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Tue Mar 12 08:32:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", URL = "https://ieeexplore.ieee.org/document/8636458/", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Kshetri:2018:BEV, author = "N. Kshetri and J. Voas", title = "Blockchain-Enabled E-Voting", journal = j-IEEE-SOFTWARE, volume = "35", number = "4", pages = "95--99", month = jul # "\slash " # aug, year = "2018", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2018.2801546", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Fri Aug 2 09:25:48 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", keywords = "ballot anonymously; BEV; Blockchain; blockchain-enabled e-voting; blockchains; cryptography; Cryptography; data privacy; e-voting; elections; Electronic voting; electronic voting; eligible voters; encrypted key; fraud; government data processing; Invited Content; online voting; paper ballots; software development; software engineering; tamper-proof personal ID; Urban areas; voter access; voter fraud; voter fraud reduction", } @Article{Kshetri:2018:CTV, author = "Nir Kshetri", title = "Cryptocurrencies: Transparency Versus Privacy [Cybertrust]", journal = j-COMPUTER, volume = "51", number = "11", pages = "99--111", month = nov, year = "2018", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Jan 30 18:07:16 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", URL = "https://www.computer.org/csdl/mags/co/2018/11/08625935.pdf", acknowledgement = ack-nhfb, journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @MastersThesis{Kuebler:2018:ABA, author = "Raymond G. Kuebler", title = "Application of Blockchain for Authentication, Verification of Identity and Cloud Computing", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "51", year = "2018", ISBN = "0-355-89289-8", ISBN-13 = "978-0-355-89289-5", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2038978132", abstract = "Blockchain has the potential to become a major force within the financial services industry by transforming the way information is secured within our expanding digitalized world. Blockchain provides added security through the authentication of peers that share virtual cash, encryption and the generation of hash values. Blockchain is the foundation on which the popular bitcoin platform is built on and is a technology that efficiently organizes and secures data so that it can ultimately reduce cost, enhance portability of data stored, minimize data duplication, and improve execution and the overall complexity of transactions. For example, one of the greatest obstacles in migrating services online is the ability to secure the data and verifies the identity of the users; for online authentication commonly relies on a password or the use of dual-factor authentication. This presents a problem because passwords are notoriously insecure and sometimes requires sending a code to a third party or a short message service (SMS) to the institution. However, the solution to this problem is blockchain. Blockchain may possibly be the enabling technology that transforms how transactions are recorded and transferred, without the complexity of requiring third-party attestations. Cloud computing has also been adopted within many financial institutions for its efficiency and availability. This capstone project will not only discuss the concept of blockchain technology within a financial institution and its security solutions (i.e., authentication, know-your-customer, anti-money-laundering) but blockchain technology adaption into the security of cloud computing.", acknowledgement = ack-nhfb, advisor = "Kyung-Seok Choo", keywords = "0272:Accounting; 0508:Finance; 0770:Banking; Accounting; Banking; Blockchain technology; Compliance management; Distributed ledgers; Economic crime; Electric wallet; Finance; Financial crime; Social sciences", ris-m1 = "10811865", } @Article{Kugler:2018:NWC, author = "Logan Kugler", title = "News: Why cryptocurrencies use so much energy: and what to do about it", journal = j-CACM, volume = "61", number = "7", pages = "15--17", month = jul, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3213762", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jun 26 11:16:13 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2018/7/229045/fulltext", abstract = "The electricity consumption of mining for cryptocurrencies is becoming a real concern. Here's what to do about it.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Kuzuno:2018:AHA, author = "Hiroki Kuzuno and Giannis Tziakouris", title = "Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement", journal = "IEICE Trans. Inf. Syst.", volume = "101-D", number = "11", pages = "2644--2657", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1587/transinf.2017ICP0007", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.ieice.org/bin/summary.php?id=e101-d_11_2644; https://dblp.org/db/journals/ieicet/ieicet101d.html#KuzunoT18", acknowledgement = ack-nhfb, dblp-key = "journals/ieicet/KuzunoT18", dblp-mdate = "2020-04-11", } @Article{Lahmiri:2018:CRM, author = "Salim Lahmiri and Stelios Bekiros", title = "Chaos, randomness and multi-fractality in {Bitcoin} market", journal = j-CHAOS-SOLITONS-FRACTALS, volume = "106", number = "??", pages = "28--34", month = jan, year = "2018", CODEN = "CSFOEH", ISSN = "0960-0779 (print), 1873-2887 (electronic)", ISSN-L = "0960-0779", bibdate = "Fri Dec 1 11:14:22 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0960077917304605", acknowledgement = ack-nhfb, fjournal = "Chaos, Solitons \& Fractals", } @Article{Lambrecht:2018:AVG, author = "Maxime Lambrecht and Louis Larue", title = "After the (virtual) gold rush: is Bitcoin more than a speculative bubble?", journal = "Internet Policy Rev.", volume = "7", number = "4", pages = "??--??", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.14763/2018.4.1353", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/intpolrev/intpolrev7.html#LambrechtL18", acknowledgement = ack-nhfb, dblp-key = "journals/intpolrev/LambrechtL18", dblp-mdate = "2022-10-02", } @Article{Lee:2018:GSB, author = "Kamwoo Lee and Sinan Ulkuatam and Peter A. Beling and William T. Scherer", title = "Generating Synthetic Bitcoin Transactions and Predicting Market Price Movement Via Inverse Reinforcement Learning and Agent-Based Modeling", journal = "J. Artif. Soc. Soc. Simul.", volume = "21", number = "3", pages = "??--??", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.18564/jasss.3733", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jasss/jasss21.html#LeeUBS18", acknowledgement = ack-nhfb, dblp-key = "journals/jasss/LeeUBS18", dblp-mdate = "2020-07-09", } @Article{Lima:2018:DOI, author = "Claudio Lima", title = "Developing Open and Interoperable {DLT}\slash Blockchain Standards [Standards]", journal = j-COMPUTER, volume = "51", number = "11", pages = "106--111", month = nov, year = "2018", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Jan 30 18:07:16 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", URL = "https://www.computer.org/csdl/mags/co/2018/11/08625908.pdf", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Lin:2018:BBB, author = "Chao Lin and Debiao He and Xinyi Huang and Kim-Kwang Raymond Choo and Athanasios V. Vasilakos", title = "{BSeIn}: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0", journal = j-J-NETW-COMPUT-APPL, volume = "116", number = "??", pages = "42--52", day = "15", month = aug, year = "2018", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:25 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804518301619", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Linnhoff-Popien:2018:B, author = "Claudia Linnhoff-Popien", title = "1. Blockchain", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "24--25", month = "", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s42354-018-0007-4", ISSN = "2510-3008", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s42354-018-0007-4", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Linnhoff-Popien:2018:BG, author = "Claudia Linnhoff-Popien and Aloysius Widmann", title = "Blockchain --- Zum Geleit", journal = "{Digitale Welt}", volume = "2", number = "1", month = "", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s42354-018-0008-3", ISSN = "2510-3008", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s42354-018-0008-3", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Linnhoff-Popien:2018:BNB, author = "Claudia Linnhoff-Popien", title = "Blockchain --- the next big thing?", journal = "{Digitale Welt}", volume = "2", number = "1", month = "", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s42354-018-0001-x", ISSN = "2510-3008", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s42354-018-0001-x", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", } @Article{Lipton:2018:BB, author = "Alexander Lipton and Alex `Sandy' Pentland", title = "Breaking the Bank: New financial networks could stop the concentration of wealth and increased participation in the economy --- but only if used with care", journal = j-SCI-AMER, volume = "318", number = "1", pages = "26--31", month = jan, year = "2018", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0118-26", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Dec 28 08:37:50 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sciam2010.bib; http://www.nature.com/scientificamerican", URL = "http://www.nature.com/scientificamerican/journal/v318/n1/full/scientificamerican0118-26.html; http://www.nature.com/scientificamerican/journal/v318/n1/pdf/scientificamerican0118-26.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Article{Lipton:2018:BBN, author = "Alexander Lipton and Alex `Sandy' Pentland", title = "Breaking the Bank: New financial networks could stop the concentration of wealth and increased participation in the economy --- but only if used with care", journal = j-SCI-AMER, volume = "318", number = "1", pages = "26--31", month = jan, year = "2018", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0118-26", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Dec 28 08:37:50 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sciam2010.bib; http://www.nature.com/scientificamerican", URL = "http://www.nature.com/scientificamerican/journal/v318/n1/full/scientificamerican0118-26.html; http://www.nature.com/scientificamerican/journal/v318/n1/pdf/scientificamerican0118-26.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @MastersThesis{Liu:2018:BMB, author = "Jin Liu", title = "Business models based on {IoT}, {AI} and blockchain", type = "{Master's}", school = "Uppsala Universitet", address = "Uppsala, Sweden", year = "2018", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2116891841", abstract = "Every time the development of technology enters a new epoch, big changes in the business and society will follow. Especially for the entrepreneurs, it signifies both opportunities and challenges at the same time. In the next decade, IoT, AI and blockchain will be the main driving forces in the upcoming technological revolution and demonstrate great synergic potential. There is an old saying, ``In a strong wind even turkeys can fly''. The company who can seize this chance may become to the next GAFAs (Google, Amazon, Facebook and Apple); whereas those who completely ignores it may be rolled out of the marketeventually. Business model canvas is a very popular method for startups to align the resources and formulate the strategy, which is also the framework used in our research. The main target of this thesis is to demonstrate a thinking method to converge these new technologies in the business models and evaluate the most significant elements in the business planning stage. It could help the future startups to take advantages of the opportunities and overcome the challenges in the new business environment.", acknowledgement = ack-nhfb, advisor = "{\AA}se Linn{\'e} and H{\aa}kan Kullv{\'e}n", keywords = "(UMI)AAI11003284; Social sciences", ris-m1 = "11003284", } @MastersThesis{Lustig:2018:AAB, author = "Caitlin Lustig", title = "Algorithmic Authority of the {Bitcoin} Blockchain", type = "{M.S.}", school = "University of California, Irvine", address = "Irvine, CA, USA", pages = "132", year = "2018", ISBN = "0-438-30423-3", ISBN-13 = "978-0-438-30423-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2099224272", abstract = "In this thesis, I expand on the concept of algorithmic authority, a concept that I introduced in earlier work to understand the role of algorithms in daily life. Algorithmic authority is the legitimate power of algorithms to direct human action and to impact which information is considered true. In contrast to much other work on algorithms in sociotechnical systems, I argue for more precise use of the word ``algorithm'', as well as for the importance of studying algorithmic systems that do consist of ``black box algorithms''. Through a study of the users of the cryptocurrency Bitcoin, I explore what it means to trust in algorithmic authority in an open source, decentralized system and contrast it with the authority of centralized and corporate software. My study utilizes data from my survey, interviews, and observation of the broader Bitcoin community. I examine the tensions between members of the Bitcoin community who would prefer to integrate Bitcoin into institutions and those that saw it as a radical use of algorithmic authority. I describe how my participants preferred algorithmic authority to the authority of conventional institutions that they saw as untrustworthy. However, they acknowledged the need for mediating algorithmic authority with human judgment. I examine these tensions between how they would like Bitcoin to be used and how it is being used, and what those tensions can tell us about algorithmic authority. Lastly, I suggest future research directions for examining a wider range of algorithms and better understanding the Bitcoin community.", acknowledgement = ack-nhfb, advisor = "Bonnie Nardi and Geoffrey C. Bowker", keywords = "0723:Information science; 0984:Computer science; Algorithms; Applied sciences; Bitcoin; Blockchain; Communication and the arts; Computer science; Information science", ris-m1 = "10827864", } @MastersThesis{Maharjan:2018:PAB, author = "Pradip S. Maharjan", title = "Performance Analysis of Blockchain Platforms", type = "{M.S.C.S.}", school = "University of Nevada, Las Vegas", address = "Las Vegas, NV, USA", pages = "51", year = "2018", ISBN = "0-438-84217-0", ISBN-13 = "978-0-438-84217-5", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2181699564", abstract = "Blockchain technologies have drawn massive attention to the world these past few years mostly because of the burst of cryptocurrencies like Bitcoin, Etherium, Ripple and many others. A Blockchain, also known as distributed ledger technology, has demonstrated huge potential in saving time and costs. This open-source technology which generates a decentralized public ledger of transactions is widely appreciated for ensuring a high level of privacy through encryption and thus sharing the transaction details only amongst the participants involved in the transactions. The Blockchain is used not only for cryptocurrency but also by various companies to meet their business ends, such as efficient management of supply chains and logistics. The rise and fall of numerous crypto-currencies based on blockchain technology have generated debate among tech-giants and regulatory bodies. There are various groups which are working on standardizing the blockchain technology. At the same time, numerous groups are actively working, developing and fine-tuning their own blockchain platforms. Platforms such as etherium, hyperledger, parity, etc. have their own pros and cons. This research is focused on the performance analysis of blockchain platforms which gives a comparative understanding of these platforms.", acknowledgement = ack-nhfb, advisor = "Ajoy K. Datta", keywords = "0984:Computer science; Applied sciences; Bitcoin; Blockchain; Computer science; Cryptocurrency; Ethereum; Hyperledger fabric", ris-m1 = "10842745", } @MastersThesis{Mair:2018:ADI, author = "Florian Mair", title = "Assessment of Data Integrity Risks in Public Blockchain Systems", type = "{M.S.}", school = "University of Nebraska at Omaha", address = "Omaha, NE, USA", pages = "119", year = "2018", ISBN = "0-438-61436-4", ISBN-13 = "978-0-438-61436-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2132138951", abstract = "Since its first use in 2008, blockchain technology has come a long way and developed its functions from a simple distributed ledger to distributed virtual machines that execute smart contracts and much more. Blockchains have a potential application in many industries and offer great innovation potential for organizations. With all the opportunities and value new technologies can deliver, the risks are often neglected. In this paper risks to data integrity on blockchains are identified. Further the differences regarding data integrity among private and public blockchains are assessed. For the risk identification and the comparison between public and private systems a qualitative method with focus interviews is used, while the risk assessment is done with a quantitate online survey. The identified risks will be evaluated among their likelihood of occurrence and their possible consequences on the integrity of the data. Overall 11 risks have been identified which are applicable to public blockchains. Even though some of them got rated as a ``High Risk'' there is currently no evidence that a blockchain should be considered insecure. The identified risks should be taken into consideration before a public blockchain is implemented. The differences between public and private blockchains regarding data integrity are not rated, hence based on the collected data it cannot be generalized which design is more secure. The research results facilitate the decision between public and private systems. Based on the collected data and the literature review, the author discusses some actions that can be taken to mitigate the identified risks.", acknowledgement = ack-nhfb, advisor = "Ken Dick", keywords = "0723:Information science; Communication and the arts; Data security; Information science; Risk assessment; Risk management; Security", ris-m1 = "10975250", } @PhdThesis{Malomo:2018:CTB, author = "Olumide Olugbenga Malomo", title = "Cybersecurity through a Blockchain Enabled Federated Cloud Framework", type = "{Ph.D.}", school = "Howard University", address = "Washington, DC, USA", pages = "133", year = "2018", ISBN = "0-438-96886-7", ISBN-13 = "978-0-438-96886-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2195473563", abstract = "Minimizing the breach detection gap (BDG) to combat cyber-attacks is a central concern for all organizations and governments. Cyber-attacks are discovered daily, many of which have gone undetected for days to years before the victim organizations detect and deploy the cyber defense. Many individuals, organizations and businesses continue to be hit by new waves of cyber-attacks. This dissertation presents a blockchain-enabled federated cloud computing framework for minimizing BDG to reduce the effect of cyber attacks. First, design, development and evaluation of a federated cloud computing framework for adaptive cyber defense and distributed computing is presented. Framework for cyber defense supports adaptive incident response based on the context; by identifying critical operating parameters and computational capabilities for creating a benchmark, for performance evaluation of cloud-center selection with optimal resource capabilities to provide Quality-of-Service (QoS) to computing device and respond to service demand efficiently based on device proximity to the edge/cloud and cloud center availability status. Second, design, development and evaluation use of blockchain technology in federated cloud computing framework is studied to continuously monitor and analyze the network traffics against cyber-attacks by using the Dempster-Shafer theory. The approach to detect ingress attacks is used in reverse direction to analyze egress network traffics for any active exploits, that attackers might have drawn victims into through social engineering, trojans or phishing email, or network traveling worms attacks. Lastly, security mechanism for securing stored data in blockchain enabled federated cloud computing framework is studied to secure storage for offsite digital assets efficiency, privacy, scalability and restricted access control. The framework uses amortized analysis concept and shrewd accounting principles to improve access control: authentication and authorization, early detection of breaches and ease to revoke subject's access control. The blockchain-enabled federated cloud computing is regarded as all-in-one security intelligent framework for cyber-attacks that could provide mechanisms for detection, investigation, escalation, containment, protection of data for recovery and incident response. Performance of the blockchain-enabled federated cloud computing framework is evaluated using numerical results. The numerical results show that the BDG is significantly decreased when the proposed approach is used. Furthermore, the numerical results show that the proposed approach for access control for digital assets outperforms the traditional approaches.", acknowledgement = ack-nhfb, advisor = "Moses Garuba and Danda B. Rawat", keywords = "0984:Computer science; Access control; Adaptive cloud computing; Applied sciences; Blockchain technology; Breach detection gap; Computer science; Cyber security; Federated cloud computing; Security and privacy", ris-m1 = "10845114", } @Article{Malomo:2018:NGC, author = "Olumide O. Malomo and Danda B. Rawat and Moses Garuba", title = "Next-generation cybersecurity through a blockchain-enabled federated cloud framework", journal = j-J-SUPERCOMPUTING, volume = "74", number = "10", pages = "5099--5126", month = oct, year = "2018", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-018-2385-7", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Thu Oct 10 15:31:09 MDT 2019", bibsource = "http://link.springer.com/journal/11227/74/10; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @PhdThesis{McCorry:2018:ABU, author = "Patrick McCorry", title = "Applications of the {Blockchain} using cryptography", type = "{Ph.D.}", school = "University of Newcastle Upon Tyne (United Kingdom)", address = "Newcastle, UK", year = "2018", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2307359667", abstract = "We have witnessed the rise of cryptocurrencies in the past eight years. Bitcoin and Ethereum are the world's most successful cryptocurrencies with market capitalisations of \$37bn and \$21bn respectively in June 2017. The innovation behind these cryptocurrencies is the blockchain which is an immutable and censorship resistant public ledger. Bitcoin introduced the blockchain to trade a single asset (i.e. bitcoins), whereas Ethereum adopted the blockchain to store and execute expressive smart contracts. In this thesis, we consider cryptographic protocols that bootstrap trust from the blockchain. This includes secure end-to-end communication between two pseudonymous users, payment protocols, payment networks and decentralised internet voting. The first three applications rely on Bitcoin, whereas the final e-voting application is realised using Ethereum. First, it is important to highlight that Bitcoin was designed to protect the anonymity (or pseudonymity) for financial transactions. Nakamoto proposed that financial privacy is achievable by storing each party's pseudonym (and not their real-world identity) in a transaction. We highlight that this approach for privacy has led to real-world authentication issues as merchants are failing to re-authenticate customers in post-transaction correspondence. To alleviate these issues, we propose an end-to-end secure communication protocol for Bitcoin users that does not require any trusted third party or public-key infrastructure. Instead, our protocol leverages the Blockchain as an additional layer of authentication. Furthermore, this insight led to the discovery of two attacks in BIP70: Payment Protocol which is a community-accepted standard used by more than 100,000 merchants. Our attacks were acknowledged by the leading payment processors including Coinbase, BitPay and Bitt. As well, we have proposed a revised Payment Protocol that prevents both attacks. Second, Bitcoin as deployed today does not scale. Scalability research has focused on two directions: (1) redesigning the Blockchain protocol, and (2) facilitating 'off-chain transactions' and only consulting the Blockchain if an adjudicator is required. We focus on the latter and provide an overview of Bitcoin payment networks. These consist of two components: payment channels to facilitate off-chain transactions between two parties, and the capability to fairly exchange bitcoins across multiple channels. We compare Duplex Micropayment Channels and Lightning Channels, before discussing Hashed Time Locked Contracts which viii enable Bitcoin-based payment networks. Furthermore, we highlight challenges in routing and path-finding that need to be overcome before payment networks are practically feasible. Finally, we study the feasibility of executing cryptographic protocols on Ethereum. We provide the first implementation of a decentralised and self-tallying internet voting protocol with maximum voter privacy as a smart contract. The Open Vote Network is suitable for boardroom elections and is written as a smart contract for Ethereum. Unlike previously proposed Blockchain e-voting protocols, this is the first implementation that does not rely on any trusted authority to compute the tally or to protect the voter's privacy. Instead, the Open Vote Network is a self-tallying protocol, and each voter is in control of the privacy of their own vote such that it can only be breached by a full collusion involving all other voters. The execution of the protocol is enforced using the consensus mechanism that also secures the Ethereum blockchain. We tested the implementation on Ethereum's official test network to demonstrate its feasibility. Also, we provide a financial and computational breakdown of its execution cost.", acknowledgement = ack-nhfb, keywords = "773863", ris-m1 = "27679663", } @Article{McGraw:2018:SBTd, author = "Gary McGraw", title = "{Silver Bullet} Talks with {Nick Weaver}", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "7--10", month = jul # "\slash " # aug, year = "2018", CODEN = "????", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040007.html", acknowledgement = ack-nhfb, journal-URL = "https://publications.computer.org/security-and-privacy/", remark = "Security researcher Nick Weaver provides excellent, well-informed, and thoughtful commentary on cryptocurrencies, distributed ledgers, and currency transaction algorithms.", } @Article{Meiklejohn:2018:TTO, author = "Sarah Meiklejohn", title = "Top Ten Obstacles along Distributed Ledgers Path to Adoption", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "13--19", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111235", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040013-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://www.computer.org/portal/web/csdl/magazines/security", } @Article{Mencias:2018:OBS, author = "A. Nu{\~n}ez Mencias and D. Dillenberger and P. Novotny and F. Toth and T. E. Morris and V. Paprotski and J. Dayka and T. Visegrady and B. O'Farrell and J. Lang and E. Carbarnes", title = "An optimized blockchain solution for the {IBM z14}", journal = j-IBM-JRD, volume = "62", number = "2--3", pages = "4:1--4:11", month = "????", year = "2018", CODEN = "IBMJAE", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu May 10 14:55:17 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", URL = "https://ieeexplore.ieee.org/document/8276264/", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", } @Article{Mendling:2018:BBP, author = "Jan Mendling and Ingo Weber and Wil {Van Der Aalst} and Jan {Vom Brocke and} Cristina Cabanillas and Florian Daniel and S{\o}ren Debois and Claudio {Di Ciccio} and Marlon Dumas and Schahram Dustdar and Avigdor Gal and Luciano Garc{\'\i}a-Ba{\~n}uelos and Guido Governatori and Richard Hull and Marcello {La Rosa} and Henrik Leopold and Frank Leymann and Jan Recker and Manfred Reichert and Hajo A. Reijers and Stefanie Rinderle-Ma and Andreas Solti and Michael Rosemann and Stefan Schulte and Munindar P. Singh and Tijs Slaats and Mark Staples and Barbara Weber and Matthias Weidlich and Mathias Weske and Xiwei Xu and Liming Zhu", title = "Blockchains for Business Process Management --- Challenges and Opportunities", journal = j-TMIS, volume = "9", number = "1", pages = "4:1--4:??", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3183367", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Blockchain technology offers a sizable promise to rethink the way interorganizational business processes are managed because of its potential to realize execution without a central party serving as a single point of trust (and failure). To stimulate research on this promise and the limits thereof, in this article, we outline the challenges and opportunities of blockchain for business process management (BPM). We first reflect how blockchains could be used in the context of the established BPM lifecycle and second how they might become relevant beyond. We conclude our discourse with a summary of seven research directions for investigating the application of blockchain technology in the context of BPM.", acknowledgement = ack-nhfb, articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Moore:2018:RRB, author = "Tyler Moore and Nicolas Christin and Janos Szurdi", title = "Revisiting the Risks of {Bitcoin} Currency Exchange Closure", journal = j-TOIT, volume = "18", number = "4", pages = "50:1--50:??", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3155808", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Sat Sep 21 07:34:09 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", abstract = "Bitcoin has enjoyed wider adoption than any previous cryptocurrency; yet its success has also attracted the attention of fraudsters who have taken advantage of operational insecurity and transaction irreversibility. We study the risk that investors face from the closure of Bitcoin exchanges, which convert between Bitcoins and hard currency. We examine the track record of 80 Bitcoin exchanges established between 2010 and 2015. We find that nearly half (38) have since closed, with customer account balances sometimes wiped out. Fraudsters are sometimes to blame, but not always. Twenty-five exchanges suffered security breaches, 15 of which subsequently closed. We present logistic regressions using longitudinal data on Bitcoin exchanges aggregated quarterly. We find that experiencing a breach is correlated with a 13 times greater odds that an exchange will close in that same quarter. We find that higher-volume exchanges are less likely to close (each doubling in trade volume corresponds to a 12\% decrease in the odds of closure). We also find that exchanges that derive most of their business from trading less popular (fiat) currencies, which are offered by at most one competitor, are less likely to close.", acknowledgement = ack-nhfb, articleno = "50", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J780", } @InCollection{Mytis-Gkometh:2018:NKR, author = "P. Mytis-Gkometh and G. Drosatos and P. S. Efraimidis and E. Kaldoudi", booktitle = "{Precision Medicine Powered by pHealth and Connected Health}", title = "Notarization of Knowledge Retrieval from Biomedical Repositories Using Blockchain Technology", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-981-10-7419-6_12", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-7419-6_12", acknowledgement = ack-nhfb, } @Misc{Nakamura:2018:CRU, author = "Yuji Nakamura", title = "{Coincheck} to Repay Users Who Lost Money in \$400 Million Hack", howpublished = "Web story", day = "27", month = jan, year = "2018", bibdate = "Tue Jan 30 14:33:27 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.bloomberg.com/news/articles/2018-01-27/coincheck-to-repay-customers-who-lost-money-in-400-million-hack", abstract = "Japanese cryptocurrency exchange Coincheck Inc. said it will use its own capital to reimburse customers who lost money in Friday's \$400 million theft. The Tokyo-based company will repay all 260,000 users impacted by the theft of NEM coins, at a rate of 88.549 yen (82 U.S. cents) for each coin, according to a statement posted on its website after midnight local time on Sunday. A total of 523 million coins were stolen, it said.", acknowledgement = ack-nhfb, remark = "From the end of the story: ``Bitcoin exchange Bitfinex also overcame a \$69 million heist and last year repaid most customers who lost money in the August 2016 attack.''", } @Misc{Olenick:2018:LCM, author = "Doug Olenick", title = "Legal cryptocurrency mining operation's power draw creates concern", howpublished = "SC Magazine Web article.", day = "6", month = mar, year = "2018", bibdate = "Sat Mar 10 08:38:10 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.scmagazine.com/legal-cryptocurrency-mining-operations-power-draw-creates-concern/article/749118/", abstract = "Illegal cryptocurrency mining has taken over as the primary money-generating methodology for many cybercriminals, but even companies attempting to mine digital currency legally are running into some problems. The City of Plattsburgh, New York is considering a ban on cryptocurrency mining within its city limits, not due to any illegal activity, but because the power being used to create the money could potentially cause a massive drain on the local electric grid.", acknowledgement = ack-nhfb, } @Misc{Osborne:2018:FBB, author = "Charlie Osborne", title = "{Venezuela}'s {Petro} cryptocurrency raises \$735 million at launch, perhaps.", howpublished = "Web article.", day = "21", month = feb, year = "2018", bibdate = "Tue Feb 27 16:31:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "Opinion: Presidential promises are not enough to disguise the lack of planning for the oil-backed coin.", URL = "http://www.zdnet.com/article/venezuelas-petro-cryptocurrency-raises-735-million-at-launch/", abstract = "Despite concerns over the viability and backing of the Petro cryptocurrency, it appears that Venezuela's coin may have done well during a pre-sale event if Venezuelan President Nicolas Maduro is to be believed.", acknowledgement = ack-nhfb, } @Misc{Osborne:2018:HRE, author = "Charlie Osborne", title = "Hacker returns 20,000 {ETH} stolen during {CoinDash ICO}: Cryptocurrency stolen from the platform during an {ICO} has reappeared as mysteriously as the attacker's apparent conscience.", howpublished = "Web article.", day = "26", month = feb, year = "2018", bibdate = "Tue Feb 27 16:28:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.zdnet.com/article/hacker-returns-20000-eth-stolen-during-coindash-ico/", acknowledgement = ack-nhfb, keywords = "Initial Coin Offerings (ICOs)", } @Misc{Palmer:2018:CMT, author = "Danny Palmer", title = "{ComboJack} malware tries to steal your cryptocurrency by changing the data in your clipboard This newly uncovered malware is delivered by phishing emails --- and hopes users don't bother to check which wallet they sending money to.", howpublished = "ZDNet Web story.", day = "6", month = mar, year = "2018", bibdate = "Sat Mar 10 08:43:54 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.zdnet.com/article/combojack-malware-tries-to-steal-your-cryptocurrency-by-changing-the-data-in-your-clipboard/", abstract = "A new form of malware steals Bitcoin Litecoin, Monero, and Ethereum cryptocurrency by replacing addresses of cryptocurrency transactions with the address of a different cryptocurrency wallet controlled by the attacker.", acknowledgement = ack-nhfb, remark = "From the article: ``Opening this PDF file reveals a single line of text that includes an embedded RTF file, that exploits CVE-2017-8579, an elevation of privilege vulnerability in Microsoft DirectX, to load an embedded remote object. This object, an HTA (HTML Application) file, runs a PowerShell script that commences a string of self-extracting executables (SFX) that ultimately yields the final payload of ComboJack.''", } @MastersThesis{Panesir:2018:BAD, author = "Mohit Singh Panesir", title = "Blockchain Applications for Disaster Management and National Security", type = "{M.S.}", school = "State University of New York at Buffalo", address = "Buffalo, NY, USA", pages = "115", year = "2018", ISBN = "0-438-04939-X", ISBN-13 = "978-0-438-04939-0", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2057242991", abstract = "Natural phenomena such as floods, storms, volcanic eruptions, earthquakes, landslides have affected our planet in an unpredictable way. However, these phenomena are merely classified as a hazard when they may affect people and the things they value (Cutter, 2005). The involvement of many agencies and the public is important in planning for disaster relief, in rescuing victims, and in managing the event. A lot of individuals are deprived of help due to poor coordination, late assistance and uneven distribution of food, water, medical assistance, clothes, and vehicles. The need for a proper disaster relief plan is crucial to overcome these challenges. On the other hand, identity theft is one of the most bizarre and rapidly growing crimes present in the world. Identity thieves are active more than ever as the e-commerce trading keeps on growing. Earlier the thieves used to buy pieces and parts of someone's personal identification information but now they could have hold of everything. Similarly there has been an increase in illegal immigration, smuggling of weapons and terrorist activities noticed in last 2 decades in the United States. This study focuses on the current condition of disaster management, identity theft, border security and controlling the misuse of weapon of mass destruction. It proposes the use of advanced technological methods like Blockchain to overcome the loss of time and cost to provide a quick response to the victims and to provide secure ways to store personal identification information and better national security. The study helps to understand how better disaster management and national security can be achieved by using various use cases and implementation models. By implementing these models, the border security can be improved and proper handling of weapons of mass destruction can also take place.", acknowledgement = ack-nhfb, advisor = "Jun Zhuang", keywords = "0796:Operations research; Applied sciences; Blockchain; Disaster management; Identity theft; National security; Operations research; Weapons of mass destruction", ris-m1 = "10823631", } @InCollection{Patil:2018:FBB, author = "Akash Suresh Patil and Bayu Adhi Tama and Youngho Park and Kyung-Hyune Rhee", booktitle = "{Advances in Computer Science and Ubiquitous Computing}", title = "A Framework for Blockchain Based Secure Smart Green House Farming", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-981-10-7605-3_185", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-7605-3_185", acknowledgement = ack-nhfb, } @Article{Pavlus:2018:WBC, author = "John Pavlus", title = "The World {Bitcoin} Created: The First Big Digital Currency Gave Us a Glimpse of a New Economic Order --- One That Raises More Questions Than It Answers", journal = j-SCI-AMER, volume = "318", number = "1", pages = "32--37", month = jan, year = "2018", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0118-32", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Dec 28 08:37:50 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sciam2010.bib; http://www.nature.com/scientificamerican", URL = "http://www.nature.com/scientificamerican/journal/v318/n1/full/scientificamerican0118-32.html; http://www.nature.com/scientificamerican/journal/v318/n1/pdf/scientificamerican0118-32.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @InProceedings{Pirlea:2018:MBC, author = "George P{\^{}\i}rlea and Ilya Sergey", booktitle = "{Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs}", title = "Mechanising Blockchain Consensus", publisher = pub-ACM, address = pub-ACM:adr, pages = "78--90", year = "2018", DOI = "https://doi.org/10.1145/3167086", ISBN = "1-4503-5586-2", ISBN-13 = "978-1-4503-5586-5", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "CPP 2018", URL = "http://doi.acm.org/10.1145/3167086", acknowledgement = ack-nhfb, acmid = "3167086", keywords = "blockchain; consensus; Coq; protocol verification", location = "Los Angeles, CA, USA", pagecount = "13", } @Book{Pixley:2018:CJM, editor = "Jocelyn Pixley and Helena Flam", title = "Critical junctures in mobile capital", publisher = pub-CAMBRIDGE, address = pub-CAMBRIDGE:adr, pages = "????", year = "2018", ISBN = "1-107-18951-9 (hardcover), 1-316-63914-2 (paperback)", ISBN-13 = "978-1-107-18951-5 (hardcover), 978-1-316-63914-6 (paperback)", LCCN = "HG3891 .C75 2018", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "``During the recent financial crisis, the conflict between sovereign states and banks over who controls the creation of money was thrown into sharp relief. This collection investigates the relationship between states and banks, arguing that conflicts between the two over control of money produces critical junctures. Drawing on Max Weber's concept of 'mobile capital', the book examines the mobility of capital networks in contexts of funding warfare, global bubbles and dangerous instability disengaged from social-economic activity. It proposes that mobile capital is a primary feature of capitalism and nation states, and furthermore, argues that the perennial, hierarchical struggles between states and global banks is intrinsic to capitalism. Featuring authors writing from an impressively diverse range of academic backgrounds (including sociology, geography, economics and politics), Critical Junctures in Mobile Capital presents a variety of analyses using current or past examples from different countries, federations, and of differing forms of mobile capital''", acknowledgement = ack-nhfb, subject = "Capital movements; BUSINESS and ECONOMICS / Economics / Macroeconomics.", tableofcontents = "Introduction Jocelyn Pixley \\ 1. Sovereign nations and the governance of international finance Renate Mayntz \\ 2. Coping with the dangerous component of capital flows and Asia's ineffective cooperation Iwan Azis \\ 3. How mobile capital plays off democracy --- the Euro case and other federations Jocelyn Pixley \\ 4. Mobile capital as the ultimate form of war finance Luca Fantacci and Lucio Gobbi \\ 5. Capital moves financially --- securitisation, value - and the emergent social relations of labour Dick Bryan and Michael Rafferty \\ 6. International money after the crisis. What do we know? Herman Mark Schwartz \\ 7. Beware of financialization! Emerging markets and mobile capital Andreas Nolke \\ 8. Lagoon immobility. The exceptional case of imperial Venice Sam Whimster \\ 9. 'Convenient reverse logic' in mobile capital's inequalities Jocelyn Pixley \\ 10. Imagine: grassroots against financialization Helena Flam \\ 11. Money, state and capital: the long-term perspective Helmut Kuzmics \\ 12. Super diversity, exploitation and migrant workers Shaun Wilson \\ 13. The bitcoin or the reality of a waking dream Massimo Amato \\ 14. Capital mobility and the fragmentation of monetary sovereignty David Woodruff \\ 15. Surrogate currencies: Sardex Laura Sartori \\ Index", } @Article{Popper:2018:TNV, author = "Nathaniel Popper", title = "There Is Nothing Virtual About {Bitcoin}'s Energy Appetite", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "21", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Mon Jan 22 20:13:34 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/21/technology/bitcoin-mining-energy-consumption.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the article: ``The total network of computers plugged into the Bitcoin network consumes as much energy each day as some medium-size countries --- which country depends on whose estimates you believe. And the network supporting Ethereum, the second-most valuable virtual currency, gobbles up another country's worth of electricity each day.''", } @Article{Popper:2018:VBB, author = "Nathaniel Popper", title = "The View from the {Bitcoin} Bubble", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "22", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Mon Jan 22 20:13:34 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/22/insider/bitcoin-cryptocurrency-digital-reporting.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @InCollection{Prinz:2018:B, author = "{Prof.Dr.Wolfgang} Prinz and {Prof.Dr.Thomas} Rose and {Prof.Dr.Thomas} Osterland and {Prof.Dr.Clemens} Putschli and Thomas Osterland and Clemens Putschli", booktitle = "{Digitalisierung}", title = "Blockchain", publisher = pub-SV, address = pub-SV:adr, pages = "311--319", year = "2018", DOI = "https://doi.org/10.1007/978-3-662-55890-4_18", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-55890-4_18", acknowledgement = ack-nhfb, } @Book{Raj:2018:BTP, editor = "Pethuru Raj", title = "Blockchain technology: platforms, tools and use cases", volume = "111", publisher = pub-ACADEMIC, address = pub-ACADEMIC:adr, pages = "x + 278", year = "2018", ISBN = "0-12-813852-1 (hardcover), 0-12-813884-X (e-book)", ISBN-13 = "978-0-12-813852-6 (hardcover), 978-0-12-813884-7 (e-book)", LCCN = "QA76.9.D32", bibdate = "Fri Feb 22 15:02:31 MST 2019", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Advances in computers", URL = "https://www.sciencedirect.com/science/bookseries/00652458/111", acknowledgement = ack-nhfb, subject = "Blockchains (Databases); Blockchains.; Monnaie {\'e}lectronique.; Syst{\`e}mes de paiement.; {\'E}conomie num{\'e}rique.; Bases de donn{\'e}es.; Blockchains (Databases)", tableofcontents = "Preface / Pethuru Raj, Ganesh Chandra Deka / ix--x \\ One: Blockchain Technology Use Cases in Healthcare / Peng Zhang, Douglas C. Schmidt, Jules White, Gunther Lenz / 1--41 \\ Two: Blockchain for a Trust Network Among Intelligent Vehicles / Shiho Kim / 43--68 \\ Three: Blockchain Technology: Supply Chain Insights from ERP / Arnab Banerjee / 69--98 \\ Four: Applications of Blockchain in the Financial Sector and a Peer--to--Peer Global Barter Web / Kazuki Ikeda, Md--Nafiz Hamid / 99--120 \\ Five: Blockchain for Business: Next--Generation Enterprise Artificial Intelligence Systems / Melanie Swan / 121--162 \\ Six: The Use of Blockchains: Application--Driven Analysis of Applicability / Bruno Rodrigues, Thomas Bocek, Burkhard Stiller / 163--198 \\ Seven: Security and Privacy of Blockchain and Quantum Computation / Kazuki Ikeda / 199--228 \\ Eight: Privacy Requirements in Cybersecurity Applications of Blockchain / Louise Axon, Michael Goldsmith, Sadie Creese / 229--278", } @InCollection{Remy:2018:TBU, author = "Cazabet Remy and Baccour Rym and Latapy Matthieu", booktitle = "Complex Networks \& Their Applications {VI}", title = "Tracking {Bitcoin} Users Activity Using Community Detection on a Network of Weak Signals", publisher = pub-SV, address = pub-SV:adr, pages = "166--177", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-72150-7_14", ISBN = "3-319-72150-X", ISBN-13 = "978-3-319-72150-7", bibdate = "Thu Nov 30 16:02:10 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-72150-7_14", acknowledgement = ack-nhfb, } @Article{Ricci:2018:LBD, author = "Saulo Ricci and Eduardo Ferreira and Daniel Sadoc Menasche and Artur Ziviani and Jose Eduardo Souza and Alex Borges Vieira", title = "Learning Blockchain Delays: a Queueing Theory Approach", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "122--125", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308952", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "Despite the growing interest in cryptocurrencies, the delays incurred to confirm transactions are one of the factors that hamper the wide adoption of systems such as Bitcoin. Bitcoin transactions usually are confirmed in short periods (minutes), but still much larger than conventional credit card systems (seconds). In this work, we propose a framework encompassing machine learning and a queueing theory model to (i) identify which transactions will be confirmed; and (ii) characterize the confirmation time of confirmed transactions. The proposed queueing theory model accounts for factors such as the activity time of blocks and the mean time between transactions. We parameterize the model for transactions that are confirmed within minutes, suggesting that its integration into a more general framework is a step towards building scalability to Bitcoin.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @MastersThesis{Rinaldi:2018:PPD, author = "James Rinaldi", title = "Peer to Peer Digital Rights Management Using Blockchain", type = "{M.S.Eng.}", school = "University of the Pacific", address = "Stockton, CA, USA", pages = "68", year = "2018", ISBN = "0-355-94496-0", ISBN-13 = "978-0-355-94496-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2042953385", abstract = "Content distribution networks deliver content like videos, apps, and music to users through servers deployed in multiple datacenters to increase availability and delivery speed of con- tent. The motivation of this work is to create a content distribution network that maintains a consumer's rights and access to works they have purchased indefinitely. If a user purchases content from a traditional content distribution network, they lose access to the content when the service is no longer available. The system uses a peer to peer network for content distribution along with a blockchain for digital rights management. This combination may give users indefinite access to purchased works. The system benefits content rights owners because they can sell their content in a lower cost manner by distributing costs among the community of peers.", acknowledgement = ack-nhfb, advisor = "Jeff Shafer", keywords = "0513:Intellectual Property; 0984:Computer science; Applied sciences; Blockchain; Computer science; Digital rights management; DRM; Filesharing; Intellectual Property; P2P; Social sciences", ris-m1 = "10793552", } @PhdThesis{Roio:2018:AS, author = "Denis Roio", title = "Algorithmic Sovereignty", type = "{Ph.D.} thesis", school = "University of Plymouth", address = "Plymouth, UK", pages = "196", month = jan, year = "2018", bibdate = "Tue Nov 26 08:29:27 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://pearl.plymouth.ac.uk/bitstream/handle/10026.1/11101/", acknowledgement = ack-nhfb, keywords = "Bitcoin; Debian Linux; Devuan Linux", remark = "See Chapter 2: The Bitcoin Experience (pp. 34--42).", } @Article{Roose:2018:KDC, author = "Kevin Roose", title = "{Kodak}'s Dubious Cryptocurrency Gamble", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "30", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Wed Jan 31 15:39:39 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/2018/01/30/technology/kodak-blockchain-bitcoin.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the story: ``The basic idea behind KodakCoin is to use the blockchain to help photographers manage their collections by creating permanent, immutable records of ownership. The company also struck a licensing deal for a Bitcoin-mining computer called the Kodak KashMiner, which allows users to generate their own cryptocurrency. Kodak's stock rose more than 200 percent following the announcements, and has not fallen much since.''", } @Article{Roth:2018:FBW, author = "Matthias Roth and Michael Eitelwein", title = "{Funktionsweise Blockchain: Wie funktioniert eine Blockchain?}. ({German}) [{How} Blockchain works: How does a blockchain work?]", journal = "{Digitale Welt}", volume = "2", number = "1", pages = "35--38", month = jan, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s42354-018-0014-5", ISSN = "2510-3008", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s42354-018-0014-5", acknowledgement = ack-nhfb, fjournal = "{Digitale Welt: Das Wirtschaftsmagazin zur Digitalisierung}", journal-URL = "https://link.springer.com/journal/42354", language = "German", } @Misc{Roubini:2018:BBP, author = "Nouriel Roubini", title = "Blockchain;s Broken Promises", howpublished = "Web site.", day = "26", month = jan, year = "2018", bibdate = "Mon Feb 05 12:44:07 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "Boosters of blockchain technology compare its early days to the early days of the Internet. But whereas the Internet quickly gave rise to email, the World Wide Web, and millions of commercial ventures, blockchain's only application --- cryptocurrencies such as Bitcoin does not even fulfill its stated purpose.", acknowledgement = ack-nhfb, remark = "The large number of applications of blockchains recorded in this bibliography appear to refute the last statement of the abstract.", } @PhdThesis{Sallal:2018:ESP, author = "Muntadher Fadhil Sallal", title = "Evaluation of security and performance of clustering in the bitcoin network, with the aim of improving the consistency of the blockchain", type = "{Ph.D.}", school = "University of Portsmouth", address = "Portsmouth, UK", year = "2018", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2230937997", acknowledgement = ack-nhfb, keywords = "(UMI)AAI13909274; https://researchportal.port.ac.uk/portal/en/theses/evaluation-of-security-and-performance-of-clustering-in-the-bitcoin-network-with-the-aim-of-improving-the-consistency-of-the-blockchain(ae9ccd30-2660-4ba9-8836-b24479a07530).html; Social sciences", ris-m1 = "13909274", } @Article{Sattath:2018:IQB, author = "Or Sattath", title = "On the insecurity of quantum Bitcoin mining", journal = "CoRR", volume = "abs/1804.08118", number = "??", pages = "??--??", month = "????", year = "2018", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1804.08118; https://dblp.org/db/journals/corr/corr1804.html#abs-1804-08118", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1804-08118", dblp-mdate = "2018-08-13", } @Article{Scriber:2018:FDB, author = "B. A. Scriber", title = "A Framework for Determining Blockchain Applicability", journal = j-IEEE-SOFTWARE, volume = "35", number = "4", pages = "70--77", month = jul # "\slash " # aug, year = "2018", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2018.2801552", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Fri Aug 2 09:25:48 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", keywords = "architectural alignment; Blockchain; blockchain technology; blockchains; Computer architecture; Cryptography; design decisions; distributed ledgers; Ecosystems; efficiency; identity; immutability; investment; optimal technology; optimisation; patterns; software architecture; software architectures; software development; software engineering; transaction; transparency; trust; trust-based problems", } @Misc{Segura:2018:DCC, author = "J{\'e}r{\^o}me Segura", title = "Drive-by cryptomining campaign targets millions of {Android} users", howpublished = "Web article", day = "12", month = feb, year = "2018", bibdate = "Thu Feb 15 07:24:13 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://blog.malwarebytes.com/threat-analysis/2018/02/drive-by-cryptomining-campaign-attracts-millions-of-android-users/", abstract = "Malvertising and online fraud through forced redirects and Trojanized apps --- to cite the two most common examples --- are increasingly plaguing Android users. In many cases, this is made worse by the fact that people often don't use web filtering or security applications on their mobile devices. A particular group is seizing this opportunity to deliver one of the most lucrative payloads at the moment: drive-by cryptomining for the Monero (XMR) currency. In a campaign we first observed in late January, but which appears to have started at least around November 2017, millions of mobile users (we believe Android devices are targeted) have been redirected to a specifically designed page performing in-browser cryptomining.", acknowledgement = ack-nhfb, } @MastersThesis{Seshadri:2018:BBS, author = "Sreenivas Sudarshan Seshadri", title = "Blockchain-Based Security Framework for {Internet-of-Things} Through Isolation of Malicious Devices", type = "{M.S.}", school = "The University of Texas at San Antonio", address = "San Antonio, TX, USA", pages = "55", year = "2018", ISBN = "0-438-73945-0", ISBN-13 = "978-0-438-73945-1", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2162883253", abstract = "Internet of Things (IoT) devices are distributed and spread geographically and situated in proximity to those systems where they are deployed. In contrast to this conventional servers are deployed in secured and centralized premises. IoT devices, due to their resource-constrained design, has limited options of deploying security features that are sophisticated. It is assumed in this proposed approach that any IoT devices within a small network can be compromised and the compromised devises has to be isolated automatically. In this approach, blockchain is utilized as the basis of the framework. The security policies are enforced even in the event of presence of compromised devices, with the help of the blockchain. The proposed blockchain based framework enforces the security policies as long as the majority of the devices are not compromised. The proposed framework consists of permissioned blockchain based on hyperledger Fabric and add-on hardware modules. The framework performs wells in terms of low latency when compared to permission less blockchain frameworks (e.g. Ethereum), and allows existing IoT devices to join the framework without modification.", acknowledgement = ack-nhfb, advisor = "Junghee Lee", keywords = "0544:Electrical engineering; Applied sciences; Blockchain; Cyber physical security; Electrical engineering; Iot security", ris-m1 = "13420577", } @MastersThesis{Sharmin:2018:MCM, author = "Sadia Sharmin", title = "Music copyright management on blockchain: is it legally viable?", type = "{Master's}", school = "Uppsala Universitet", address = "Uppsala, Sweden", year = "2018", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2084932936", abstract = "The thesis begins by describing the current problems in the fragmented world of music copyrights indicating musicians are not being paid accurately due to lack of transparency in the calculation of royalties and this lead to legal battle. Later we investigate how blockchain technology can alleviate much of the difficulties associated with this complexity. We further explore the legislative and institutional support for the technology necessary for a successful implementation, in form of legislations and governmental projects. We find out that numerous authorities have started voting favourable legislations and recognizing the technology as a valid public ledger. Eventually, we confirm our findings by analysing existing laws.", acknowledgement = ack-nhfb, advisor = "Sanna Wolk", keywords = "(UMI)AAI10969695; Social sciences", ris-m1 = "10969695", } @Article{Singh:2018:BBB, author = "Madhusudan Singh and Shiho Kim", title = "Branch based blockchain technology in intelligent vehicle", journal = j-COMP-NET-AMSTERDAM, volume = "145", number = "??", pages = "219--231", day = "9", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2018.08.016", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Jan 22 16:29:24 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128618308399", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @InProceedings{Singh:2018:CRA, author = "Irish Singh and Seok-Won Lee", booktitle = "{Asia Pacific Requirements Engineering Conference: APRES 2017: Requirements Engineering for Internet of Things}", title = "Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud", publisher = pub-SV, address = pub-SV:adr, pages = "57--72", year = "2018", DOI = "https://doi.org/10.1007/978-981-10-7796-8_5", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Communications in Computer and Information Science", URL = "http://link.springer.com/chapter/10.1007/978-981-10-7796-8_5", acknowledgement = ack-nhfb, } @Article{Smolenski:2018:ETU, author = "Natalie Smolenski", title = "The Evolution of Trust: The Ultimate Social Impact of Blockchain Technology Depends on Who Controls Our Digital Identities", journal = j-SCI-AMER, volume = "318", number = "1", pages = "38--41", month = jan, year = "2018", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0118-38", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Thu Dec 28 08:37:50 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sciam2010.bib; http://www.nature.com/scientificamerican", URL = "http://www.nature.com/scientificamerican/journal/v318/n1/full/scientificamerican0118-38.html; http://www.nature.com/scientificamerican/journal/v318/n1/pdf/scientificamerican0118-38.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Article{Smuts:2018:WDC, author = "Nico Smuts", title = "What Drives Cryptocurrency Prices?: an Investigation of {Google Trends} and {Telegram} Sentiment", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "131--134", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308955", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "The Google Trends$^1$ search analysis service and the Telegram$^2$ messaging platform are investigated to determine their respective relationships to cryptocurrency price behaviour. It is shown that, in contrast to earlier findings, the relationship between cryptocurrency price movements and internet search volumes obtained from Google Trends is no longer consistently positive, with strong negative correlations detected for Bitcoin and Ethereum during June 2018. Sentiment extracted from cryptocurrency investment groups on Telegram is found to be positively correlated to Bitcoin and Ethereum price movements, particularly during periods of elevated volatility. The number of messages posted on a Bitcoin-themed Telegram group is found to be an indicator of Bitcoin price action in the subsequent week. A long shortterm memory (LSTM) recurrent neural network is developed to predict the direction of cryptocurrency prices using data obtained from Google Trends and Telegram. It is shown that Telegram data is a better predictor of the direction of the Bitcoin market than Google Trends. The converse is true for Ethereum. The LSTM model produces the most accurate results when predicting price movements over a one-week period.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @Article{Sompolinsky:2018:BUI, author = "Yonatan Sompolinsky and Aviv Zohar", title = "{Bitcoin}'s underlying incentives", journal = j-CACM, volume = "61", number = "3", pages = "46--53", month = mar, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3152481", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Feb 22 11:46:32 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2018/3/225472/fulltext", abstract = "The unseen economic forces that govern the Bitcoin protocol.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @MastersThesis{Song:2018:ASB, author = "Juah Song", title = "Application-Specific Blockchain Ecosystem for the {Internet of Things}, Users, and Organizations", type = "{M.S.}", school = "The University of Texas at San Antonio", address = "San Antonio, TX, USA", pages = "42", year = "2018", ISBN = "0-438-30045-9", ISBN-13 = "978-0-438-30045-3", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2100912819", abstract = "Blockchain technology offers a means to secure data transfer between a network of peers. Current designs of blockchain solutions tend to emphasize specific applications, such as financial transaction or sensor data acquisition. Research in blockchain include focuses in consensus methods, implementation frameworks, as well as proof of concept; the wide variance of these areas indicates the flexibility inherent in blockchain design. The decentralized and/or distributed nature of blockchain makes it an attractive match for managing the Internet of Things (IoT), a catch-all phrase to convey the idea that more and more devices are being built with the capability to communicate autonomously using networks such as the public Internet. Projections for IoT device numbers reach the scale of billions within the next several years. For such an event to be feasible without catastrophic security risk, IoT needs to be made scalable, secure, and have low transaction latency. Blockchain could provide the answer to all three challenges. Furthermore, since data can have different requirements for privacy, latency, or authenticity dependent upon the application, a blockchain could be tailored to reflect the needs of the data transfer. Rather than focus on a large selection of blockchain solutions, a singular solution would improve interoperability between networks. A blockchain solution needs to be flexible in order to cater to the diversity of an IoT ecosystem. This thesis proposes the potential of a secure, global IoT network by means of a self-tailoring blockchain solution and suggests possible first steps toward such a world.", acknowledgement = ack-nhfb, advisor = "John J. Prevost", keywords = "0464:Computer Engineering; 0544:Electrical engineering; Applied sciences; Blockchain; Computer Engineering; Electrical engineering; Internet of things", ris-m1 = "10928566", } @InCollection{Streng:2018:BCM, author = "Marco Streng", title = "Blockchain --- the Case for Market Adoption of the Distributed Ledger", crossref = "Linnhoff-Popien:2018:DMU", pages = "65--70", year = "2018", DOI = "https://doi.org/10.1007/978-3-662-49275-8_9", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-49275-8_9", acknowledgement = ack-nhfb, } @Article{Subramanian:2018:DBB, author = "Hemang Subramanian", title = "Decentralized blockchain-based electronic marketplaces", journal = j-CACM, volume = "61", number = "1", pages = "78--84", month = jan, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3158333", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Dec 28 08:02:52 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "http://cacm.acm.org/magazines/2018/1/223888/fulltext", abstract = "In a decentralized marketplace, buyers and sellers transact directly, without manipulation by intermediary platforms.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Tuarob:2018:DDB, author = "Suppawong Tuarob and Ray Strong and Anca Chandra and Conrad S. Tucker", title = "Discovering Discontinuity in Big Financial Transaction Data", journal = j-TMIS, volume = "9", number = "1", pages = "3:1--3:??", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3159445", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business transactions are typically recorded in the company ledger. The primary purpose of such financial information is to accompany a monthly or quarterly report for executives to make sound business decisions and strategies for the next business period. These business strategies often result in transitions that cause underlying infrastructures and components to change, including alteration in the nomenclature system of the business components. As a result, a transaction stream of an affected component would be replaced by another stream with a different component name, resulting in discontinuity of a financial stream of the same component. Recently, advancement in large-scale data mining technologies has enabled a set of critical applications to utilize knowledge extracted from a vast amount of existing data that would otherwise have been unused or underutilized. In financial and services computing domains, recent studies have illustrated that historical financial data could be used to predict future revenues and profits, optimizing costs, among other potential applications. These prediction models rely on long-term availability of the historical data that traces back for multiple years. However, the discontinuity of the financial transaction stream associated with a business component has limited the learning capability of the prediction models. In this article, we propose a set of machine learning-based algorithms to automatically discover component name replacements, using information available in general ledger databases. The algorithms are designed to be scalable for handling massive data points, especially in large companies. Furthermore, the proposed algorithms are generalizable to other domains whose data is time series and shares the same nature as the financial data available in business ledgers. A case study of real-world IBM service delivery retrieved from four different geographical regions is used to validate the efficacy of the proposed methodology.", acknowledgement = ack-nhfb, articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Misc{Tung:2018:WSM, author = "Liam Tung", title = "{Windows} security: {Microsoft} fights massive cryptocoin miner malware outbreak: {Microsoft} has blocked a malware outbreak that could have earned big bucks for one criminal group", howpublished = "ZDNet Web story.", day = "8", month = mar, year = "2018", bibdate = "Sat Mar 10 08:56:38 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.zdnet.com/article/windows-security-microsoft-fights-massive-cryptocoin-miner-malware-outbreak/", abstract = "Microsoft has blocked a rapidly spreading malware outbreak that could have infected nearly 500,000 Windows PCs within hours on March 6. The trojan, known as Dofoil or Smoke Loader, was designed to deliver a range of payload. However, in this case, it dropped a cryptocurrency miner on infected PCs, in order to earn those behind the trojan Electroneum coins from victims' CPUs.", acknowledgement = ack-nhfb, } @Article{Tziakouris:2018:CFC, author = "Giannis Tziakouris", title = "Cryptocurrencies --- A Forensic Challenge or Opportunity for Law Enforcement? {An} {INTERPOL} Perspective", journal = j-IEEE-SEC-PRIV, volume = "16", number = "4", pages = "92--94", month = jul # "\slash " # aug, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1109/MSP.2018.3111243", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Thu Sep 13 10:31:41 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", URL = "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040092-abs.html", acknowledgement = ack-nhfb, journal-URL = "https://publications.computer.org/security-and-privacy/", } @Article{vanMoorsel:2018:BMB, author = "Aad van Moorsel", title = "Benchmarks and Models for Blockchain: Consensus Algorithms", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "113--113", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308949", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "In this presentation we consider blockchain from a performance engineering perspective, with an emphasis on consensus algorithms. A set of examples of performance characteristics and challenges of public blockchains serves as introduction to the presentation. These examples motivate a list of main topics that require further analysis by the research community, in both public and private blockchain variants. This list considers performance engineering challenges across the different layers of blockchain systems, which we identify as system, connector, and incentives layers, respectively. We go in some more depth regarding the evaluation of consensus algorithms, such as Proof of Work, which are a core element of the connector layer. In the presentation we will advocate probabilistic verification as a key approach to evaluate different consensus algorithms with respect to practically meaningful metrics. Throughout the talk, we present snippets of our recent research results in the area of modelling and benchmarking blockchain systems [1, 2, 3, 4, 5, 6].", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @MastersThesis{Wadas:2018:BBF, author = "David J. Wadas", title = "{Bitcoin} and Blockchain Forensics", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "48", year = "2018", ISBN = "0-355-89265-0", ISBN-13 = "978-0-355-89265-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2038815679", abstract = "Criminal activity surrounding Bitcoins and the blockchain have removed the barriers of the geography of illegal activity. Bitcoins have allowed multinational trading of illicit goods and services, as well as theft over the Dark Web. With this new cryptocurrency in a boom, forensic examiners are developing new techniques to protect the innocence of individuals participating in fair trade properly, while identifying individuals who partake in mischievous deals. A forensic examiner using validated methods and tools can discover artifacts of a Bitcoin user. Knowing the ownership of Bitcoin addresses allow law enforcement to track down corruption or illicit purchases. Utilizing the blockchain, an examiner can trace the path of a Bitcoin transaction from the most recent activity to its origin. The discovery of internet protocol (IP) patterns can support the origination of a Bitcoin address providing law enforcement with the ability to subpoena internet services provider (ISP) to gather critical information to identify an individual. The ability to identify individuals using Bitcoins is a forensic tactic that needs to be further researched, as well as the ability to use the blockchain for future currencies and tradable objects.", acknowledgement = ack-nhfb, advisor = "Christopher Riddell and Duane Corbo", keywords = "0489:Information Technology; Applied sciences; Bitcoin; Blockchain; Cybersecurity; Forensics; Information Technology; Professor Christopher Riddell", ris-m1 = "10809513", } @Article{Waldo:2018:HGB, author = "Jim Waldo", title = "A {Hitchhiker}'s Guide to the Blockchain Universe", journal = j-QUEUE, volume = "16", number = "6", pages = "10", month = nov, year = "2018", CODEN = "AQCUAE", DOI = "https://doi.org/10.1145/3305263.3305265", ISSN = "1542-7730 (print), 1542-7749 (electronic)", ISSN-L = "1542-7730", bibdate = "Wed Dec 11 08:08:33 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/queue.bib", URL = "http://queue.acm.org/detail.cfm?id=3305265", abstract = "Blockchain remains a mystery, despite its growing acceptance.", acknowledgement = ack-nhfb, fjournal = "ACM Queue: Tomorrow's Computing Today", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J882", } @Article{Wang:2018:FES, author = "Sheng Wang and Tien Tuan Anh Dinh and Qian Lin and Zhongle Xie and Meihui Zhang and Qingchao Cai and Gang Chen and Beng Chin Ooi and Pingcheng Ruan", title = "{Forkbase}: an efficient storage engine for blockchain and forkable applications", journal = j-PROC-VLDB-ENDOWMENT, volume = "11", number = "10", pages = "1137--1150", month = jun, year = "2018", CODEN = "????", DOI = "https://doi.org/10.14778/3231751.3231762", ISSN = "2150-8097", bibdate = "Thu Jul 26 16:31:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "Existing data storage systems offer a wide range of functionalities to accommodate an equally diverse range of applications. However, new classes of applications have emerged, e.g., blockchain and collaborative analytics, featuring data versioning, fork semantics, tamper-evidence or any combination thereof. They present new opportunities for storage systems to efficiently support such applications by embedding the above requirements into the storage. In this paper, we present ForkBase, a storage engine designed for blockchain and forkable applications. By integrating core application properties into the storage, ForkBase not only delivers high performance but also reduces development effort. The storage manages multiversion data and supports two variants of fork semantics which enable different fork workflows. ForkBase is fast and space efficient, due to a novel index class that supports efficient queries as well as effective detection of duplicate content across data objects, branches and versions. We demonstrate ForkBase's performance using three applications: a blockchain platform, a wiki engine and a collaborative analytics application. We conduct extensive experimental evaluation against respective state-of-the-art solutions. The results show that ForkBase achieves superior performance while significantly lowering the development effort.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @Article{Wang:2018:LMD, author = "Mingming Wang and Qianhong Wu and Bo Qin and Qin Wang and Jianwei Liu and Zhenyu Guan", title = "Lightweight and Manageable Digital Evidence Preservation System on Bitcoin", journal = "J. Comput. Sci. Technol.", volume = "33", number = "3", pages = "568--586", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s11390-018-1841-4", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jcst/jcst33.html#WangWQWLG18", acknowledgement = ack-nhfb, dblp-key = "journals/jcst/WangWQWLG18", dblp-mdate = "2020-06-24", } @Article{Weaver:2018:IRR, author = "Nicholas Weaver", title = "Inside risks: Risks of cryptocurrencies", journal = j-CACM, volume = "61", number = "6", pages = "20--24", month = jun, year = "2018", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3208095", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jun 5 14:47:04 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2018/6/228046/fulltext", abstract = "Considering the inherent risks of cryptocurrency ecosystems.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Welch:2018:DCCb, author = "Jennifer L. Welch", title = "Distributed Computing Column 70: Formalizing and Implementing Distributed Ledger Objects", journal = j-SIGACT, volume = "49", number = "2", pages = "57--57", month = jun, year = "2018", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/3232679.3232690", ISSN = "0163-5700 (print), 1943-5827 (electronic)", bibdate = "Sun Jul 29 14:55:35 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", abstract = "Blockchains and distributed ledgers, the technologies underlying Bitcoin and other decentralized transaction systems, have been garnering increasing interest in the theoretical distributed computing community. The current column, by Antonio Fern{\'a}ndez Anta, Chryssis Georgiou, Kishori Konwar, and Nicolas Nicolaou, starts with an informative overview of the world of distributed ledgers and motivates the need for rigorous approaches. The authors present an approach for formally specifying a distributed ledger in the context of several popular consistency conditions. The authors then give algorithms that implement the different variants in message-passing systems subject to crash failures. The article closes with a discussion of intriguing open questions. Many thanks to Antonio, Chryssis, Kishori and Nicolas for their timely contribution!", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @Book{Werbach:2018:BNA, author = "KevinIn Werbach", title = "The Blockchain and the New Architecture of Digital Trust", publisher = pub-MIT, address = pub-MIT:adr, pages = "xvi + 322", year = "2018", ISBN = "0-262-03893-5 (print), 0-262-34977-9 (e-book)", ISBN-13 = "978-0-262-03893-5 (print), 978-0-262-34977-2 (e-book)", LCCN = "HG1710 .W47 2018", bibdate = "Sat Apr 17 15:53:46 MDT 2021", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "Information policy series", URL = "http://mitpress.mit.edu/9780262038935", abstract = "How the blockchain --- a system built on foundations of mutual mistrust --- can become trustworthy. The blockchain entered the world on January 3, 2009, introducing an innovative new trust architecture: an environment in which users trust a system --- for example, a shared ledger of information --- without necessarily trusting any of its components. The cryptocurrency Bitcoin is the most famous implementation of the blockchain, but hundreds of other companies have been founded and billions of dollars invested in similar applications since Bitcoin's launch. Some see the blockchain as offering more opportunities for criminal behavior than benefits to society. In this book, Kevin Werbach shows how a technology resting on foundations of mutual mistrust can become trustworthy.\par The blockchain, built on open software and decentralized foundations that allow anyone to participate, seems like a threat to any form of regulation. In fact, Werbach argues, law and the blockchain need each other. Blockchain systems that ignore law and governance are likely to fail, or to become outlaw technologies irrelevant to the mainstream economy. That, Werbach cautions, would be a tragic waste of potential. If, however, we recognize the blockchain as a kind of legal technology that shapes behavior in new ways, it can be harnessed to create tremendous business and social value.", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Blockchains (Databases); Bitcoin; Trust; Finance; Technological innovations; Bitcoin; Blockchains (Databases); Electronic funds transfers; Technological innovations; Trust", tableofcontents = "Introduction: The parable of the tree \\ I. A revolution in nine pages \\ The trust challenge \\ Satoshi's solution \\ More than money \\ Why Blockchain? \\ II. Ledgers meet law \\ Unpacking blockchain trust \\ What could possibly go wrong? \\ Blockchain governance \\ Blockchain as/and law \\ We're from the government, and we're here to help \\ III. Building the decentralized future \\ Connecting the legal and the technical \\ An unpredictable certainty \\ Conclusion", } @Article{Wilkes:2018:ECH, author = "Tommy Wilkes and Sujata Rao and Catherine Evans and Larry King", title = "Exclusive: {Coincheck} Hackers Trying to Move Stolen Cryptocurrency-Executive", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "30", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Jan 30 14:51:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/reuters/2018/01/30/business/30reuters-japan-cryptocurrency-cybercrime.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the story: ``The coins that the hackers had taken made up around 5 percent of the total supply of XEM, the world's 10th biggest cryptocurrency, according to trade website Coinmarketcap. \ldots{} At least three dozen heists on cryptocurrency exchanges since 2011 are known; many of the hacked exchanges later shut down. More than 980,000 bitcoins have been stolen, and few have ever been recovered.''", } @Article{Wilson:2018:CHI, author = "Thomas Wilson and Hideyuki Sano and Marius Zaharia and Shri Navaratnam", title = "The {Coincheck} Hack and the Issue With Crypto Assets on Centralized Exchanges", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "29", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Jan 30 14:51:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/reuters/2018/01/29/business/29reuters-japan-cryptocurrency-q-a.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the article: ``What is Nem? NEM is a cryptocurrency launched in March 2015 by a team of five developers identifying themselves as Pat, Makoto, Gimre, BloodyRookie and Jaguar. Its acronym stands for New Economy Movement and, like other cryptocurrencies, markets itself as a digital coin outside the control of governments and central banks, which can be used for fast, global transactions.''", } @InCollection{Winkler:2018:FBK, author = "Nils Winkler and Bj{\"o}rn Matthies", booktitle = "Digital Marketplaces Unleashed", title = "{FinTech} and Blockchain --- Keep Bubbling? {Or} Better Get Real?", publisher = pub-SV, address = pub-SV:adr, pages = "371--383", month = sep, year = "2018", DOI = "https://doi.org/10.1007/978-3-662-49275-8_35", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-662-49275-8_35", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-662-49275-8", } @Misc{Wolfram:2018:RAB, author = "Stephen Wolfram", title = "Roaring into 2018 with Another Big Release: Launching Version 11.3 of the {Wolfram} Language \& {Mathematica}", howpublished = "Web site.", day = "8", month = mar, year = "2018", bibdate = "Fri Mar 16 17:43:47 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "There is a section about new Blockchain features, with support for Bitcoin and Ethereum.", URL = "http://blog.wolfram.com/2018/03/08/roaring-into-2018-with-another-big-release-launching-version-11-3-of-the-wolfram-language-mathematica/", acknowledgement = ack-nhfb, } @InCollection{Xu:2018:BBS, author = "Quanqing Xu and Khin Mi Mi Aung and Yongqing Zhu and Khai Leong Yong", booktitle = "New Advances in the {Internet of Things}", title = "A Blockchain-Based Storage System for Data Analytics in the {Internet of Things}", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-58190-3_8", bibdate = "Wed Jan 24 08:10:08 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-319-58190-3_8", acknowledgement = ack-nhfb, } @TechReport{Yaga:2018:BTO, author = "Dylan Yaga and Peter Mell and Nik Roby and Karen Scarfone", title = "Blockchain Technology Overview", type = "Draft Report", number = "NISTIR 8202", institution = pub-NIST, address = pub-NIST:adr, pages = "2 + viii + 9--57", month = jan, year = "2018", bibdate = "Wed Jan 31 15:51:57 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://csrc.nist.gov/CSRC/media/Publications/nistir/8202/draft/documents/nistir8202-draft.pdf", abstract = "Blockchains are immutable digital ledger systems implemented in a distributed fashion (i.e., without a central repository) and usually without a central authority. At its most basic level, they enable a community of users to record transactions in a ledger public to that community such that no transaction can be changed once published. This document provides a high-level technical overview of blockchain technology. It discusses its application to electronic currency in depth, but also shows its broader applications. The purpose is to help readers understand how blockchains work, so that they can be appropriately and usefully applied to technology problems. Additionally, this document explores some specific blockchain applications and some examples of when a blockchain system should be considered for use.", acknowledgement = ack-nhfb, } @Article{Yamazaki:2018:JPC, author = "Makiko Yamazaki and Takahiko Wada and Thomas Wilson and Chang-Ran Kim and Vidya Ranganathan and Chang-Ran Kim", title = "{Japan} Punishes {Coincheck} After \$530 Million Cryptocurrency Theft", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "28", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Jan 30 14:51:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/reuters/2018/01/28/technology/28reuters-japan-cryptocurrency.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Article{Yamazaki:2018:JRC, author = "Makiko Yamazaki and Takahiko Wada and Hideyuki Sano and Chang-Ran Kim and Ayai Tomisawa and Megumi Lim and Tetsushi Kajimoto and Vidya Ranganathan and Chang-Ran Kim and Shri Navaratnam and Sam Holmes", title = "{Japan} Raps {Coincheck}, Orders Broader Checks After \$530 Million Cryptocurrency Theft", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "29", month = jan, year = "2018", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Tue Jan 30 14:51:30 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.nytimes.com/reuters/2018/01/29/business/29reuters-japan-cryptocurrency.html", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", remark = "From the story: ``The Financial Services Agency (FSA) [of Japan] on Monday ordered improvements to operations at Coincheck, which on Friday suspended trading in all cryptocurrencies except bitcoin after hackers stole 58 billion yen (\$534 million) of NEM coins, among the most popular digital currencies in the world.'' \ldots{} ``World leaders meeting in Davos last week issued fresh warnings about the dangers of cryptocurrencies, \ldots{}''", } @Article{Yang:2018:BBP, author = "Changsong Yang and Xiaofeng Chen and Yang Xiang", title = "Blockchain-based publicly verifiable data deletion scheme for cloud storage", journal = j-J-NETW-COMPUT-APPL, volume = "103", number = "??", pages = "185--193", day = "1", month = feb, year = "2018", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Fri Jan 12 10:10:21 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804517303910", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @MastersThesis{Yewale:2018:SBS, author = "Aniket Yewale", title = "Study of Blockchain-as-a-Service Systems with a Case Study of Hyperledger Fabric Implementation on {Kubernetes}", type = "{M.S.C.S.}", school = "University of Nevada, Las Vegas", address = "Las Vegas, NV, USA", pages = "92", year = "2018", ISBN = "0-438-84221-9", ISBN-13 = "978-0-438-84221-2", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2181699563", abstract = "Blockchain is a shared, immutable, decentralized ledger to record the transaction history. Blockchain technology has changed the world, changed the way we do the business. It has transformed the commerce across every industry, which may be supply chain, IoT, financial services, banking, healthcare, agriculture and many more. It had introduced a new way of transactional applications that bring trust, security, transparency and accountability. To develop any blockchain use case, the main task is to develop an environment for creating and deploying the application. In our case, we created an environment on IBM Cloud Kubernetes service using Kubernetes, a container orchestration tool and implemented Hyperledger Fabric network to create and deploy blockchain applications. Implementing Hyperledger Fabric business blockchain network on IBM Cloud Kubernetes service provides several advantages. We can have multiple users work on the same setup. Moreover, this setup can be used and reused for many different blockchain applications as well as for deploying chaincodes and smart contracts. Fabric components can accomplish high availability by deploying on Kubernetes. We can execute several isolated Fabric instances on our Kubernetes platform as it supports multi-tenancy. This makes it easier for us to develop and test the blockchain applications. Hyperledger Fabric and Kubernetes, both if used together delivers a powerful and secure platform for processing blockchain transactions.", acknowledgement = ack-nhfb, advisor = "Yoohwan Kim", keywords = "0984:Computer science; Applied sciences; Computer science; Container orchestration tool; Ibm cloud", ris-m1 = "10846144", } @InCollection{Yoo:2018:SSA, author = "Minjae Yoo and Yoojae Won", booktitle = "Advances in Computer Science and Ubiquitous Computing", title = "Study on Smart Automated Sales System with Blockchain-Based Data Storage and Management", publisher = pub-SV, address = pub-SV:adr, pages = "734--740", year = "2018", DOI = "https://doi.org/10.1007/978-981-10-7605-3_118", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/chapter/10.1007/978-981-10-7605-3_118", acknowledgement = ack-nhfb, } @Article{Zander:2018:DSD, author = "Manuel Zander and Tom Waite and Dominik Harz", title = "{DAGsim}: Simulation of {DAG}-based distributed ledger protocols", journal = j-SIGMETRICS, volume = "46", number = "3", pages = "118--121", month = dec, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3308897.3308951", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Feb 2 07:14:43 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", abstract = "Scalability of distributed ledgers is a key adoption factor. As an alternative to blockchain-based protocols, directed acyclic graph (DAG) protocols are proposed with the intention to allow a higher volume of transactions to be processed. However, there is still limited understanding of the behaviour and security considerations of DAG-based systems. We present an asynchronous, continuous time, and multi-agent simulation framework for DAG-based cryptocurrencies. We model honest and semi-honest actors in the system to analyse the behaviour of one specific cryptocurrency, IOTA. Our simulations show that the agents that have low latency and a high connection degree have a higher probability of having their transactions accepted in the network with honest and semi-honest strategies. Last, the simulator is built with extensibility in mind. We are in the process of implementing SPECTRE as well as including malicious agents.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @Article{Zhang:2018:MDC, author = "Wei Zhang and Pengfei Wang and Xiao Li and Dehua Shen", title = "Multifractal Detrended Cross-Correlation Analysis of the Return-Volume Relationship of Bitcoin Market", journal = "Complex.", volume = "2018", number = "??", pages = "8691420:1--8691420:20", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.1155/2018/8691420", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/complexity/complexity2018.html#ZhangWLS18", acknowledgement = ack-nhfb, dblp-key = "journals/complexity/ZhangWLS18", dblp-mdate = "2020-09-30", } @Article{Zhu:2018:SRD, author = "Saide Zhu and Wei Li and Hong Li and Chunqiang Hu and Zhipeng Cai", title = "A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining", journal = "Math. Found. Comput.", volume = "1", number = "4", pages = "393--414", month = "????", year = "2018", CODEN = "????", DOI = "https://doi.org/10.3934/mfc.2018020", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/mfc/mfc1.html#ZhuLLHC18; https://www.wikidata.org/entity/Q111689464", acknowledgement = ack-nhfb, dblp-key = "journals/mfc/ZhuLLHC18", dblp-mdate = "2022-08-16", } @Article{Ziegeldorf:2018:SAD, author = "Jan Henrik Ziegeldorf and Roman Matzutt and Martin Henze and Fred Grossmann and Klaus Wehrle", title = "Secure and anonymous decentralized {Bitcoin} mixing", journal = j-FUT-GEN-COMP-SYS, volume = "80", number = "??", pages = "448--466", month = mar, year = "2018", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Sat Dec 2 16:58:42 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X16301297", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Aggarwal:2019:BSC, author = "Shubhani Aggarwal and Rajat Chaudhary and Gagangeet Singh Aujla and Neeraj Kumar and Kim-Kwang Raymond Choo and Albert Y. Zomaya", title = "Blockchain for smart communities: Applications challenges and opportunities", journal = j-J-NETW-COMPUT-APPL, volume = "144", number = "??", pages = "13--48", day = "15", month = oct, year = "2019", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2019.06.018", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:35 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519302231", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Ahmad:2019:STA, author = "Ashar Ahmad and Muhammad Saad and Aziz Mohaisen", title = "Secure and transparent audit logs with {BlockAudit}", journal = j-J-NETW-COMPUT-APPL, volume = "145", number = "??", pages = "Article 102406", month = "????", year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:35 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519302401", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Ak:2019:BPC, author = "Elif Ak and Berk Canberk", title = "{BCDN}: a proof of concept model for blockchain-aided {CDN} orchestration and routing", journal = j-COMP-NET-AMSTERDAM, volume = "161", number = "??", pages = "162--171", day = "9", month = oct, year = "2019", CODEN = "????", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Mon Oct 14 17:19:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128618313549", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Akcora:2019:BTD, author = "Cuneyt Gurcan Akcora and Yitao Li and Yulia R. Gel and Murat Kantarcioglu", title = "{BitcoinHeist}: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1906.07852; https://dblp.org/db/journals/corr/corr1906.html#abs-1906-07852", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1906-07852", dblp-mdate = "2019-06-24", } @MastersThesis{Al-Housni:2019:ESB, author = "Nasser Al-Housni", title = "An Exploratory Study in Blockchain Technology", type = "{M.Phil.}", school = "The University of Manchester (United Kingdom)", address = "Manchester, UK", pages = "89", year = "2019", ISBN = "1-0835-1220-X", ISBN-13 = "978-1-0835-1220-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2199337101", abstract = "Blockchain is a new technology, which has a huge potential for implementation in a variety of industries. It is commonly discussed merely as an underlying technology to support the Bitcoin (digital currency). However, the Blockchain is actually something deeper: a novel solution to the age-old human problem of trust, fundamentally changing the way Internet transactions can be implemented by ascertaining trust between unknown parties. In addition, they ensure immutability (once information is entered it cannot be modified), incorporate disintermediation (as trust is assured, no third party is required to verify transactions) and results in lower costs (lesser fees are paid to third parties). These advantages and others can produce disruptive changes when properly exploited, inspiring a large number of applications to be developed and implemented. These applications are forming the backbone of what can be called the Internet of value, bound to bring as significant changes as those brought during the last twenty years by the traditional Internet. Yet, we are still at the beginning to fully understand its potential, impact, challenges and possible future directions. Therefore, this exploratory research investigates the Blockchain technology based on a profound literature review. This study explains the technologies behind it and provides an examination of Blockchain{\^a}??s implementation areas and possible implications and outstanding potentials. However, this work will focus on smart contract as one of the potential future research direction in Blockchain technology.", acknowledgement = ack-nhfb, advisor = "Liping Zhao and Kung-Kiu Lau", keywords = "(UMI)AAI13870350; 0984:Computer science; Applied sciences; Computer science", ris-m1 = "13870350", } @Article{Ali:2019:BBB, author = "Gauhar Ali and Naveed Ahmad and Yue Cao and Qazi Ejaz Ali and Fazal Azim and Haitham Cruickshank", title = "{BCON}: {Blockchain} based access {CONtrol} across multiple conflict of interest domains", journal = j-J-NETW-COMPUT-APPL, volume = "147", number = "??", pages = "??--??", day = "1", month = dec, year = "2019", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2019.102440", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:30 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519303005", acknowledgement = ack-nhfb, articleno = "102440", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Ali:2019:BBP, author = "Gauhar Ali and Naveed Ahmad and Yue Cao and Muhammad Asif and Haitham Cruickshank and Qazi Ejaz Ali", title = "Blockchain based permission delegation and access control in {Internet of Things} {(BACI)}", journal = j-COMPUT-SECUR, volume = "86", number = "??", pages = "318--334", month = sep, year = "2019", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.06.010", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301208", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @MastersThesis{Ali:2019:DII, author = "Isra Mohamed Ali", title = "Design and Implementation of an {IDPS} for the Blockchain Network", type = "{M.S.}", school = "Hamad Bin Khalifa University", address = "Doha, Qatar", pages = "91", year = "2019", ISBN = "1-0883-7129-9", ISBN-13 = "978-1-0883-7129-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2311651908", abstract = "Blockchain is widely adopted by decentralized applications for the strong security guarantees it offers, enabling trusted exchange of transactions in fully distributed peer-to-peer networks. These security guarantees, ideally, prevent malicious actors from manipulating or forging the distributed ledger in which the transactions are stored. However, the lack of content validation allows attackers to append formally valid transactions that contain malicious code, intended to exploit blockchain software vulnerabilities, to the ledger. As a result, several blockchain implementations have suffered from huge amount of monetary losses and compromises that undermined their security features and guarantees. In this thesis, we propose a signature-based collaborative blockchain intrusion detection system, BID, that enables all nodes in the network to detect and prevent the execution of malicious transactions without disrupting the underlying consensus protocol. The system provides the network with a trusted, immutable, unified, up-to-date view of the signature-database hence avoiding hard forks and ensuring the security of each node. We introduce BID from a design perspective and provide a prototype implementation based on the Ethereum platform, which demonstrates the feasibility of our approach. In particular, the introduced overhead in our Proof of Concept is already quite viable---while code and algorithmic optimization could further reduce it.", acknowledgement = ack-nhfb, advisor = "Roberto Di Pietro and Matteo Signorin", keywords = "0489:Information Technology; 0984:Computer science; Blockchain; CIDS; Computer science; Ethereum; Information technology; Intrusion detection; Intrusion prevention; Malicious transactions", ris-m1 = "22589098", } @MastersThesis{AlMahmood:2019:PRS, author = "Dalal AlMahmood", title = "Promoting Retail {Sukuk} Using Blockchain Technology", type = "{M.S.}", school = "Hamad Bin Khalifa University (Qatar)", address = "Doha, Qatar", pages = "146", year = "2019", ISBN = "1-392-15215-1", ISBN-13 = "978-1-392-15215-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2235423767", abstract = "Access to financial services is just one of the challenges faced by the poor, but if achieved it can help address some of the other development challenges they face. Addressing the challenges to financial inclusion requires innovative approaches. This paper studies two innovative concepts which are retail sukuk and blockchain and explores how they can be used together to promote Islamic finance and financial inclusion. The objective of the paper is to provide an overview of sukuk and how it can address financial inclusion and provide an overview of Blockchain technology. The paper also presents blockchain use cases in the financial sector and Sharia perspective on using the technology. Indonesia experience in retail sukuk is reviewed to understand the required framework and process of issuance. The study also suggests a blockchain platform for retail sukuk subscription. The study concluded that for the presented solution to succeed in addressing financial inclusion, efforts need to be exerted to raise the retail customer financial and technology literacy. Moreover, the blockchain platform proposed has the potential to eliminate intermediaries but with minimum cost reduction.", acknowledgement = ack-nhfb, advisor = "Dalal Aassouli", keywords = "0508:Finance; 0512:Islamic Studies; Blockchain; Finance; Islamic Studies; Retail sukuk; Social sciences", ris-m1 = "13861847", } @Article{AlOmar:2019:PFP, author = "Abdullah {Al Omar} and Md Zakirul Alam Bhuiyan and Anirban Basu and Shinsaku Kiyomoto and Mohammad Shahriar Rahman", title = "Privacy-friendly platform for healthcare data in cloud based on blockchain environment", journal = j-FUT-GEN-COMP-SYS, volume = "95", number = "??", pages = "511--521", month = jun, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18314201", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @PhdThesis{Alzahrani:2019:SAC, author = "Naif Saeed Alzahrani", title = "A Secure Anti-Counterfeiting System Using Near Field Communication, Public Key Cryptography, Blockchain, and {Bayesian} Games", type = "{Ph.D.}", school = "Portland State University", address = "Portland, OR, USA", pages = "176", year = "2019", ISBN = "1-0883-0493-1", ISBN-13 = "978-1-0883-0493-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2305527274", abstract = "Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades [56]. To combat this problem, many anti-counterfeiting approaches have been proposed [43,79,88,99]. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeiting approaches track-and-trace the physical locations of products as the products flow through supply chains.", acknowledgement = ack-nhfb, advisor = "Nirupama Bulusu", keywords = "0984:Computer science; Anti-Counterfeiting; Bayesian Games; Blockchain; Computer science; Consensus protocols; Near Field Communication; Public Key Cryptography", ris-m1 = "13900130", } @Article{Amiri:2019:CCA, author = "Mohammad Javad Amiri and Divyakant Agrawal and Amr {El Abbadi}", title = "{CAPER}: a cross-application permissioned blockchain", journal = j-PROC-VLDB-ENDOWMENT, volume = "12", number = "11", pages = "1385--1398", month = jul, year = "2019", CODEN = "????", DOI = "https://doi.org/10.14778/3342263.3342275", ISSN = "2150-8097", bibdate = "Wed Oct 2 06:49:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "Despite recent intensive research, existing blockchain systems do not adequately address all the characteristics of distributed applications. In particular, distributed applications collaborate with each other following service level agreements (SLAs) to provide different services. While collaboration between applications, e.g., cross-application transactions, should be visible to all applications, the internal data of each application, e.g, internal transactions, might be confidential. In this paper, we introduce CAPER, a permissioned blockchain system to support both internal and cross-application transactions of collaborating distributed applications. In CAPER, the blockchain ledger is formed as a directed acyclic graph where each application accesses and maintains only its own view of the ledger including its internal and all cross-application transactions. CAPER also introduces three consensus protocols to globally order cross-application transactions between applications with different internal consensus protocols. The experimental results reveal the efficiency of CAPER in terms of performance and scalability.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @Misc{Anonymous:2019:BCE, author = "Anonymous", title = "[{Binance Cryptocurrency Exchange} Loses Millions to Theft]", howpublished = "Web news stories.", day = "10", month = may, year = "2019", bibdate = "Fri May 10 14:38:03 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://binance.zendesk.com/hc/en-us/articles/360028031711-Binance-Security-Breach-Update; http://www.cnbc.com/2019/05/08/binance-bitcoin-hack-over-40-million-of-cryptocurrency-stolen.html; http://www.vice.com/en_us/article/pajapb/40m-hack-is-expensive-lesson-for-binance-ceo-says; http://www.wired.com/story/hack-binance-cryptocurrency-exchange/; http://www.zdnet.com/article/hackers-steal-41-million-from-cryptocurrency-exchange-binance/", acknowledgement = ack-nhfb, } @Misc{Anonymous:2019:GCU, author = "Anonymous", title = "Giving Currency to Not Using Currency", howpublished = "AMS Mathematical Moments Web site", year = "2019", bibdate = "Fri Apr 26 15:58:26 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ams.org/publicoutreach/mathmoments/mm134-bitcoin.pdf", acknowledgement = ack-nhfb, } @Article{Anonymous:2019:PBT, author = "Anonymous", title = "Preface: Blockchain: From Technology to Solutions", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "1--2", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2912087", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Blockchain; Computer architecture; Cryptography; Fabrics; History; Smart contracts; Supply chains", } @Article{Ansah:2019:BPB, author = "Albert Kofi Kwansah Ansah and Daniel Adu-Gyamfi and Stephen Anokye", title = "{BiSign}: pairing-based anonymity in bitcoin cryptocurrency", journal = "Int. J. Inf. Priv. Secur. Integr.", volume = "4", number = "2", pages = "115--133", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1504/IJIPSI.2019.106598", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijipsi/ijipsi4.html#AnsahAA19", acknowledgement = ack-nhfb, dblp-key = "journals/ijipsi/AnsahAA19", dblp-mdate = "2020-07-09", } @Article{Atsalakis:2019:BPF, author = "George S. Atsalakis and Ioanna G. Atsalaki and Fotios Pasiouras and Constantin Zopounidis", title = "Bitcoin price forecasting with neuro-fuzzy techniques", journal = j-EUR-J-OPER-RES, volume = "276", number = "2", pages = "770--780", month = "????", year = "2019", CODEN = "EJORDT", DOI = "https://doi.org/10.1016/j.ejor.2019.01.040", ISSN = "????", ISSN-L = "0377-2217", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/eor/eor276.html#AtsalakisAPZ19", acknowledgement = ack-nhfb, dblp-key = "journals/eor/AtsalakisAPZ19", dblp-mdate = "2020-02-21", fjournal = "European Journal of Operational Research", journal-URL = "http://www.sciencedirect.com/science/journal/03772217", } @Article{Avarikioti:2019:BSU, author = "Georgia Avarikioti and Lukas Kaeppeli and Yuyi Wang and Roger Wattenhofer", title = "Bitcoin Security under Temporary Dishonest Majority", journal = "CoRR", volume = "abs/1908.00427", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1908.00427; https://dblp.org/db/journals/corr/corr1908.html#abs-1908-00427", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1908-00427", dblp-mdate = "2019-08-09", } @Article{Azzolini:2019:STF, author = "Damiano Azzolini and Fabrizio Riguzzi and Evelina Lamma", title = "Studying Transaction Fees in the Bitcoin Blockchain with Probabilistic Logic Programming", journal = "Inf.", volume = "10", number = "11", pages = "335", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/info10110335", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/information/information10.html#AzzoliniRL19; https://www.wikidata.org/entity/Q111688792", acknowledgement = ack-nhfb, dblp-key = "journals/information/AzzoliniRL19", dblp-mdate = "2022-08-16", } @PhdThesis{Baidoo:2019:RET, author = "Samuel Addo Baidoo", title = "Regulatory Effects on Traditional Financial Systems Versus Blockchain and Emerging Financial Systems", type = "{Ph.D.}", school = "Walden University", address = "Minneapolis, MN, USA", pages = "158", year = "2019", ISBN = "1-0855-8892-0", ISBN-13 = "978-1-0855-8892-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2275281673", abstract = "The expansion of the Internet led to disruptive business and consumer processes, as existing regulations do not cover the scope and scale of emerging financial technologies. Using organization economic theory as the foundation, the purpose of this correlational study was to examine and compare the financial regulatory impact on traditional and emerging financial systems across a variety of factors including organizational type, predicted users, operational concerns, reasons for cost increases, and changes in business practices as a result of the regulatory environment. Data were collected through a survey of 227 adult Americans who engage in the financial sector and are familiar with the US regulatory environment. Data were analyzed using descriptive statistics, cross tabulations, and statistical significance was tested using Lambda and Kendall's Tau c. The key finding of this study is that the effects of regulations are different for the traditional and emerging financial systems, showing the need to develop and implement policies that are context specific to the emerging financial systems. The recommendations from the study include suggestions to regulatory agencies to regulate and support emerging financial systems in line with new technology that envisions efficiency and economic fairness. The positive social change implications for this study include the development of a strategy that can ensure economic stability, reduce irregularities, and strengthen investments with a view of protecting the financial system from breakdown.", acknowledgement = ack-nhfb, advisor = "Ernesto Escobedo", keywords = "0508:Finance; 0617:Public administration; 0630:Public policy; Blockchain; Emerging technologies; Finance; Financial regulations; Financial systems; Financial technology; Law and policy; Public administration; Public policy", ris-m1 = "13902523", } @MastersThesis{Banerjee:2019:BIT, author = "Debrath Banerjee", title = "Blockchain in {Internet of Things (IoT)}", type = "{M.S.}", school = "Arkansas State University", address = "Jonesboro, AR, USA", pages = "144", year = "2019", ISBN = "1-0857-6259-9", ISBN-13 = "978-1-0857-6259-5", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2295593230", abstract = "Nowadays, Blockchain is not an enigmatic technical term rather a technology that holds promise as a way not only to record financial transactions but also to decentralize infrastructure and build a trust layer for business logic. Currently blockchain development is undoubtedly empowering many financial sectors. However non-financial application areas have incredibly grown complex due to the involvement of IoT. So, although they intend to reshape the model, still lots of uncertainty exist in terms of effectiveness. In convergence of blockchain and IoT, there is no definite design model. We have developed a blockchain based IoT platform to replace the traditional monolithic sales order management process. The design prototype is associated with the contract creation to enable automated fulfillment of orders from warehouse. This hybrid design represents the convergence of smart contract enabled private Ethereum blockchain with IoT and also ensures IoT security and controls with combination of AWS IoT cloud services.", acknowledgement = ack-nhfb, advisor = "Hai Jiang", keywords = "0489:Information Technology; 0984:Computer science; Blockchain; Computer science; Information technology; Internet of things; Non-financial application areas", ris-m1 = "13901547", } @Article{Bartoletti:2019:JBM, author = "Massimo Bartoletti and Bryn Bellomy and Livio Pompianu", title = "A Journey into {Bitcoin} Metadata", journal = j-J-GRID-COMP, volume = "17", number = "1", pages = "3--22", month = mar, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s10723-019-09473-3", ISSN = "1570-7873 (print), 1572-9184 (electronic)", ISSN-L = "1570-7873", bibdate = "Fri Oct 11 06:43:46 MDT 2019", bibsource = "http://link.springer.com/journal/10723/17/1; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jgridcomp.bib", URL = "https://dblp.org/db/journals/grid/grid17.html#BartolettiBP19; https://link.springer.com/article/10.1007/s10723-019-09473-3", acknowledgement = ack-nhfb, dblp-key = "journals/grid/BartolettiBP19", dblp-mdate = "2019-05-31", fjournal = "Journal of Grid Computing", journal-URL = "http://link.springer.com/journal/10723", } @Article{Bartolucci:2019:PME, author = "Silvia Bartolucci and Fabio Caccioli and Pierpaolo Vivo", title = "A percolation model for the emergence of the Bitcoin Lightning Network", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1912.03556; https://dblp.org/db/journals/corr/corr1912.html#abs-1912-03556", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1912-03556", dblp-mdate = "2020-01-02", } @Article{Bellini:2019:EID, author = "Alessandro Bellini and Emanuele Bellini and Monica Gherardelli and Franco Pirri", title = "Enhancing {IoT} Data Dependability through a Blockchain Mirror Model", journal = j-FUTURE-INTERNET, volume = "11", number = "5", pages = "117", day = "21", month = may, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11050117", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:06 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/5/117", abstract = "The Internet of Things (IoT) is a remarkable data producer and these data may be used to prevent or detect security vulnerabilities and increase productivity by the adoption of statistical and Artificial Intelligence (AI) techniques. However, these desirable benefits are gained if data from IoT networks are dependable --- this is where blockchain comes into play. In fact, through blockchain, critical IoT data may be trusted, i.e., considered valid for any subsequent processing. A simple formal model named ``the Mirror Model'' is proposed to connect IoT data organized in traditional models to assets of trust in a blockchain. The Mirror Model sets some formal conditions to produce trusted data that remain trusted over time. A possible practical implementation of an application programming interface (API) is proposed, which keeps the data and the trust model in synch. Finally, it is noted that the Mirror Model enforces a top-down approach from reality to implementation instead of going the opposite way as it is now the practice when referring to blockchain and the IoT.", acknowledgement = ack-nhfb, remark = "Special Issue 10th Anniversary Feature Papers.", } @Article{Benhamouda:2019:SPD, author = "F. Benhamouda and S. Halevi and T. Halevi", title = "Supporting private data on {Hyperledger Fabric} with secure multiparty computation", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "3:1--3:8", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2913621", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Blockchain; Computer architecture; Cryptography; Fabrics; Peer-to-peer computing; Smart contracts", } @Article{Beres:2019:CTA, author = "Ferenc B{\'e}res and Istv{\'a}n Andr{\'a}s Seres and Andr{\'a}s A. Bencz{\'u}r", title = "A Cryptoeconomic Traffic Analysis of Bitcoins Lightning Network", journal = "CoRR", volume = "abs/1911.09432", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1911.09432; https://dblp.org/db/journals/corr/corr1911.html#abs-1911-09432", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1911-09432", dblp-mdate = "2019-12-03", } @Article{Bertino:2019:DTB, author = "Elisa Bertino and Ahish Kundu and Zehra Sura", title = "Data Transparency with Blockchain and {AI} Ethics", journal = j-JDIQ, volume = "11", number = "4", pages = "16:1--16:??", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3312750", ISSN = "1936-1955", bibdate = "Tue Oct 22 07:17:01 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jdiq.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3312750", abstract = "Providing a 360${}^\circ $ view of a given data item especially for sensitive data is essential toward not only protecting the data and associated privacy but also assuring trust, compliance, and ethics of the systems that use or manage such data. With the advent of General Data Protection Regulation, California Data Privacy Law, and other such regulatory requirements, it is essential to support data transparency in all such dimensions. Moreover, data transparency should not violate privacy and security requirements. In this article, we put forward a vision for how data transparency would be achieved in a de-centralized fashion using blockchain technology.", acknowledgement = ack-nhfb, articleno = "16", fjournal = "Journal of Data and Information Quality (JDIQ)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1191", } @Article{Bistarelli:2019:EEV, author = "Stefano Bistarelli and Ivan Mercanti and Paolo Santancini and Francesco Santini", title = "End-to-End Voting with Non-Permissioned and Permissioned Ledgers", journal = j-J-GRID-COMP, volume = "17", number = "1", pages = "97--118", month = mar, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s10723-019-09478-y", ISSN = "1570-7873 (print), 1572-9184 (electronic)", ISSN-L = "1570-7873", bibdate = "Fri Oct 11 06:43:46 MDT 2019", bibsource = "http://link.springer.com/journal/10723/17/1; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jgridcomp.bib", URL = "https://link.springer.com/article/10.1007/s10723-019-09478-y", acknowledgement = ack-nhfb, fjournal = "Journal of Grid Computing", journal-URL = "http://link.springer.com/journal/10723", keywords = "Bitcoin; Coloured coin; Distributed ledger; E-voting; MultiChain permissioned ledger; Permissioned block-chain", } @Article{Brincat:2019:UBT, author = "Alberto Attilio Brincat and Alfio Lombardo and Giacomo Morabito and Salvatore Quattropani", title = "On the use of {Blockchain} technologies in {WiFi} networks", journal = j-COMP-NET-AMSTERDAM, volume = "162", number = "??", pages = "Article 106855", month = "????", year = "2019", CODEN = "????", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Mon Oct 14 17:21:59 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128619306073", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Buocz:2019:BGA, author = "Thomas Buocz and Tina Ehrke-Rabel and Elisabeth H{\"o}dl and Iris Eisenberger", title = "Bitcoin and the {GDPR}: Allocating responsibility in distributed networks", journal = "Comput. Law Secur. Rev.", volume = "35", number = "2", pages = "182--198", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1016/j.clsr.2018.12.003", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/clsr/clsr35.html#BuoczEHE19", acknowledgement = ack-nhfb, dblp-key = "journals/clsr/BuoczEHE19", dblp-mdate = "2020-10-26", } @MastersThesis{Buttafoco:2019:ESI, author = "Oona Arlene Buttafoco", title = "Emerging Solutions for the Improvement of Food Traceability in the {EU}: Examining the Use of Blockchain Technology for Tracing Extra Virgin Olive Oil ({EVOO})", type = "{Master's}", school = "Uppsala Universitet", address = "Uppsala, Sweden", year = "2019", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2301551202", abstract = "The issue of food traceability is one that affects a great number of sectors and policy areas. Within the EU, there is increasing demand from consumers, businesses and institutions to have more direct access to information about how food is produced, transformed, and distributed. Currently, however, practices in the industry are very much open to human error. Databases are highly vulnerable to inaccuracies and hacking, as well as deliberate faults caused by corruption or fraudulent conduct. With food traceability being so closely related to trade and public health issues, there is arguably increasing incentive for the EU to seek alternative tools to increase transparency and accountability throughout supply chains. Consequently, this paper will examine a possible alternative to current practices by evaluating the applicability of 'blockchain' technology, namely a system of digitised, decentralised ledgers, which could allow key stakeholders to access information about the provenance of food immediately, comprehensively and securely. The analysis will focus specifically on Extra Virgin Olive Oil (EVOO), one of the most adulterated products in the food industry, identifying gaps and opportunities in current traceability systems. The research question tackled in this paper, therefore, may be formulated as follows: how and to what extent could blockchain technology constitute a sustainable solution for improving the traceability of EVOO within the EU? The paper begins with a brief overview of the issue and an explanation of the research methodology used, followed by an elaboration of key terms and concepts and a detailed explanation of the principles underlying blockchain technology. Subsequently, the key challenges and opportunities associated with blockchain-based traceability systems are examined through a case study, followed by an analysis aimed at assessing the sustainability of blockchain solutions for the EVOO sector. The conclusion, lastly, provides an overview of relevant findings and proposes a final assessment.", acknowledgement = ack-nhfb, advisor = "Andreaz Wasniowski and Federico Costantini", ris-m1 = "27629226", } @Article{Chaudhary:2019:BBB, author = "Rajat Chaudhary and Anish Jindal and Gagangeet Singh Aujla and Shubhani Aggarwal and Neeraj Kumar and Kim-Kwang Raymond Choo", title = "{\em {BEST}}: Blockchain-based secure energy trading in {SDN}-enabled intelligent transportation system", journal = j-COMPUT-SECUR, volume = "85", number = "??", pages = "288--299", month = aug, year = "2019", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.05.006", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:01 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S016740481831201X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Chen:2019:ASE, author = "Jing Chen and Silvio Micali", title = "{Algorand}: a secure and efficient distributed ledger", journal = j-THEOR-COMP-SCI, volume = "777", number = "??", pages = "155--183", day = "19", month = jul, year = "2019", CODEN = "TCSCDI", DOI = "https://doi.org/10.1016/j.tcs.2019.02.001", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Jun 15 10:14:22 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tcs2015.bib", URL = "http://www.sciencedirect.com/science/article/pii/S030439751930091X", acknowledgement = ack-nhfb, fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", } @Article{Chen:2019:BBS, author = "Lanxiang Chen and Wai-Kong Lee and Chin-Chen Chang and Kim-Kwang Raymond Choo and Nan Zhang", title = "Blockchain based searchable encryption for electronic health record sharing", journal = j-FUT-GEN-COMP-SYS, volume = "95", number = "??", pages = "420--429", month = jun, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18314134", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Chen:2019:BPP, author = "Zheshi Chen and Chunhong Li and Wenjun Sun", title = "Bitcoin price prediction using machine learning: an approach to sample dimension engineering", journal = j-J-COMPUT-APPL-MATH, volume = "??", number = "??", pages = "Article 112395", month = "????", year = "2019", CODEN = "JCAMDI", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Fri Sep 6 08:23:32 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2015.bib", URL = "https://www.sciencedirect.com/science/article/pii/S037704271930398X", acknowledgement = ack-nhfb, fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Chen:2019:DPB, author = "Jian Chen and Zhihan Lv and Houbing Song", title = "Design of personnel big data management system based on blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "1122--1129", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.07.037", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19313354", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Chen:2019:FBB, author = "Yuling Chen and Jinyi Guo and Changlou Li and Wei Ren", title = "{FaDe}: a Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing", journal = j-FUTURE-INTERNET, volume = "11", number = "11", pages = "225", day = "24", month = oct, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11110225", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:08 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/11/225", abstract = "In the big data era, data are envisioned as critical resources with various values, e.g., business intelligence, management efficiency, and financial evaluations. Data sharing is always mandatory for value exchanges and profit promotion. Currently, certain big data markets have been created for facilitating data dissemination and coordinating data transaction, but we have to assume that such centralized management of data sharing must be trustworthy for data privacy and sharing fairness, which very likely imposes limitations such as joining admission, sharing efficiency, and extra costly commissions. To avoid these weaknesses, in this paper, we propose a blockchain-based fair data exchange scheme, called FaDe. FaDe can enable de-centralized data sharing in an autonomous manner, especially guaranteeing trade fairness, sharing efficiency, data privacy, and exchanging automation. A fairness protocol based on bit commitment is proposed. An algorithm based on blockchain script architecture for a smart contract, e.g., by a bitcoin virtual machine, is also proposed and implemented. Extensive analysis justifies that the proposed scheme can guarantee data exchanging without a trusted third party fairly, efficiently, and automatically.", acknowledgement = ack-nhfb, remark = "Special Issue Blockchain: Current Challenges and Future Prospects/Applications.", } @Article{Chen:2019:IAS, author = "Yi-Cheng Chen and Yueh-Peng Chou and Yung-Chen Chou", title = "An Image Authentication Scheme Using {Merkle} Tree Mechanisms", journal = j-FUTURE-INTERNET, volume = "11", number = "7", pages = "149", day = "06", month = jul, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11070149", ISSN = "1999-5903", ISSN-L = "1999-5903", bibdate = "Thu Nov 21 16:51:06 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/7/149", abstract = "Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly, blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources. The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Blockchain Theory and Its Applications.", } @Article{Cheng:2019:PBM, author = "Lichen Cheng and Jiqiang Liu and Chunhua Su and Kaitai Liang and Guangquan Xu and Wei Wang", title = "Polynomial-based modifiable blockchain structure for removing fraud transactions", journal = j-FUT-GEN-COMP-SYS, volume = "99", number = "??", pages = "154--163", month = oct, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.04.028", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19303012", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Misc{Cimpanu:2019:MFF, author = "Catalin Cimpanu", title = "\$145 million funds frozen after death of cryptocurrency exchange admin. {Highly} unlikely that the exchange and its users will ever get access to these funds ever again.", howpublished = "ZDNet Web site.", day = "2", month = feb, year = "2019", bibdate = "Tue Feb 05 14:54:26 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.zdnet.com/article/145-million-funds-frozen-after-death-of-cryptocurrency-exchange-admin/", abstract = "Roughly \$145 million worth of cryptocurrency funds are frozen in the cold (offline) wallet of a Canadian cryptocurrency exchange portal after the death of its owner. QuadrigaCX, the exchange, has filed for legal protection against its creditors in accordance with Canadian law until it regains access to the funds, according to a message posted on its website. Problems for the exchange started in December 2018, when its CEO, Gerry Cotten, died of Crohn's disease in Jaipur, India. Cotten was the only one who had access to the company's cold wallet. Despite his death, the exchange continued to operate for nearly a month by using the liquidities stored in its hot (online) wallet and fiat currency bank accounts.", acknowledgement = ack-nhfb, remark = "From the end of the story: ``In particular, around 0.5 percent of all Ether coins currently in circulation are now frozen in Cotten cold wallet, according to an Ethereum market analyst.''", } @Article{Cocco:2019:ABM, author = "Luisanna Cocco and Roberto Tonelli and Michele Marchesi", title = "An Agent Based Model to Analyze the {Bitcoin} Mining Activity and a Comparison with the Gold Mining Industry", journal = j-FUTURE-INTERNET, volume = "11", number = "1", pages = "8", day = "02", month = jan, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11010008", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:04 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/1/8", abstract = "In this paper, we present an analysis of the mining process of two popular assets, Bitcoin and gold. The analysis highlights that Bitcoin, more specifically its underlying technology, is a ``safe haven'' that allows facing the modern environmental challenges better than gold. Our analysis emphasizes that crypto-currencies systems have a social and economic impact much smaller than that of the traditional financial systems. We present an analysis of the several stages needed to produce an ounce of gold and an artificial agent-based market model simulating the Bitcoin mining process and allowing the quantification of Bitcoin mining costs. In this market model, miners validate the Bitcoin transactions using the proof of work as the consensus mechanism, get a reward in Bitcoins, sell a fraction of them to cover their expenses, and stay competitive in the market by buying and divesting hardware units and adjusting their expenses by turning off/on their machines according to the signals provided by a technical analysis indicator, the so-called relative strength index.", acknowledgement = ack-nhfb, } @Article{Conti:2019:BUB, author = "Mauro Conti and Muhammad Hassan and Chhagan Lal", title = "{BlockA{\em uth}}: {BlockChain} based distributed producer authentication in {ICN}", journal = j-COMP-NET-AMSTERDAM, volume = "164", number = "??", pages = "Article 106888", day = "9", month = dec, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2019.106888", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Fri Aug 14 09:46:24 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128619308308", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @MastersThesis{Corso:2019:PAP, author = "Amie Corso", title = "Performance Analysis of {Proof-of-Elapsed-Time (PoET)} Consensus in the {Sawtooth} Blockchain Framework", type = "{M.S.}", school = "University of Oregon", address = "Eugene, OR, USA", pages = "62", year = "2019", ISBN = "1-0883-0362-5", ISBN-13 = "978-1-0883-0362-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2288064913", abstract = "Blockchains are distributed ledgers that use a tamper-sensitive, append-only data structure in conjunction with a consensus protocol to enable mutually distrusting parties to maintain a global set of states. A primary barrier to adoption of blockchain technology by industry is the current performance and scalability limitations of these systems, which lag far behind incumbent database systems. Of particular interest are ``lottery-style'' consensus algorithms, which are relatively scalable to many participants but suffer from low throughput (performance). Proof-of-Elapsed-Time (PoET) is one such algorithm with great promise for use in industry, though the parameters that govern its performance have not been well studied. This thesis explores, through simulation, key performance outcomes in PoET blockchain networks implemented with the Hyperledger Sawtooth framework. A better quantitative understanding of the interactions among these system parameters will be crucial for efficiently optimizing real world blockchain networks and facilitating adoption by industry.", acknowledgement = ack-nhfb, advisor = "Joseph Sventek", keywords = "0984:Computer science; Blockchain; Computer science; Performance Analysis; PoET; Proof-of-Elapsed-Time; Sawtooth", ris-m1 = "13899186", } @Article{Curbera:2019:BEH, author = "F. Curbera and D. M. Dias and V. Simonyan and W. A. Yoon and A. Casella", title = "Blockchain: An enabler for healthcare and life sciences transformation", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "8:1--8:9", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2913622", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Blockchain; Clinical trials; Smart contracts", } @Article{DiFrancescoMaesa:2019:BBA, author = "Damiano {Di Francesco Maesa} and Paolo Mori and Laura Ricci", title = "A blockchain based approach for the definition of auditable Access Control systems", journal = j-COMPUT-SECUR, volume = "84", number = "??", pages = "93--119", month = jul, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:00 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309398", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{DiFrancescoMaesa:2019:BTS, author = "Damiano {Di Francesco Maesa} and Andrea Marino and Laura Ricci", title = "The bow tie structure of the Bitcoin users graph", journal = "Appl. Netw. Sci.", volume = "4", number = "1", pages = "56:1--56:22", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s41109-019-0163-y", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ans/ans4.html#MaesaMR19; https://www.wikidata.org/entity/Q111688736", acknowledgement = ack-nhfb, dblp-key = "journals/ans/MaesaMR19", dblp-mdate = "2022-08-16", } @Article{Dillenberger:2019:BAA, author = "D. N. Dillenberger and P. Novotny and Q. Zhang and P. Jayachandran and H. Gupta and S. Hans and D. Verma and S. Chakraborty and J. J. Thomas and M. M. Walli and R. Vaculin and K. Sarpatwar", title = "Blockchain analytics and artificial intelligence", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "5:1--5:14", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2900638", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Analytical models; Artificial intelligence; Blockchain; Data models; Databases; Fabrics; History", } @Article{Diroff:2019:BCS, author = "Daniel J. Diroff", title = "Bitcoin Coin Selection with Leverage", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1911.01330; https://dblp.org/db/journals/corr/corr1911.html#abs-1911-01330", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1911-01330", dblp-mdate = "2019-11-11", } @Article{Dorri:2019:LLS, author = "Ali Dorri and Salil S. Kanhere and Raja Jurdak and Praveen Gauravaram", title = "{LSB}: a {Lightweight Scalable Blockchain} for {IoT} security and anonymity", journal = j-J-PAR-DIST-COMP, volume = "134", number = "??", pages = "180--197", month = dec, year = "2019", CODEN = "JPDCER", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed Mar 18 09:26:10 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731518307688", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Dorri:2019:MBM, author = "Ali Dorri and Salil S. Kanhere and Raja Jurdak", title = "{MOF-BC}: A memory optimized and flexible blockchain for large scale networks", journal = j-FUT-GEN-COMP-SYS, volume = "92", number = "??", pages = "357--373", month = mar, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Feb 5 08:15:51 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X17329552", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Drozdz:2019:SCC, author = "Stanis{\l}aw Drozdz and Ludovico Minati and Pawe{\l} O{\'s}wi{\k{e}}cimka and Marek Stanuszek and Marcin W{\k{a}}torek", title = "Signatures of the Crypto-Currency Market Decoupling from the {Forex}", journal = j-FUTURE-INTERNET, volume = "11", number = "7", pages = "154", day = "10", month = jul, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11070154", ISSN = "1999-5903", ISSN-L = "1999-5903", bibdate = "Thu Nov 21 16:51:06 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/7/154", abstract = "Based on the high-frequency recordings from Kraken, a cryptocurrency exchange and professional trading platform that aims to bring Bitcoin and other cryptocurrencies into the mainstream, the multiscale cross-correlations involving the Bitcoin (BTC), Ethereum (ETH), Euro (EUR) and US dollar (USD) are studied over the period between 1 July 2016 and 31 December 2018. It is shown that the multiscaling characteristics of the exchange rate fluctuations related to the cryptocurrency market approach those of the Forex. This, in particular, applies to the BTC/ETH exchange rate, whose Hurst exponent by the end of 2018 started approaching the value of 0.5, which is characteristic of the mature world markets. Furthermore, the BTC/ETH direct exchange rate has already developed multifractality, which manifests itself via broad singularity spectra. A particularly significant result is that the measures applied for detecting cross-correlations between the dynamics of the BTC/ETH and EUR/USD exchange rates do not show any noticeable relationships. This could be taken as an indication that the cryptocurrency market has begun decoupling itself from the Forex.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Blockchain Theory and Its Applications.", } @Article{El-Hindi:2019:BSD, author = "Muhammad El-Hindi and Carsten Binnig and Arvind Arasu and Donald Kossmann and Ravi Ramamurthy", title = "{BlockchainDB}: a shared database on blockchains", journal = j-PROC-VLDB-ENDOWMENT, volume = "12", number = "11", pages = "1597--1609", month = jul, year = "2019", CODEN = "????", DOI = "https://doi.org/10.14778/3342263.3342636", ISSN = "2150-8097", bibdate = "Wed Oct 2 06:49:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "In this paper we present BlockchainDB, which leverages blockchains as a storage layer and introduces a database layer on top that extends blockchains by classical data management techniques (e.g., sharding) as well as a standardized query interface to facilitate the adoption of blockchains for data sharing use cases. We show that by introducing the additional database layer, we are able to improve the performance and scalability when using blockchains for data sharing and also massively decrease the complexity for organizations intending to use blockchains for data sharing.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @MastersThesis{Etikala:2019:BBD, author = "Spandana Etikala", title = "Blockchain Based Distributed Key Provisioning System", type = "{M.S.}", school = "The University of North Carolina at Charlotte", address = "Charlotte, NC, USA", pages = "63", year = "2019", ISBN = "1-0856-8703-1", ISBN-13 = "978-1-0856-8703-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2301551377", abstract = "In recent days, smart electronics have evolved into ubiquitous computing with connected interfaces such as self-driving automobiles with evolution in sensor network technology and artificial intelligence. Due to these advancements, new features are added into control area network in automobiles but the security and trust in these systems are still questionable because the improvement in automation is paving way for many potential cyber attacks. The closed systems such as in intra-vehicle configuration, the control and command communication between electronic control units require custom architectures to support real time responses that integrate security and safety protocols. The centralized PKI depends on trusted third parties or a centralized server as certification authority to share the public keys and generate digital certificates for asymmetric keys to provide authentication. The centralize CA can be a single point failure in the closed system. To address this problem, we propose a distributed key provisioning system using blockchain technology. We demonstrate the key provisioning scheme using Ethereum blockchain and smart contract for key storage and validation of the public key pair. The key storage and validation process involves all the nodes in the closed system and authenticates by traversing through their copy of blockchain and vote accordingly.", acknowledgement = ack-nhfb, advisor = "Fareena Saqib", keywords = "0544:Electrical engineering; Authentication; Blockchain; Electrical engineering; Secure key provisioning; Smart contracts", ris-m1 = "13902135", } @PhdThesis{Ezuma-Ngwu:2019:EII, author = "Chidi Ezuma-Ngwu", title = "Exploring Individual Intent towards Blockchain Technology in Response to Threats to Personal Data and Privacy", type = "{Ph.D.}", school = "Northcentral University", address = "San Diego, CA, USA", pages = "185", year = "2019", ISBN = "1-0856-6886-X", ISBN-13 = "978-1-0856-6886-6", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2287507846", abstract = "The purpose of this quantitative cross-sectional exploratory study was to analyze factors that influence attitude towards blockchain applications when an individual perceives threats to their privacy. Individual concerns about threats to personal privacy have increased due to breaches at various organizations as well as the prevalence of spy software, location tracking, insecure applications, viruses, trojans, and malware. The ascent of blockchain technology as a foundation for cryptocurrencies presents opportunities for new applications that feature anonymity and data integrity. This study is intended to fill a gap in research on individual behavior and attitude towards blockchain technology, in response to privacy threats. Researchers have shown that a person's perception of insecurity can evoke a protective response, although such realization did not always predict actual behavior because salient factors also play important roles. Exploratory factor analysis was used to determine factors influencing intent towards privacy-enhancing technologies such as blockchain. Relying on constructs derived from published studies and a model based on the protection motivation theory and the theory of planned behavior, participants (n = 187) drawn from a blockchain forum on Facebook were surveyed on responses towards perceived severity of threats, perceived vulnerability to threats, technology facilitation, autonomy, self-efficacy and behavioral intent towards blockchain applications. The researcher collected responses using a pre-validated questionnaire on Qualtrics with appropriate disclosures and constraints. Results show that six factors were influential; these include threat appraisal, technology affection, autonomy, self-efficacy, and feelings towards privacy. The data also indicates that intent towards adopting blockchain applications for personal privacy is multi-faceted and differs by gender in relation to threat perception and technology. These results provide information for further confirmatory analysis and practice.", acknowledgement = ack-nhfb, advisor = "Brian M. Allen", keywords = "0310:Business administration; 0384:Behavioral psychology; 0489:Information Technology; Autonomy; Behavioral psychology; Blockchain; Business administration; Exploratory factor analysis; Information technology; Privacy; Security; Technology", ris-m1 = "22616186", } @Article{Fairley:2019:EWC, author = "P. Fairley", title = "{Ethereum} will cut back its absurd energy use", journal = j-IEEE-SPECTRUM, volume = "56", number = "1", pages = "29--32", month = jan, year = "2019", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2019.8594790", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 07:02:09 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Bitcoin; Blockchain; cryptocurrencies; Cryptocurrency; Data mining; energy consumption; energy footprint; energy use; energy waste; environmental economics; Ethereum; Exoskeletons; Opprobrium; Robots; Smart contracts; societal benefits", } @Article{Fan:2019:BBC, author = "Kai Fan and Shili Sun and Zheng Yan and Qiang Pan and Hui Li and Yintang Yang", title = "A blockchain-based clock synchronization scheme in {IoT}", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "524--533", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.06.007", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18326657", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Feng:2019:MCD, author = "Wei Feng and Zheng Yan", title = "{MCS-Chain}: Decentralized and trustworthy mobile crowdsourcing based on blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "95", number = "??", pages = "649--666", month = jun, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18326967", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Feng:2019:SPP, author = "Qi Feng and Debiao He and Sherali Zeadally and Muhammad Khurram Khan and Neeraj Kumar", title = "A survey on privacy protection in blockchain system", journal = j-J-NETW-COMPUT-APPL, volume = "126", number = "??", pages = "45--58", day = "15", month = jan, year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:29 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804518303485", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Firdaus:2019:RBB, author = "Ahmad Firdaus and Mohd Faizal Ab Razak and Ali Feizollah and Ibrahim Abaker Targio Hashem and Mohamad Hazim and Nor Badrul Anuar", title = "The rise of ``blockchain'': bibliometric analysis of blockchain study", journal = j-SCIENTOMETRICS, volume = "120", number = "3", pages = "1289--1331", month = sep, year = "2019", CODEN = "SCNTDX", DOI = "https://doi.org/10.1007/s11192-019-03170-4", ISSN = "0138-9130 (print), 1588-2861 (electronic)", ISSN-L = "0138-9130", bibdate = "Mon Aug 19 07:48:04 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/scientometrics2010.bib", URL = "http://link.springer.com/article/10.1007/s11192-019-03170-4", acknowledgement = ack-nhfb, fjournal = "Scientometrics", journal-URL = "http://link.springer.com/journal/11192", } @Article{Florian:2019:EDB, author = "Martin Florian and Sophie Beaucamp and Sebastian Henningsen and Bj{\"o}rn Scheuermann", title = "Erasing Data from Blockchain Nodes", journal = "arXiv.org", volume = "??", number = "??", pages = "??", day = "18", month = apr, year = "2019", bibdate = "Sat Apr 17 15:33:50 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/1904.08901", abstract = "t is a common narrative that blockchains are immutable and so it is technically impossible to erase data stored on them. For legal and ethical reasons, however, individuals and organizations might be compelled to erase locally stored data, be it encoded on a blockchain or not. The common assumption for blockchain networks like Bitcoin is that forcing nodes to erase data contained on the blockchain is equal to permanently restricting them from participating in the system in a full-node role. Challenging this belief, in this paper, we propose and demonstrate a pragmatic approach towards functionality-preserving local erasure (FPLE). FPLE enables full nodes to erase infringing or undesirable data while continuing to store and validate most of the blockchain. We describe a general FPLE approach for UTXO-based (i.e., Bitcoin-like) cryptocurrencies and present a lightweight proof-of-concept tool for safely erasing transaction data from the local storage of Bitcoin Core nodes. Erasing nodes continue to operate in tune with the network even when erased transaction outputs become relevant for validating subsequent blocks. Using only our basic proof-of-concept implementation, we are already able to safely comply with a significantly larger range of erasure requests than, to the best of our knowledge, any other full node operator so far.", acknowledgement = ack-nhfb, } @Article{Frey:2019:DHB, author = "Davide Frey and Marc X. Makkes and Pierre-Louis Roman and Fran{\c{c}}ois Ta{\"\i}ani and Spyros Voulgaris", title = "{Dietcoin}: hardening {Bitcoin} transaction verification process for mobile devices", journal = j-PROC-VLDB-ENDOWMENT, volume = "12", number = "12", pages = "1946--1949", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.14778/3352063.3352106", ISSN = "2150-8097", bibdate = "Wed Oct 2 06:49:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "Distributed ledgers are among the most replicated data repositories in the world. They offer data consistency, immutability, and auditability, based on the assumption that each participating node locally verifies their entire content. Although their content, currently extending up to a few hundred gigabytes, can be accommodated by dedicated commodity hard disks, downloading it, processing it, and storing it in general-purpose desktop and laptop computers can prove largely impractical. Even worse, this becomes a prohibitive restriction for smartphones, mobile devices, and resource-constrained IoT devices. In this demo, we present an implementation of Dietcoin, a Bitcoin protocol extension that allows nodes to perform secure local verification of Bitcoin transactions with small bandwidth and storage requirements. This demo presents and benchmarks the main features of Dietcoin that are important for today's cryptocurrencies and smart contract systems, but are missing in the current state-of-the-art: (i) allowing resource-constrained devices to verify the correctness of selected blocks locally without having to download the complete ledger; (ii) enabling devices to join a blockchain quickly yet securely, dropping bootstrap time from days down to a matter of seconds; (iii) providing a generic solution that can be applied to other distributed ledgers secured with Proof-of-Work.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @MastersThesis{Fugelsang:2019:BTC, author = "Joseph J. Fugelsang", title = "Blockchain Technology for Cybersecurity and Data Integrity: a Case for Mainstream Adoption", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "43", year = "2019", ISBN = "1-68790-618-1", ISBN-13 = "978-1-68790-618-2", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2314065461", abstract = "The purpose of this Capstone Project was to examine existing and potential applications for blockchain and distributed ledger technologies outside of the realm of cryptocurrencies. Research particularly focused on applications for cybersecurity and data privacy purposes. The project aimed to determine whether blockchain technology provides a viable alternative to existing methods of cybersecurity and data privacy. The literature review outlined several sectors and specific organizations who have piloted blockchain programs or are currently implementing blockchain solutions for cybersecurity. Additionally, the literature review revealed that blockchain has many promising applications for cybersecurity and data protection. The project highlighted blockchain's benefit to Internet of Things, Supply Chain, Government, Aerospace, Defense, and Healthcare. Research determined that, despite blockchain's many promising cybersecurity applications, several risks and barriers have prevented mainstream adoption. The project concluded that blockchain offers a perfectly viable alternative to cybersecurity and data privacy. However, due to significant challenges outlined in the project, blockchain's cybersecurity features continue to be in infancy stages.", acknowledgement = ack-nhfb, advisor = "Rampaul Hollington", keywords = "0489:Information Technology; 0984:Computer science; Blockchain; Computer science; Cybersecurity; Distributed ledger technology; Hollington, Rampaul; Information technology; Internet of things; Supply chain", ris-m1 = "22621544", } @Article{Goffard:2019:FRA, author = "Pierre-O. Goffard", title = "Fraud risk assessment within blockchain transactions", journal = j-ADV-APPL-PROB, volume = "51", number = "2", pages = "443--467", month = jun, year = "2019", CODEN = "AAPBBD", DOI = "https://doi.org/10.1017/apr.2019.18", ISSN = "0001-8678 (print), 1475-6064 (electronic)", ISSN-L = "0001-8678", bibdate = "Tue Jan 28 07:17:54 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/advapplprob.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.cambridge.org/core/journals/advances-in-applied-probability/article/fraud-risk-assessment-within-blockchain-transactions/DC96574C5098794A8345167F69149A44", acknowledgement = ack-nhfb, ajournal = "Adv. in Appl. Probab.", fjournal = "Advances in Applied Probability", journal-URL = "https://www.cambridge.org/core/journals/advances-in-applied-probability", onlinedate = "07 August 2019", } @Article{Goldsmith:2019:AHS, author = "Daniel Goldsmith and Kim Grauer and Yonah Shmalo", title = "Analyzing Hack Subnetworks in the Bitcoin Transaction Graph", journal = "CoRR", volume = "abs/1910.13415", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1910.13415; https://dblp.org/db/journals/corr/corr1910.html#abs-1910-13415", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1910-13415", dblp-mdate = "2019-10-31", } @PhdThesis{Gourisetti:2019:CFA, author = "Sri Nikhil Gupta Gourisetti", title = "{Cybersecurity Framework and Algorithms for Prioritized Vulnerability Mitigation (Cyfer)}: an Adoption to Blockchain Systems", type = "{Ph.D.}", school = "University of Arkansas at Little Rock", address = "Little Rock, AR, USA", pages = "366", year = "2019", ISBN = "1-0856-5073-1", ISBN-13 = "978-1-0856-5073-1", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2299815958", abstract = "Cybersecurity vulnerability assessment tools, frameworks, methodologies, and processes are commonly used to understand the cybersecurity maturity and posture of a system or a facility. Those tools are strictly developed based on standards defined by organizations such as the National Institute of Standards and Technology (NIST) and the U.S. Department of Energy, and the majority of these tools and frameworks do not provide a platform to prioritize the requirements to reach a desired cybersecurity maturity. To address that challenge, we used multi-criteria decision analysis (MCDA) techniques to develop a framework and a software application family called the Cybersecurity Framework and Algorithms for Prioritized Vulnerability Mitigation (CyFer). CyFer is built with multi-layer mathematical filters and logical constructs that can be used in-line with several existing vulnerability assessment frameworks and maturity models to prioritize the discovered vulnerabilities and identify the ideal mitigation path. The efficacy of CyFer was evaluated by applying it to a newly developed blockchain cybersecurity framework (BC2F). BC2F was developed using the NIST cybersecurity framework to evaluate the cybersecurity posture of the blockchain nodes and network for a given blockchain application or use case. This dissertation provides a detailed architecture of CyFer and demonstrates its application to BC2F. In addition to CyFer architecture demonstration, this document also demonstrates the efficacy of CyFer by the algorithm's response on well-known large-scale cyber-attack that impacted the critical infrastructure over the last decade.", acknowledgement = ack-nhfb, advisor = "Hirak Patangia", keywords = "0537:Engineering; 0544:Electrical engineering; 0984:Computer science; Blockchain; Computer science; Cybersecurity; Electrical engineering; Engineering; Maturity model; Multi criteria decision analysis; Prioritized Vulnerability mitigation; Vulnerability analysis", ris-m1 = "13886699", } @Article{Guo:2019:MPF, author = "Lijuan Guo and Xuelian Li and Juntao Gao", title = "Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin", journal = "Int. J. Netw. Secur.", volume = "21", number = "1", pages = "71--82", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ijns.jalaxy.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p71-82.pdf; https://dblp.org/db/journals/ijnsec/ijnsec21.html#GuoLG19", acknowledgement = ack-nhfb, dblp-key = "journals/ijnsec/GuoLG19", dblp-mdate = "2021-01-04", } @Article{Haghighat:2019:BWG, author = "Alireza Toroghi Haghighat and Mehdi Shajari", title = "Block withholding game among {Bitcoin} mining pools", journal = j-FUT-GEN-COMP-SYS, volume = "97", number = "??", pages = "482--491", month = aug, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.03.002", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17330686", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{UlHassan:2019:PPB, author = "Muneeb {Ul Hassan} and Mubashir Husain Rehmani and Jinjun Chen", title = "Privacy preservation in blockchain based {IoT} systems: Integration issues, prospects, challenges, and future research directions", journal = j-FUT-GEN-COMP-SYS, volume = "97", number = "??", pages = "512--529", month = aug, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18326542", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Herlihy:2019:BDC, author = "Maurice Herlihy", title = "Blockchains from a distributed computing perspective", journal = j-CACM, volume = "62", number = "2", pages = "78--85", month = feb, year = "2019", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3209623", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 29 10:38:23 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2019/2/234355/fulltext", abstract = "The roots of blockchain technologies are deeply interwoven in distributed computing.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Hu:2019:AMP, author = "Jen-Wei Hu and Lo-Yao Yeh and Shih-Wei Liao and Chu-Sing Yang", title = "Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for {Internet of Things} devices", journal = j-COMPUT-SECUR, volume = "86", number = "??", pages = "238--252", month = sep, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S016740481831438X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Huang:2019:BBF, author = "Hui Huang and Kuan-Ching Li and Xiaofeng Chen", title = "Blockchain-based fair three-party contract signing protocol for fog computing", journal = j-CCPE, volume = "31", number = "22", pages = "e4469:1--e4469:??", day = "25", month = nov, year = "2019", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.4469", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:10 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "17 April 2018", } @Article{Huang:2019:OSA, author = "Xiaohong Huang and Yong Zhang and Dandan Li and Lu Han", title = "An optimal scheduling algorithm for hybrid {EV} charging scenario using consortium blockchains", journal = j-FUT-GEN-COMP-SYS, volume = "91", number = "??", pages = "555--562", month = feb, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Feb 5 08:15:51 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X18313578", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Huang:2019:SSC, author = "Longxia Huang and Gongxuan Zhang and Shui Yu and Anmin Fu and John Yearwood", title = "{SeShare}: Secure cloud data sharing based on blockchain and public auditing", journal = j-CCPE, volume = "31", number = "22", pages = "e4359:1--e4359:??", day = "25", month = nov, year = "2019", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.4359", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:10 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "27 October 2017", } @Article{Huh:2019:BBM, author = "Jun-Ho Huh and Kyungryong Seo", title = "Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing", journal = j-J-SUPERCOMPUTING, volume = "75", number = "6", pages = "3123--3139", month = jun, year = "2019", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-018-2496-1", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Thu Oct 10 15:31:20 MDT 2019", bibsource = "http://link.springer.com/journal/11227/75/6; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Hwang:2019:BBR, author = "S. O. Hwang and A. Mehmood", title = "Blockchain-Based Resource Syndicate", journal = j-COMPUTER, volume = "52", number = "5", pages = "58--66", month = may, year = "2019", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2018.2888773", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jun 27 10:30:21 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "automated structure; Blockchain; blockchain-based resource syndicate; computational resources; consistent replication; cryptocurrencies; data structures; Encryption; financial transactions; Hash functions; incorruptible distributed data structure; Internet; meta data; multiple nodes; Peer-to-peer computing; Receivers; Redundancy", } @Article{Hyla:2019:EIM, author = "Tomasz Hyla and Jerzy Peja{\'s}", title = "{eHealth} Integrity Model Based on Permissioned Blockchain", journal = j-FUTURE-INTERNET, volume = "11", number = "3", pages = "76", day = "24", month = mar, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11030076", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:05 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/3/76", abstract = "(1) Background: Large eHealth systems should have a mechanism to detect unauthorized changes in patients' medical documentation, access permissions, and logs. This is due to the fact that modern eHealth systems are connected with many healthcare providers and sites. (2) Methods: Design-science methodology was used to create an integrity-protection service model based on blockchain technology. Based on the problem of transactional transparency, requirements were specified and a model was designed. After that, the model's security and performance were evaluated. (3) Results: a blockchain-based eHealth integrity model for ensuring information integrity in eHealth systems that uses a permissioned blockchain with off-chain information storage was created. In contrast to existing solutions, the proposed model allows information removal, which in many countries' eHealth systems is a legal requirement, and is based on a blockchain using the Practical Byzantine Fault Tolerant algorithm. (4) Conclusion: a blockchain can be used to store medical data or only security-related data. In the proposed model, a blockchain is mainly used to implement a data-integrity service. This service can be implemented using other mechanisms, but a blockchain provides a solution that does not require trusted third parties, works in a distributed eHealth environment, and supports document removal.", acknowledgement = ack-nhfb, remark = "Special Issue Security and Privacy in Information and Communication Systems.", } @Article{Imtiaz:2019:COT, author = "Muhammad Anas Imtiaz and David Starobinski and Ari Trachtenberg", title = "Characterizing Orphan Transactions in the Bitcoin Network", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1912.11541; https://dblp.org/db/journals/corr/corr1912.html#abs-1912-11541", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1912-11541", dblp-mdate = "2021-01-23", } @Article{Islam:2019:BBF, author = "Naveed Islam and Yasir Faheem and Ikram Ud Din and Muhammad Talha and Mohsen Guizani and Mudassir Khalil", title = "A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services", journal = j-FUT-GEN-COMP-SYS, volume = "100", number = "??", pages = "569--578", month = nov, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.059", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:01 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19309860", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Islam:2019:EIT, author = "Md Nazmul Islam and Sandip Kundu", title = "Enabling {IC} Traceability via Blockchain Pegged to Embedded {PUF}", journal = j-TODAES, volume = "24", number = "3", pages = "36:1--36:23", month = jun, year = "2019", CODEN = "ATASFO", DOI = "https://doi.org/10.1145/3315669", ISSN = "1084-4309 (print), 1557-7309 (electronic)", ISSN-L = "1084-4309", bibdate = "Thu Jan 30 09:00:30 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/todaes.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3315669", abstract = "Globalization of IC supply chain has increased the risk of counterfeit, tampered, and re-packaged chips in the market. Counterfeit electronics poses a security risk in safety critical applications like avionics, SCADA systems, and defense. It also \ldots{}", acknowledgement = ack-nhfb, articleno = "36", fjournal = "ACM Transactions on Design Automation of Electronic Systems", journal-URL = "https://dl.acm.org/loi/todaes", } @Article{Jang:2019:IFB, author = "Sung Min Jang and Eojin Yi and Woo Chang Kim and Kwangwon Ahn", title = "Information Flow between Bitcoin and Other Investment Assets", journal = j-ENTROPY, volume = "21", number = "11", pages = "1116", month = "????", year = "2019", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e21111116", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy21.html#JangYKA19", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/JangYKA19", dblp-mdate = "2020-10-26", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @TechReport{Jefferson:2019:WWD, author = "David Jefferson and Duncan Buell and Joe Kiniry and Kevin Skoglund and Joshua Greenbaum", title = "What We Don't Know About the {Voatz} {``Blockchain''} {Internet} Voting System", type = "Report", institution = "Lawrence Livermore National Laboratory [and other institutions]", address = "Livermore, CA, USA", pages = "10", day = "1", month = may, year = "2019", bibdate = "Mon Aug 19 08:34:44 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://cse.sc.edu/~buell/blockchain-papers/documents/WhatWeDontKnowAbouttheVoatz_Blockchain_.pdf", abstract = "Voatz is a recent startup company that is building and operating yet another Internet voting system intended for public elections. The system's major distinguishing features are an elaborate voter authentication system based on automated facial comparison of a photo of a voter's photo ID to a short selfie video, and a back end virtual ballot box in the form a closed, permissioned blockchain.", acknowledgement = ack-nhfb, } @Article{Jiang:2019:PPP, author = "Wenbo Jiang and Hongwei Li and Guowen Xu and Mi Wen and Guishan Dong and Xiaodong Lin", title = "{PTAS}: Privacy-preserving Thin-client Authentication Scheme in blockchain-based {PKI}", journal = j-FUT-GEN-COMP-SYS, volume = "96", number = "??", pages = "185--195", month = jul, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.01.026", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18315097", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Jiao:2019:AMC, author = "Y. Jiao and P. Wang and D. Niyato and K. Suankaewmanee", title = "Auction Mechanisms in Cloud\slash Fog Computing Resource Allocation for Public Blockchain Networks", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "30", number = "9", pages = "1975--1989", month = sep, year = "2019", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2019.2900238", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Fri Aug 30 06:09:58 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "http://www.computer.org/portal/web/csdl/transactions/tpds", keywords = "Approximation algorithms; auction; auction mechanism; auction-based market model; block mining; Blockchain; cloud computing; cloud/fog computing; computational complexity; constant-demand bidding scheme; cryptocurrencies; Cryptography; data mining; decentralized data management applications; decentralized secure data management platform; distributed databases; electronic commerce; game theory; mobile computing; multidemand bidding scheme; Peer-to-peer computing; pricing; proof of work; proof-of-work based consensus protocols; Protocols; public blockchain networks; resource allocation; Resource management; social welfare; Task analysis; tendering", } @Article{Jindal:2019:SBB, author = "Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar", title = "{SURVIVOR}: a blockchain based edge-as-a-service framework for secure energy trading in {SDN}-enabled vehicle-to-grid environment", journal = j-COMP-NET-AMSTERDAM, volume = "153", number = "??", pages = "36--48", day = "22", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2019.02.002", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Wed Mar 20 11:48:37 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912861831106X", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Kfir:2019:DCL, author = "Shaul Kfir and Camille Fournier", title = "{DAML}: the contract language of distributed ledgers", journal = j-CACM, volume = "62", number = "9", pages = "48--54", month = sep, year = "2019", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3343046", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Aug 22 08:20:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2019/9/238966/fulltext", abstract = "A discussion between Shaul Kfir and Camille Fournier.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @PhdThesis{Khaknejad:2019:TEB, author = "Mohammad Bayani Khaknejad", title = "Two Essays on {Bitcoin} Price and Volume", type = "{Ph.D.}", school = "Old Dominion University", address = "Norfolk, VA, USA", pages = "78", year = "2019", ISBN = "1-0883-9505-8", ISBN-13 = "978-1-0883-9505-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2305191191", abstract = "Bitcoin is a decentralized peer to peer digital transactions system that was introduced in 2009 in the aftermath of the financial crisis. Since its introduction, it has had a volatile journey, being adopted by computer programmers, cyber punk enthusiasts, criminals, and financial investors. While the future of bitcoin is still not clear, it has been widely adopted by many, not necessarily as a new method of transactions, but rather as a new investment vehicle. Being a new asset class, there are many unknown financial characteristics to be investigated about bitcoin and in this dissertation, we try to explore two of these characteristics: Price and volume.", acknowledgement = ack-nhfb, advisor = "Mohammad Najand", keywords = "0508:Finance; Bitcoin; Cryptocurrency; Finance; Mixture of distributions; Price-volume relationship; Sentiment", ris-m1 = "22616896", } @PhdThesis{Klarman:2019:UBN, author = "Uri Klarman", title = "Unchaining the Blockchain Network Layer", type = "{Ph.D.}", school = "Northwestern University", address = "Evanston, IL, USA", pages = "127", year = "2019", ISBN = "1-392-02835-3", ISBN-13 = "978-1-392-02835-3", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2205094634", abstract = "Blockchains are an exciting new type of Peer-to-Peer (P2P) distributed systems, which enable parties to transact directly, and maintain the record of said interactions in a distributed manner. A unique feature of blockchains is their ability to maintain a consensus without requiring knowledge on the number of participants, nor their identities, opening the door for cross-border, self-organized, decentralized, open ecosystems. The original blockchain, Bitcoin, aims to be a Global P2P Electronic Cash System, and to replace fiat money, banks, payment-processors, and other financial middlemen. Other blockchains, e.g., Ethereum, aim to remove middlemen from other types of interactions, such as replacing custodians with Smart Contracts, and to securely store credentials, identities, health records, and private information. While blockchains have the potential to be transformative in many fields, their real-world usage is held back by practical limitations. First and foremost, for a blockchain to be used at a global scale, it must be capable of handling a high volume of transactions; for Bitcoin to replace Visa, MasterCard, PayPal and other payment processors, it must be capable of processing roughly 5,000 transactions per second (TPS), the average number of TPS these companies process today. To support online shopping, it must support peak demand, which for Alibaba stands at 325,000 TPS. In contrast to these significant requirements, Bitcoin can only process 3-4 TPS. Other significant limitations include the centralization and wastefulness of blockchain mining, the procedure which records transactions in the blockchain. Research in the blockchain field had thus far focused on new cryptographic primitives and alternative blockchain protocols to address these real-world challenges, while the networking aspects were largely ignored. In this thesis, I propose a definition for the blockchain Network Layer, and provide evidence that the Network Layer is the bottleneck and root-cause for some of the most pressing challenges blockchains face today. I further propose new networking primitives and novel network utilization methods, and explore how they can be used to overcome said challenges, including scalability, mining centralization, and mining wastefulness, as well as to utilize blockchains to decentralize existing knowledge silos. First, I provide the necessary background to understand the operation of blockchains, and a definition for the blockchain Network Layer. Then, I present an analysis which outlines how the Network Layer is the bottleneck for blockchain scalability, and suggest a new networking primitive, the Blockchain Distribution Network (BDN) to overcome both blockchain scalability and mining centralization. Lastly, I present novel networking methods which enable blockchains to be utilized in new fields, focusing on the decentralization of the search engines market, and mitigate mining wastefulness.", acknowledgement = ack-nhfb, advisor = "Aleksandar Kuzmanovic", keywords = "0984:Computer science; Applied sciences; Blockchain; Blockchain distribution network; Blockchain scalability; Computer science; Distributed systems; Layer-0; Relay networks", ris-m1 = "13807200", } @Article{Knittel:2019:MTC, author = "Megan Knittel and Shelby Pitts and Rick Wash", title = "{``The Most Trustworthy Coin''}: How Ideological Tensions Drive Trust in {Bitcoin}", journal = j-PACMHCI, volume = "3", number = "CSCW", pages = "36:1--36:23", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3359138", ISSN = "2573-0142 (electronic)", ISSN-L = "2573-0142", bibdate = "Wed Mar 31 06:23:45 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmhci.bib", URL = "https://dl.acm.org/doi/10.1145/3359138", abstract = "Bitcoin is an innovative technological network, a new, non-governmental currency, and a worldwide group of users. In other words, Bitcoin is a complex sociotechnical system with a complex set of risks and challenges for \ldots{}", acknowledgement = ack-nhfb, articleno = "36", fjournal = "Proceedings of the ACM on Human-Computer Interaction (PACMHCI)", journal-URL = "https://dl.acm.org/loi/pacmhci", } @Article{Kochovski:2019:TMB, author = "Petar Kochovski and Sandi Gec and Vlado Stankovski and Marko Bajec and Pavel D. Drobintsev", title = "Trust management in a blockchain based fog computing platform with trustless smart oracles", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "747--759", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.07.030", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19301281", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @MastersThesis{Kriti:2019:BIP, author = "Fnu Nitya Nitya Kriti", title = "Blockchain Inspired Product Authentication for Supply Chain Security", type = "{M.S.}", school = "Michigan State University", address = "East Lansing, MI 48824, USA", pages = "114", year = "2019", ISBN = "1-68790-289-5", ISBN-13 = "978-1-68790-289-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2315502479", abstract = "In today's technologically advanced world, the prevalence of counterfeit products in the market is a major challenge. In every industry from pharmaceutical to the food industry, counterfeit products have a destructive impact on the health of the consumers as well as loss of jobs and lives of millions across the globe. This calls for a better system of product traceability to impede the introduction of counterfeit products in the market. This work proposes a method in which a blockchain inspired system is implemented with the combination of the digital chain of information to the physical tag on the products. The physical tag has DNA of a known source to be privy to only select nodes and connected to the central database. The proposed method includes the use of magnetic stripe cards as product labels. This label is made to contain digital information, which is then coupled with the modified blockchain system. Pertaining to the high information density property of the magnetic stripe cards, partial DNA sequence information can be easily concatenated with the serial number of the product. This can also be re-programmed to track the route of the product along the supply chain. The main feature of the proposed method is the coupling of the re-programmability of the magnetic card labels with the physical DNA tag information contained on the label. The tag can be easily verified even after the product leaves the digital chain. Whilst, within the network coverage, the blockchain inspired tracking system can help track the route taken by the product. This mechanism of merging the physical information with the Internet of Things (IOT) shall address the situation of counterfeit products to an advanced degree of accuracy and reliability.", acknowledgement = ack-nhfb, advisor = "Prem Chahal and Evangelyn Alocilja", keywords = "0464:Computer Engineering; 0546:Industrial engineering; Blockchain; Computer engineering; DNA; Industrial engineering; Internet of things; Magnetic stripe cards; Physical tag; Supply chain", ris-m1 = "22619682", } @Article{Kubilay:2019:CNP, author = "Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar", title = "{CertLedger}: a new {PKI} model with Certificate Transparency based on blockchain", journal = j-COMPUT-SECUR, volume = "85", number = "??", pages = "333--352", month = aug, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:01 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313014", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Kuhn:2019:RDL, author = "Rick Kuhn and Dylan Yaga and Jeffrey Voas", title = "Rethinking Distributed Ledger Technology", journal = j-COMPUTER, volume = "52", number = "2", pages = "68--72", month = feb, year = "2019", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2019.2898162", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Mar 21 09:26:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", URL = "https://ieeexplore.ieee.org/document/8672407/", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Kuhn:2019:TSS, author = "R. Kuhn and J. Voas and P. Laplante", title = "Taking Score on the Success of Blockchain, So Far", journal = j-COMPUTER, volume = "52", number = "9", pages = "24--34", month = sep, year = "2019", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2019.2924559", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Aug 28 07:41:13 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/computer", keywords = "Blockchain; Cryptography; Distributed ledger; NIST; Protocols", } @Article{Kuzmanovic:2019:NNUa, author = "Aleksandar Kuzmanovic", title = "Net neutrality: unexpected solution to blockchain scaling", journal = j-CACM, volume = "62", number = "5", pages = "50--55", month = may, year = "2019", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Apr 27 18:22:12 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2019/5/236422/fulltext", abstract = "Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Kuzmanovic:2019:NNUb, author = "Aleksander Kuzmanovic", title = "Net Neutrality: Unexpected Solution to Blockchain Scaling", journal = j-QUEUE, volume = "17", number = "1", pages = "20", month = jan, year = "2019", CODEN = "AQCUAE", DOI = "https://doi.org/10.1145/3317287.3319534", ISSN = "1542-7730 (print), 1542-7749 (electronic)", ISSN-L = "1542-7730", bibdate = "Wed Dec 11 08:08:33 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/queue.bib", URL = "http://queue.acm.org/detail.cfm?id=3319534", abstract = "Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.", acknowledgement = ack-nhfb, fjournal = "ACM Queue: Tomorrow's Computing Today", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J882", } @Article{Lei:2019:WBE, author = "H. Lei and C. Qiu and H. Yao and S. Guo", title = "When Blockchain-Enabled {Internet of Things} Meets Cloud Computing", journal = j-COMPUTER, volume = "52", number = "12", pages = "16--17", month = dec, year = "2019", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2019.2940857", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Fri Nov 29 06:16:06 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Li:2019:CBB, author = "M. Li and J. Weng and A. Yang and W. Lu and Y. Zhang and L. Hou and J. Liu and Y. Xiang and R. H. Deng", title = "{CrowdBC}: a Blockchain-Based Decentralized Framework for Crowdsourcing", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "30", number = "6", pages = "1251--1266", month = jun, year = "2019", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2018.2881735", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Fri Aug 30 06:09:58 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "http://www.computer.org/portal/web/csdl/transactions/tpds", keywords = "blockchain; blockchain-based decentralized framework; complex tasks; Computer crime; computer network security; considerable interest; CrowdBC; crowdsourcing; Crowdsourcing; crowdsourcing platform; crowdsourcing system; cryptocurrencies; Data privacy; DDoS; Decentralized framework; distributed denial of service; Ethereum public test network; high service fees; human intelligence; Internet; malicious users involvement; smart contract; Sybil attacks; Task analysis; traditional trust-based model", } @Article{Li:2019:DCB, author = "Wenjuan Li and Steven Tug and Weizhi Meng and Yu Wang", title = "Designing collaborative blockchained signature-based intrusion detection in {IoT} environments", journal = j-FUT-GEN-COMP-SYS, volume = "96", number = "??", pages = "481--489", month = jul, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18327237", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Liu:2019:ECE, author = "Xiaolong Liu and Khan Muhammad and Jaime Lloret and Yu-Wen Chen and Shyan-Ming Yuan", title = "Elastic and cost-effective data carrier architecture for smart contract in blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "100", number = "??", pages = "590--599", month = nov, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.042", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:01 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18328334", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Liu:2019:EPP, author = "Zhenhua Liu and Yuanyuan Li and Dong Yuan and Yaohui Liu", title = "Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction", journal = "Int. J. Netw. Secur.", volume = "21", number = "5", pages = "741--750", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p741-750.pdf; https://dblp.org/db/journals/ijnsec/ijnsec21.html#LiuLYL19", acknowledgement = ack-nhfb, dblp-key = "journals/ijnsec/LiuLYL19", dblp-mdate = "2023-03-08", } @Article{Liu:2019:FFH, author = "Zhiqiang Liu and Shuyang Tang and Sherman S. M. Chow and Zhen Liu and Yu Long", title = "Fork-free hybrid consensus with flexible Proof-of-Activity", journal = j-FUT-GEN-COMP-SYS, volume = "96", number = "??", pages = "515--524", month = jul, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18326256", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", keywords = "blockchain", } @MastersThesis{Liu:2019:PSW, author = "Yingzheng Liu", title = "Public and Shared Warehouse Management --- A Blockchain Approach", type = "{M.S.}", school = "State University of New York at Binghamton", address = "Binghamton, NY, USA", pages = "52", year = "2019", ISBN = "1-0856-3533-3", ISBN-13 = "978-1-0856-3533-2", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2272720369", abstract = "In the world of business, sharing economy has been proved to be efficient and trustworthy in the industries of accommodation, labor, and transportation. However, the industry of warehouse management has not demonstrated much successes by getting partnership and involvement with the concept of public sharing due to enormous number of obstacles. In this thesis, a detailed research is conducted on why the strategy and model of public sharing are not being accepted by warehouse management, as well as how the public sharing warehouse (PSW) is distinguished from the traditional third-party logistics (3PL) service providers in terms of finance, logistics, business operations etc. A comparison between PSW and 3PL is studied. An analysis and solution on major obstacles that prevent PSW from being practical and possible are conducted and given, by support of real-industry data and simulation.In addition, a more efficient and acceptable PSW business model that is based on the features of the blockchain technology for enterprise, e-commerce specifically, is proposed to comply with the topic. The new PSW model is designed to maximize utilization, and profitability by allowing multiple entities to use the warehouse, for which the technology of blockchain can be applied to initiate a trusted ecosystem. By studying the existing data, information sharing between stakeholders in a supply chain has been known as a practical solution to the public sharing warehouse. The utilization of blockchain can solve the concerns regarding security, ethics, and profit sharing. In order to testify that the concept of public sharing warehouse is efficient, profitable, and practical, an optimization model on total cost and the number of the Public Sharing Warehouses (PSW) is developed, utilized, and modified to compare the total profits before and after the utilization of information sharing.Last of all, key research problems, and possible future research topics in the blockchain-based public and shared warehouse systems are also addressed.", acknowledgement = ack-nhfb, advisor = "Sung H. Chung", keywords = "0537:Engineering; 0546:Industrial engineering; Engineering; Industrial engineering", ris-m1 = "13880628", } @Article{Lopez-Pintado:2019:CBP, author = "Orlenys L{\'o}pez-Pintado and Luciano Garc{\'\i}a-Ba{\~n}uelos and Marlon Dumas and Ingo Weber and Alexander Ponomarev", title = "{Caterpillar}: a business process execution engine on the {Ethereum} blockchain", journal = j-SPE, volume = "49", number = "7", pages = "1162--1193", month = jul, year = "2019", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2702", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Sat Oct 12 09:43:47 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "09 May 2019", } @Article{Lu:2019:UUB, author = "Qinghua Lu and Xiwei Xu and Yue Liu and Ingo Weber and Liming Zhu and Weishan Zhang", title = "{uBaaS}: a unified blockchain as a service platform", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "564--575", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.051", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18319873", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Makhdoom:2019:BAI, author = "Imran Makhdoom and Mehran Abolhasan and Haider Abbas and Wei Ni", title = "{Blockchain}'s adoption in {IoT}: the challenges, and a way forward", journal = j-J-NETW-COMPUT-APPL, volume = "125", number = "??", pages = "251--279", day = "1", month = jan, year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:28 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804518303473", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Mallqui:2019:PDM, author = "Dennys C. A. Mallqui and Ricardo A. S. Fernandes", title = "Predicting the direction, maximum, minimum and closing prices of daily Bitcoin exchange rate using machine learning techniques", journal = "Appl. Soft Comput.", volume = "75", number = "??", pages = "596--606", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2018.11.038", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc75.html#MallquiF19", acknowledgement = ack-nhfb, dblp-key = "journals/asc/MallquiF19", dblp-mdate = "2019-02-13", } @Article{Manevich:2019:EHF, author = "Y. Manevich and A. Barger and Y. Tock", title = "Endorsement in Hyperledger Fabric via service discovery", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "2:1--2:9", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2900647", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Bitcoin; Blockchain; Fabrics; Peer-to-peer computing; Smart contracts", } @Article{Maxwell:2019:SSM, author = "Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille", title = "Simple {Schnorr} multi-signatures with applications to {Bitcoin}", journal = j-DESIGNS-CODES-CRYPTOGR, volume = "87", number = "9", pages = "2139--2164", month = sep, year = "2019", CODEN = "DCCREC", DOI = "https://doi.org/10.1007/s10623-019-00608-x", ISSN = "0925-1022 (print), 1573-7586 (electronic)", ISSN-L = "0925-1022", bibdate = "Wed Oct 2 10:50:31 MDT 2019", bibsource = "http://link.springer.com/journal/10623/87/9; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/designscodescryptogr.bib", URL = "https://link.springer.com/article/10.1007/s10623-019-00608-x", acknowledgement = ack-nhfb, fjournal = "Designs, Codes and Cryptography", journal-URL = "http://link.springer.com/journal/10623", } @Article{McGhin:2019:BHA, author = "Thomas McGhin and Kim-Kwang Raymond Choo and Charles Zhechao Liu and Debiao He", title = "Blockchain in healthcare applications: Research challenges and opportunities", journal = j-J-NETW-COMPUT-APPL, volume = "135", number = "??", pages = "62--75", day = "1", month = jun, year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:32 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519300864", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Misc{McKay:2019:CES, author = "Tom McKay", title = "Crypto Exchange Says It Can't Repay \$190 Million to Clients After Founder Dies With Only Password", howpublished = "Gizmode Web site", day = "3", month = feb, year = "2019", bibdate = "Tue Feb 05 15:31:13 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://gizmodo.com/crypto-exchange-says-it-cant-repay-190-million-to-clie-1832309454", acknowledgement = ack-nhfb, remark = "See also \cite{Cimpanu:2019:MFF} for details.", } @Misc{Mearian:2019:WBB, author = "Lucas Mearian", title = "Why blockchain-based voting could threaten democracy", howpublished = "https://www.computerworld.com/article/3430697/why-blockchain-could-be-a-threat-to-democracy.html", day = "12", month = aug, year = "2019", bibdate = "Mon Aug 19 08:30:47 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "As the desire to increase voter turnout remains strong and the number of online voting pilot projects rises in the U.S. and abroad, some security experts warn any Internet-based election system is wide open to attack, regardless of the underlying infrastructure.", acknowledgement = ack-nhfb, } @Misc{Mendoza:2019:TCM, author = "Ron Mendoza", title = "{Trump} Campaign Manager Announces Cryptocurrency `{Frax}', More Stable Than {Bitcoin}", howpublished = "IBT Business Web site", day = "23", month = oct, year = "2019", bibdate = "Wed Oct 23 08:05:32 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.ibtimes.com/trump-campaign-manager-announces-cryptocurrency-frax-more-stable-bitcoin-2851923", acknowledgement = ack-nhfb, } @MastersThesis{Mera:2019:QBS, author = "Daniel Mera", title = "Quorum Blockchain Stress Evaluation in Different Environments", type = "{M.S.}", school = "City University of New York John Jay College of Criminal Justice", address = "New York, NY, USA", pages = "129", year = "2019", ISBN = "1-0856-8678-7", ISBN-13 = "978-1-0856-8678-5", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2288064966", abstract = "In today's world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today.Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what type of environment the platform could be better used.This research has been focused on testing the efficiency and speed of the transactions been sent to the platform in different types of environments, like local server nodes, virtual machine nodes and cloud instance nodes, by focusing its tests on the average of transactions per second or TPS being made.Once the tests were carried out, and results were obtained, there was a clear difference between the environments used. Using cloud instances for nodes improves the TPS for every single type of transactions over any other types of nodes. It might have been predicted that Cloud Instances would have done a better performance, but other factors could have caused the fallback in results for this type of nodes.", acknowledgement = ack-nhfb, advisor = "Shweta Jane and Adam S. Wandt", keywords = "0646:Web Studies; 0723:Information science; Blockchain; Ethereum; Information science; Quorum; Stress test; TPS; Web studies", ris-m1 = "13902856", } @Book{Mezrich:2019:BBT, author = "Ben Mezrich", title = "Bitcoin Billionaires: a True Story of Genius, Betrayal, and Redemption", publisher = "Flatiron Books", address = "New York, NY, USA", pages = "x + 276", year = "2019", ISBN = "1-250-21774-1 (hardcover), 1-250-23938-9", ISBN-13 = "978-1-250-21774-5 (hardcover), 978-1-250-23938-9", LCCN = "HG4751 .M499 2019", bibdate = "Mon May 20 16:52:33 MDT 2019", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "Ben Mezrich's 2009 bestseller \booktitle{The Accidental Billionaires} is the definitive account of Facebook's founding and the basis for the Academy Award-winning film \booktitle{The Social Network}. Two of the story's iconic characters are Harvard students Tyler and Cameron Winklevoss: identical twins, Olympic rowers, and foils to Mark Zuckerberg. \booktitle{Bitcoin Billionaires} is the story of the brothers' redemption and revenge in the wake of their epic legal battle with Facebook. Planning to start careers as venture capitalists, the brothers quickly discover that no one will take their money after their fight with Zuckerberg. While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize ``crypto'' is, in their own words, ``either the next big thing or total bulls--t.'' There's nothing left to do but make a bet. From the Silk Road to the halls of the Securities and Exchange Commission, \booktitle{Bitcoin Billionaires} will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here's the story of how they got there --- as only Ben Mezrich could tell it.", acknowledgement = ack-nhfb, author-dates = "1969--", subject = "Winklevoss, Tyler; Winklevoss, Cameron; Venture capital; Bitcoin; Entrepreneurship", tableofcontents = "ACT ONE \\ \\ 1. Into the Tiger's Cage \\ 2. Dead in the Water \\ 3. Damaged Goods \\ 4. In The Beginning There Was Foam \\ 5. The Basement \\ 6. Finding Love In A Hopeless Place \\ 7. August 30, 2012 \\ 8. Charlie \\ 9. Stepford, Connecticut \\ 10. Buyer's Market \\ 11. Reverse Heist \\ \\ ACT TWO \\ \\ 12. The Spark \\ 13. Bayfront Park, Downtown Miami \\ 14. On the Road Again \\ 15. In the Air \\ 16. King of Bitcoin \\ 17. The Morning After \\ 18. Bright Lights \\ 19. This Side of Paradise \\ 20. The United Front \\ 21. Behind the Door, May 16, 2013 \\ 22. Bitcoin 2013 \\ 23. Going Mainstream \\ \\ ACT THREE \\ \\ 24. A Pirate's Tale \\ 25. The Day After \\ 26. The Fall \\ 27, Across Town \\ 28. Men of Harvard \\ 29. Judgment Day \\ 30. Launched \\ 31 From Dumas to Balzac \\ \\ EPILOGUE: Where Are They Now...? \\ \\ Acknowledgements \\ Bibliography", } @Article{Miller:2019:ITA, author = "Nikolay Miller and Yiming Yang and Bruce Sun and Guoyi Zhang", title = "Identification of technical analysis patterns with smoothing splines for bitcoin prices", journal = j-J-APPL-STAT, volume = "46", number = "12", pages = "2289--2297", month = dec, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1080/02664763.2019.1580251", ISSN = "0266-4763 (print), 1360-0532 (electronic)", ISSN-L = "0266-4763", bibdate = "Sat Aug 31 12:17:19 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/japplstat.bib; http://www.tandf.co.uk/journals/routledge/02664763.html", acknowledgement = ack-nhfb, fjournal = "Journal of Applied Statistics", journal-URL = "http://www.tandfonline.com/loi/cjas20", onlinedate = "27 Feb 2019", } @PhdThesis{Mohammad:2019:DAU, author = "Atif Farid Mohammad", title = "Decision Analytics Using Permissioned Blockchain ``{CommLedger}''", type = "{Ph.D.}", school = "The University of North Dakota", address = "Grand Forks, ND, USA", pages = "81", year = "2019", ISBN = "1-392-28125-3", ISBN-13 = "978-1-392-28125-3", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2246338016", abstract = "The advent of Blockchain has introduced a paradigm shift in the area of Scientific Computing. The decision analytics embodiment in current technology fabric has introduced a need of incorporating Blockchain with industrial technology ecosystem. The utilization of Blockchain has introduced gaps in terms of standard business processes, while the data is being processed using the concept of traditional RDBMS and NoSQL data formats. The lag of permissioned and permissionless Blockchain is the problem area which is dealt with in this doctoral dissertation to provide a Proof of Permission (PoP) protocol for any organization or entity to tailor according to their environmental constraints. There has been a need of an open-source protocol that organizations can customize according to their needs, which is not bound of using only REST interactions. The research presented in this thesis provides such a solution for the industry. The provided propositions are the use of Tiered Asynchronous Locking Algorithm (TALA) to generate a key for securing an Authenticated Data Acceptance Marker (ADAM) block for a permissioned Blockchain Community Ledger (CommLedger).", acknowledgement = ack-nhfb, advisor = "Ronald Marsh and Emanuel Grant", keywords = "0984:Computer science; Adam block; Applied sciences; Blockchain; CommLedger; Computer science; Decision analytics; Proof of permission; Tala Key", ris-m1 = "13880810", } @Article{Moin:2019:SID, author = "Sana Moin and Ahmad Karim and Zanab Safdar and Kalsoom Safdar and Ejaz Ahmed and Muhammad Imran", title = "Securing {IoTs} in distributed blockchain: Analysis, requirements and open issues", journal = j-FUT-GEN-COMP-SYS, volume = "100", number = "??", pages = "325--343", month = nov, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:01 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18330851", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Morrow:2019:BTI, author = "Monique J. Morrow and Mehran Zarrebini", title = "Blockchain and the Tokenization of the Individual: Societal Implications", journal = j-FUTURE-INTERNET, volume = "11", number = "10", pages = "220", day = "22", month = oct, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11100220", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:08 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/10/220", abstract = "We are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts. Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization of structures. We see this trust deficit challenging the very institutions we have depended on including but not limited to financial institutions, private enterprises or government bodies. A new ``social contract'' is required as we continuously evolve into more decentralized and self-governing (or semi self-governing) entities. We will see more development in digital sovereignty with the caveat that a governance model will need to be defined. This position paper will present evidence that supports the premise that blockchain and individual tokenization could provide a new social contract.", acknowledgement = ack-nhfb, remark = "Special Issue Blockchain: Current Challenges and Future Prospects/Applications.", } @Article{Nagayama:2019:SBN, author = "Ryunosuke Nagayama and Kazuyuki Shudo and Ryohei Banno", title = "Simulation of the Bitcoin Network Considering Compact Block Relay and Internet Improvements", journal = "CoRR", volume = "abs/1912.05208", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1912.05208; https://dblp.org/db/journals/corr/corr1912.html#abs-1912-05208", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1912-05208", dblp-mdate = "2020-01-02", } @Article{Narayanaswami:2019:BAS, author = "C. Narayanaswami and R. Nooyi and S. R. Govindaswamy and R. Viswanathan", title = "Blockchain anchored supply chain automation", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "7:1--7:11", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2900655", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Automation; Blockchain; Complexity theory; Optimization; Real-time systems; Supply chains", } @MastersThesis{Narvaez:2019:UBB, author = "Rafael Santiago Narvaez", title = "Use of a Blockchain Based Electronic Data Interchange Framework for Enabling Automated Merchant and Sales Tax Data Exchange Between State and Municipal Governments of {Puerto Rico} to Support Sales Tax Evasion Monitoring and Supervision Efforts", type = "{M.S.M.E.}", school = "Polytechnic University of Puerto Rico", address = "San Juan, Puerto Rico", pages = "81", year = "2019", ISBN = "1-0883-3127-0", ISBN-13 = "978-1-0883-3127-9", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2302689399", abstract = "Puerto Rico's Tax Code of 2011 establishes that individuals and businesses (commonly referred as merchants) that perform sales activity in Puerto Rico are entitled to collect state and municipal sales tax over goods sold. As of 2016, sales tax uptake is just 63.7\%, leaving 36.3\% of merchants with their tax filing uncollected and in noncompliance. One of the reasons for such low compliance percentage is that taxes are collected at the state and municipal level in a scatter diverse tax collection information system. These systems that cannot exchange information for tax evasion and monitoring purposes, promote filing errors to go unnoticed and allowing unscrupulous merchants to evade taxes due to the impossibility of data reconciliation. Blockchain technology opens the possibility for the implementation of a Blockchain based Electronic Data Interexchange (EDI) solution that automates the reconciliation of merchant's tax filing data from disparate legacy systems owned by state and municipal governments while guarantying the Confidentiality, Integrity and Availability of the data. Legacy systems could use data shared in the Blockchain to implement the monitoring and supervision processes needed to help enforce tax collection, reduce tax evasion scenarios and increase sales tax uptake. Research shows that information captured in state and municipal tax collection information systems possess enough key data elements to establish a correlation between them and would make possible cross-check validations if data is consolidated in a Blockchain. The presented Blockchain Network Design and Chaincode using Hyperledger Fabric suggest that the implementation of a Blockchain based Electronic Data Interexchange (EDI) to support data exchange between state and municipal governments is feasible. Such implementation would provide the technological framework needed to automate the exchange of important merchant and sales tax information to support processes that target sales tax evasion detection, supervision and monitoring.", acknowledgement = ack-nhfb, advisor = "Rafael Nieves", keywords = "0464:Computer Engineering; 0546:Industrial engineering; 0984:Computer science; Blockchain; Computer engineering; Computer science; Electronic data interchange; Evasion; Hyperfabric; Industrial engineering; Legacy systems; Monitoring; Sales taxes; State taxes; Supervision; Tax; Tax evasion", ris-m1 = "13886563", } @Article{Nathan:2019:BMD, author = "Senthil Nathan and Chander Govindarajan and Adarsh Saraf and Manish Sethi and Praveen Jayachandran", title = "Blockchain meets database: design and implementation of a blockchain relational database", journal = j-PROC-VLDB-ENDOWMENT, volume = "12", number = "11", pages = "1539--1552", month = jul, year = "2019", CODEN = "????", DOI = "https://doi.org/10.14778/3342263.3342632", ISSN = "2150-8097", bibdate = "Wed Oct 2 06:49:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "In this paper, we design and implement the first-ever decentralized replicated relational database with blockchain properties that we term blockchain relational database. We highlight several similarities between features provided by blockchain platforms and a replicated relational database, although they are conceptually different, primarily in their trust model. Motivated by this, we leverage the rich features, decades of research and optimization, and available tooling in relational databases to build a blockchain relational database. We consider a permissioned blockchain model of known, but mutually distrustful organizations each operating their own database instance that are replicas of one another. The replicas execute transactions independently and engage in decentralized consensus to determine the commit order for transactions. We design two approaches, the first where the commit order for transactions is agreed upon prior to executing them, and the second where transactions are executed without prior knowledge of the commit order while the ordering happens in parallel. We leverage serializable snapshot isolation (SSI) to guarantee that the replicas across nodes remain consistent and respect the ordering determined by consensus, and devise a new variant of SSI based on block height for the latter approach. We implement our system on PostgreSQL and present detailed performance experiments analyzing both approaches.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @MastersThesis{Niayeshpour:2019:EVB, author = "Farshad Niayeshpour", title = "Engineering Valuation of Blockchain Technology in the Context of Petroleum Supply Chain: a Real Options Approach", type = "{M.S.}", school = "Iowa State University", address = "Ames, IA, USA", pages = "68", year = "2019", ISBN = "1-0883-7152-3", ISBN-13 = "978-1-0883-7152-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2306548695", abstract = "In this paper, we mathematically model and analyze occurrence of trade disputes in the context of a petroleum supply chain network which includes a seller, a buyer and an arbitrator. We study how switching from conventional trading system to a blockchain-based system could help decrease the number of disputes while maintaining the profitability of trading. Specifically, we determine what is the optimal timing to switch to blockchain technology through arbitrator's perspective under petroleum price uncertainty. The way blockchain technology aids trade irrefutability is to provide a secure and immutable distributed ledger which ensures each trade is recorded and timestamped with no participant being able to alter the transactions history. Consequently, participants trading in a safe network, can trust the system and conduct transactions more securely. Currently, around nine percent of crude oil transactions are disputed, which equates to around USD 150 billion each year. In a petroleum trading network, the disputes filed by either seller or buyer are consequences of fraud and/or error. Studies have shown, integrating Blockchain technology into trading network significantly reduces the probability of transactions disputes and trades recorded on a blockchain distributed ledger has higher finality rates. Although there has been much interest in blockchain technology applicable to petroleum industry supply chain, there has been little analytical investigation of irrefutability, one of the critical attributes of the blockchain technology. Irrefutability corresponds to a network characteristic which prevents any participant to question the integrity of transactions recorded on ledger and any future disputes. Throughout this work, we aim to show how irrefutability can be valued, in the context of petroleum industry supply chain, from a perspective of stochastic optimal control. We will show how petroleum strike prices for switching to blockchain technology can be found via real options approach through modeling fraud uncertainty. In other words, we are going to demonstrate under what conditions it is economically feasible from arbitrator's perspective to implement a blockchain technology by modeling number of disputes as a function of system's reliability. Even though at a first glance arbitrator may have no reason to favor blockchain over traditional system because of decrease in dispute resolution payments due to increased trade finality, on the other hand we conclude a profit for arbitrator which is sourced in higher transaction verification fees as number of transactions increases due to improved reliability of the system.", acknowledgement = ack-nhfb, advisor = "Kyung Min", keywords = "0546:Industrial engineering; Blockchain; Industrial engineering; Petroleum; Real options; Stochastic optimal control; Uncertainty", ris-m1 = "22588906", } @Article{Norta:2019:SFB, author = "Alex Norta and Raimundas Matulevicius and Benjamin Leiding", title = "Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns", journal = j-COMPUT-SECUR, volume = "86", number = "??", pages = "253--269", month = sep, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302670", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @PhdThesis{Notheisen:2019:EDM, author = "Benedikt Notheisen", title = "Engineering Decentralized Markets --- A Blockchain Approach", type = "{Ph.D.}", school = "Karlsruher Institut f{\"u}r Technologie, Universit{\"a}t Karlsruhe (TH)", address = "Karlsruhe, Germany", year = "2019", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2305779823", acknowledgement = ack-nhfb, ris-m1 = "27657190", } @Article{ODonovan:2019:SAR, author = "Peter O'Donovan and Dominic T. J. O'Sullivan", title = "A Systematic Analysis of Real-World Energy Blockchain Initiatives", journal = j-FUTURE-INTERNET, volume = "11", number = "8", pages = "174", day = "10", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11080174", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:07 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/8/174", abstract = "The application of blockchain technology to the energy sector promises to derive new operating models focused on local generation and sustainable practices, which are driven by peer-to-peer collaboration and community engagement. However, real-world energy blockchains differ from typical blockchain networks insofar as they must interoperate with grid infrastructure, adhere to energy regulations, and embody engineering principles. Naturally, these additional dimensions make real-world energy blockchains highly dependent on the participation of grid operators, engineers, and energy providers. Although much theoretical and proof-of-concept research has been published on energy blockchains, this research aims to establish a lens on real-world projects and implementations that may inform the alignment of academic and industry research agendas. This research classifies 131 real-world energy blockchain initiatives to develop an understanding of how blockchains are being applied to the energy domain, what type of failure rates can be observed from recently reported initiatives, and what level of technical and theoretical details are reported for real-world deployments. The results presented from the systematic analysis highlight that real-world energy blockchains are (a) growing exponentially year-on-year, (b) producing relatively low failure/drop-off rates ($ \approx $7\% since 2015), and (c) demonstrating information sharing protocols that produce content with insufficient technical and theoretical depth.", acknowledgement = ack-nhfb, remark = "Special Issue Blockchain: Current Challenges and Future Prospects/Applications.", } @Article{Pal:2019:UBP, author = "A. Pal and K. Kant", title = "Using Blockchain for Provenance and Traceability in {Internet of Things}-Integrated Food Logistics", journal = j-COMPUTER, volume = "52", number = "12", pages = "94--98", month = dec, year = "2019", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2019.2942111", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Fri Nov 29 06:16:06 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2010.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "Agriculture; Blockchain; Internet of Things; Standards; Supply chains; Transportation", } @Article{Paquet-Clouston:2019:RPB, author = "Masarah Paquet-Clouston and Bernhard Haslhofer and Benoit Dupont", title = "Ransomware payments in the Bitcoin ecosystem", journal = "J. Cybersecur.", volume = "5", number = "1", pages = "tyz003", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1093/cybsec/tyz003", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cybersecurity/cybersecurity5.html#Paquet-Clouston19", acknowledgement = ack-nhfb, dblp-key = "journals/cybersecurity/Paquet-Clouston19", dblp-mdate = "2020-05-22", } @Article{Pele:2019:UHF, author = "Daniel Traian Pele and Miruna Mazurencu-Marinescu-Pele", title = "Using High-Frequency Entropy to Forecast Bitcoin's Daily Value at Risk", journal = j-ENTROPY, volume = "21", number = "2", pages = "102", month = "????", year = "2019", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e21020102", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy21.html#PeleM19; https://www.wikidata.org/entity/Q103832669", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/PeleM19", dblp-mdate = "2020-12-25", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Perez-Sola:2019:DSP, author = "Cristina P{\'e}rez-Sol{\`a} and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\'\i}", title = "Double-spending prevention for {Bitcoin} zero-confirmation transactions", journal = j-INT-J-INFO-SEC, volume = "18", number = "4", pages = "451--463", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-018-0422-4", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Sat Jul 13 14:23:17 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/article/10.1007/s10207-018-0422-4", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Qu:2019:STB, author = "Qiang Qu and Ildar Nurgaliev and Muhammad Muzammal and Christian S. Jensen and Jianping Fan", title = "On spatio-temporal blockchain query processing", journal = j-FUT-GEN-COMP-SYS, volume = "98", number = "??", pages = "208--218", month = sep, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18314213", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Rathore:2019:BBB, author = "Shailendra Rathore and Byung Wook Kwon and Jong Hyuk Park", title = "{BlockSecIoTNet}: {Blockchain}-based decentralized security architecture for {IoT} network", journal = j-J-NETW-COMPUT-APPL, volume = "143", number = "??", pages = "167--177", day = "1", month = oct, year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:35 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519302243", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @MastersThesis{Razavi:2019:CBS, author = "Ardalan Razavi", title = "Combining Blockchain and Swarm Robotics to Deploy Surveillance Missions", type = "{M.S.}", school = "San Jose State University", address = "San Jose, CA, USA", pages = "53", year = "2019", ISBN = "1-0856-0892-1", ISBN-13 = "978-1-0856-0892-3", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2281091881", abstract = "Current swarm robotics systems are not utilized as frequently in surveillance missions due to the limitations of the existing distributed systems' designs. The main limitation of swarm robotics is the absence of a framework for robots to be self-governing, secure, and scalable. As of today, a swarm of robots is not able to communicate and perform tasks in transparent and autonomous ways. Many believe blockchain is the imminent future of distributed autonomous systems. A blockchain is a system of computers that stores and distributes data among all participants. Every single participant is a validator and protector of the data in the blockchain system. The data cannot be modified since all participants are storing and watching the same records. In this thesis, we will focus on blockchain applications in swarm robotics using Ethereum smart contracts because blockchain can make a swarm globally connected and secure. A decentralized application (DApp) is used to deploy surveillance missions. After mission deployment, the swarm uses blockchain to communicate and make decisions on appropriate tasks within Ethereum private networks. We set a test swarm robotics system and evaluate the blockchain for its performance, scalability, recoverability, and responsiveness. We conclude that, although blockchain enables a swarm to be globally connected and secure, there are performance limitations that can become a critical issue.", acknowledgement = ack-nhfb, advisor = "Gokay Saldamli", keywords = "0464:Computer Engineering; 0771:Robotics; 0984:Computer science; Blockchain; Computer engineering; Computer science; Ethereum; Internet of Things (IoT); Robotics; Swarm robotics", ris-m1 = "13895838", } @Article{Recabarren:2019:TBB, author = "Ruben Recabarren and Bogdan Carbunar", title = "{Tithonus}: a Bitcoin Based Censorship Resilient System", journal = "Proc. Priv. Enhancing Technol.", volume = "2019", number = "1", pages = "68--86", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.2478/popets-2019-0005", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/popets/popets2019.html#RecabarrenC19", acknowledgement = ack-nhfb, dblp-key = "journals/popets/RecabarrenC19", dblp-mdate = "2020-09-01", } @PhdThesis{Rechard:2019:EMP, author = "Kyle Rechard", title = "Essays on Monetary Policy and {Bitcoin} Financial Economics", type = "{Ph.D.}", school = "Clemson University", address = "Clemson, SC, USA", pages = "74", year = "2019", ISBN = "1-392-21971-X", ISBN-13 = "978-1-392-21971-3", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2240033855", abstract = "This dissertation includes three chapters. The first chapter investigates the impact of the Federal Reserve's balance sheet normalization using a Bayesian vector autoregression (BVAR) framework. I use counterfactual conditional forecasts to find that a reduction in asset holdings down to a level where the federal funds market is active again will reduce real GDP growth by an average of 0.18 percent per year and core inflation by a non-significant average of 0.07 percent per year under Quantitative Tightening, relative to a scenario where the Federal Reserve maintains a constant dollar amount of assets until 2024.The second chapter models monetary policy using Taylor's rule for the nominal interest-rate target and examines the difference between the actual Federal Funds Rate and the Taylor Rule model of behavior for distinct structural changes. Both a simple factor ANOVA and regime switching methods find that there were ``tight'' or ``loose'' regimes in U.S. monetary policy over the period 1965 to 2008. However, after accounting for the change in inflation measurement from CPI to PCE and then core PCE after 2004, Alan Greenspan's tenure from 2003 to 2006 is consistent with his earlier symmetric deviations from the Taylor Rule.The final chapter examines the volatility of Bitcoin exchange rates which have gained a great deal of attention since the creation of the currency. Standard measures of volatility reflect the dramatic change in the Bitcoin/US dollar exchange rate, from about \$0.05 USD in 2010 to the neighborhood of \$20,000 USD at the end of 2017, and down to around \$5,000 USD in mid-2019. Characterizing the short-term and long-term volatility gives an impression of the volatility of Bitcoin compared to other assets, as well as implying the viability of Bitcoin as a medium of exchange and alternative asset.", acknowledgement = ack-nhfb, advisor = "Gerald P. Dwyer", keywords = "0501:Economics; Bayesian svar; Bitcoin realized volatility; Conditional forecasting; Economics; Monetary policy regimes; Social sciences; Taylor rule; Unconventional monetary policy", ris-m1 = "13859818", } @Article{Rejeb:2019:LIT, author = "Abderahman Rejeb and John G. Keogh and Horst Treiblmaier", title = "Leveraging the {Internet of Things} and Blockchain Technology in Supply Chain Management", journal = j-FUTURE-INTERNET, volume = "11", number = "7", pages = "161", day = "20", month = jul, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11070161", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:06 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/7/161", abstract = "Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products and merchandise while they are moving through the value chain network. The application of the Internet of Things (IoT) can help companies to observe, track, and monitor products, activities, and processes within their respective value chain networks. Other applications of IoT include product monitoring to optimize operations in warehousing\‚ manufacturing, and transportation. In combination with IoT, Blockchain technology can enable a broad range of different application scenarios to enhance value chain transparency and to increase B2B trust. When combined, IoT and Blockchain technology have the potential to increase the effectiveness and efficiency of modern supply chains. The contribution of this paper is twofold. First, we illustrate how the deployment of Blockchain technology in combination with IoT infrastructure can streamline and benefit modern supply chains and enhance value chain networks. Second, we derive six research propositions outlining how Blockchain technology can impact key features of the IoT (i.e., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects.", acknowledgement = ack-nhfb, remark = "Special Issue Cloud Computing and Internet of Things.", } @Article{Rezaeibagha:2019:EMC, author = "Fatemeh Rezaeibagha and Yi Mu", title = "Efficient Micropayment of Cryptocurrency from Blockchains", journal = j-COMP-J, volume = "62", number = "4", pages = "507--517", month = apr, year = "2019", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/bxy105", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Tue Apr 2 12:10:39 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2010.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://academic.oup.com/comjnl/article/62/4/507/5155318", acknowledgement = ack-nhfb, fjournal = "Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Article{Ricci:2019:BBD, author = "J. Ricci and I. Baggili and F. Breitinger", title = "Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?", journal = j-IEEE-SEC-PRIV, volume = "17", number = "1", pages = "34--42", month = jan # "\slash " # feb, year = "2019", DOI = "https://doi.org/10.1109/MSEC.2018.2875877", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Fri Aug 2 08:20:27 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "https://publications.computer.org/security-and-privacy/", keywords = "Bitcoin; Blockchain; blockchain; cloud computing; Cloud computing; cloud storage; data acquisition; Digital forensics; digital forensics; digital storage; distributed cloud storage digital forensics; distributed databases; storage management", } @Article{Roy:2019:QAS, author = "Deepsubhra Guha Roy and Puja Das and Debashis De and Rajkumar Buyya", title = "{QoS}-aware secure transaction framework for {Internet of Things} using blockchain mechanism", journal = j-J-NETW-COMPUT-APPL, volume = "144", number = "??", pages = "59--78", day = "15", month = oct, year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:35 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S108480451930219X", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Ruan:2019:FGS, author = "Pingcheng Ruan and Gang Chen and Tien Tuan Anh Dinh and Qian Lin and Beng Chin Ooi and Meihui Zhang", title = "Fine-grained, secure and efficient data provenance on blockchain systems", journal = j-PROC-VLDB-ENDOWMENT, volume = "12", number = "9", pages = "975--988", month = may, year = "2019", CODEN = "????", DOI = "https://doi.org/10.14778/3329772.3329775", ISSN = "2150-8097", bibdate = "Wed Oct 2 06:49:01 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", abstract = "The success of Bitcoin and other cryptocurrencies bring enormous interest to blockchains. A blockchain system implements a tamper-evident ledger for recording transactions that modify some global states. The system captures entire evolution history of the states. The management of that history, also known as data provenance or lineage, has been studied extensively in database systems. However, querying data history in existing blockchains can only be done by replaying all transactions. This approach is applicable to large-scale, offline analysis, but is not suitable for online transaction processing. We present LineageChain, a fine-grained, secure and efficient provenance system for blockchains. LineageChain exposes provenance information to smart contracts via simple and elegant interfaces, thereby enabling a new class of blockchain applications whose execution logics depend on provenance information at runtime. LineageChain captures provenance during contract execution, and efficiently stores it in a Merkle tree. LineageChain provides a novel skip list index designed for supporting efficient provenance query processing. We have implemented LineageChain on top of Hyperledger and a blockchain-optimized storage system called ForkBase. Our extensive evaluation of LineageChain demonstrates its benefits to the new class of blockchain applications, its efficient query, and its small storage overhead.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "http://portal.acm.org/citation.cfm?id=J1174", } @Article{Ryu:2019:BBD, author = "Jung Hyun Ryu and Pradip Kumar Sharma and Jeong Hoon Jo and Jong Hyuk Park", title = "A blockchain-based decentralized efficient investigation framework for {IoT} digital forensics", journal = j-J-SUPERCOMPUTING, volume = "75", number = "8", pages = "4372--4387", month = aug, year = "2019", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-019-02779-9", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Thu Oct 10 15:31:21 MDT 2019", bibsource = "http://link.springer.com/journal/11227/75/8; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Sai:2019:ASI, author = "Ashish Rajendra Sai and Jim Buckley and Andrew {Le Gear}", title = "Assessing the security implication of {Bitcoin} exchange rates", journal = j-COMPUT-SECUR, volume = "86", number = "??", pages = "206--222", month = sep, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312112", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Saito:2019:HMD, author = "Kenji Saito and Mitsuru Iwamura", title = "How to make a digital currency on a blockchain stable", journal = j-FUT-GEN-COMP-SYS, volume = "100", number = "??", pages = "58--69", month = nov, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.019", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:01 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18300475", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Misc{Schneier:2019:BT, author = "Bruce Schneier", title = "Blockchain and Trust", howpublished = "Web blog.", day = "12", month = feb, year = "2019", bibdate = "Sat Apr 17 15:46:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.schneier.com/blog/archives/2019/02/blockchain_and_.html", abstract = "In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: ``We have proposed a system for electronic transactions without relying on trust.'' He was referring to blockchain, the system behind bitcoin cryptocurrency. The circumvention of trust is a great promise, but it's just not true. Yes, bitcoin eliminates certain trusted intermediaries that are inherent in other payment systems like credit cards. But you still have to trust bitcoin --- and everything about it.", acknowledgement = ack-nhfb, remark = "From the article: ``If your bitcoin exchange gets hacked, you lose all of your money. If your bitcoin wallet gets hacked, you lose all of your money. If you forget your login credentials, you lose all of your money. If there's a bug in the code of your smart contract, you lose all of your money. If someone successfully hacks the blockchain security, you lose all of your money.''.", } @PhdThesis{Schweizer:2019:DFS, author = "Andr{\'e} Schweizer", title = "Digitalization in the Financial Services Industry: Fostering Innovation Through Fintechs and Blockchain Technology", type = "{Dr.Econ.}", school = "Universit{\"a}t Bayreuth", address = "Bayreuth, Bavaria, Germany", pages = "62", year = "2019", ISBN = "1-0883-9851-0", ISBN-13 = "978-1-0883-9851-7", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2302014028", abstract = "Digitalization is forcing organizations to continuously evaluate and innovate their business models (Bharadwaj et al. 2013). In particular, digital innovation is leading to fundamental changes in the financial services industry (Barberis and Chishti 2016). Agile and innovative financial technology startups (fintechs) are known as a driver of these changes, since they address emerging customer demands by developing innovative technology-based solutions with user-centered approaches (Ansari and Krop 2012; Christensen 2013). Further, experts attribute a fundamental impact on the financial services industry to blockchain technology as an emerging disintermediating digital innovation (Beck et al. 2016; Wright and Filippi 2015). Fintechs and blockchain represent not only threats and sources of disruption for incumbent organizations, but also opportunities for collaboration and enhancement of their innovativeness (Economist Intelligence Unit 2015). For instance, various financial services institutions have initiated cooperations with fintechs, have launched blockchain research projects, and have expedited prototypical blockchain implementations (Fridgen et al. 2018; Holotiuk et al. 2018; Kaaru 2018). Although the financial services industry is key to almost every economy (McKinnon 1973; Odedokun 1996; Schmitt 1974), the research has lagged behind in comprehensively analyzing the phenomenon of digitalization in the financial services industry, with a particular focus on fintechs and blockchain technology. To date, neither the cooperation patterns between incumbents and fintechs nor blockchain technology and its characteristics and applications have been thoroughly analyzed or evaluated. In this thesis, I address this research gap by applying a multimethodological approach, structured in four research essays. Essay 1 identifies and evaluates the design parameters of bank-fintech cooperations and proposes a taxonomy for the classification of real-world cases. This scientifically validated taxonomy will allow one to strategically plan, analyze, and enter cooperations along the design dimensions and characteristics. Essay 2 examines blockchain technology and its potential to disintermediate existing structures, with a specific focus on crowdlending. Particularly, the results show that blockchain represents an alternative to existing IT infrastructures and can enable otherwise unsustainable (social) business models, mainly by replacing intermediaries. Essay 3 analyzes initial coin offerings (ICOs) as a disintermediated form of crowdfunding and identifies ICO archetypes. Further, essay 3 incorporates an in-depth analysis of the five predominant ICO archetypes: average, liberal, visionary, compliant, and native ICOs. Thus, this thesis --- to my best knowledge --- is the first to provide a structured analysis of ICO design parameters, ICO performance, and the influence of regulation. Essay 4 evaluates blockchain's potential in international trade finance. The findings suggest that, while blockchain is evolving and may be widely accepted, incumbents such as banks will be required in the financial services industry, their roles and business models may change significantly. Overall, this thesis allows the reader to better understand the phenomena of fintechs and blockchain technology; it also generates generalizable knowledge on how they affect the financial services industry. Further, I provide insights into and guidelines on how organizations in the financial services industry may respond to these emerging phenomena and may leverage their potential.", abstract-de = "Die Digitalisierung zwingt Unternehmen zunehmend, ihre Gesch{\"a}ftsmodelle kontinuierlich zu hinterfragen, bewerten und erneuern (Bharadwaj et al. 2013). Insbesondere die digitale Innovation f{\"u}hrt zu grundlegenden Ver{\"a}nderungen in der Finanzdienstleistungsbranche (Barberis und Chishti 2016). Agile und innovative Start-ups (Fintechs) gelten als Treiber dieser Ver{\"a}nderungen, da sie auf die neu entstehenden Kundenbed{\"u}rfnisse eingehen, indem sie innovative technologiebasierte L{\"o}sungen auf Basis benutzerzentrierter Ans{\"a}tzen entwickeln (Ansari und Krop 2012; Christensen 2013). Dar{\"u}ber hinaus schreiben Experten der Blockchain-Technologie das Potential zu, weitreichende Ver{\"a}nderungen in der Finanzdienstleistungsbranche zu bewirken (Beck et al. 2016; Wright und Filippi 2015). Fintechs und Blockchain stellen jedoch nicht nur Bedrohungen und Ausl{\"o}ser von Disruption dar f{\"u}r etablierte Unternehmen dar, sondern bieten den etablierte Unternehmen auch M{\"o}glichkeiten zur Zusammenarbeit und Steigerung ihrer Innovationsf{\"a}higkeit (Economist Intelligence Unit 2015). So haben bereits verschiedene Finanzdienstleistungsinstitute Kooperationen mit Fintechs initiiert, Blockchain-Forschungsprojekte gestartet und prototypische Blockchain-Implementierungen forciert (Fridgen et al. 2018; Holotiuk et al. 2018; Kaaru 2018). Obwohl die Finanzdienstleistungsbranche f{\"u}r nahezu jede Volkswirtschaft von zentraler Bedeutung ist (McKinnon 1973; Odedokun 1996; Schmitt 1974), besteht weiterhin Forschungsbedarf hinsichtlich der Digitalisierung mit besonderem Fokus auf Fintechs und Blockchain-Technologie, da umfassende Analysen fehlen. Bislang wurden weder die Kooperationsmuster zwischen etablierten Unternehmen und Fintechs noch die Blockchain-Technologie, ihre Eigenschaften und Anwendungen tiefgr{\"u}ndig analysiert bzw. bewertet. Im Rahmen der vorliegenden Arbeit wird die oben dargelegte Forschungsl{\"u}cke adressiert. Dazu wird ein multimethodischer Ansatz verfolgt, welcher in vier Forschungsaufs{\"a}tze unterteilt ist. Im ersten Forschungsaufsatz werden Designparameter von Bank-Fintech-Kooperationen identifiziert, bewertet und in Form einer Taxonomie vorgestellt. Die wissenschaftlich validierte Taxonomie erm{\"o}glicht es Kooperationen entlang der Designdimensionen und -parameter strategisch zu planen, analysieren und einzugehen. Im zweiten Forschungsaufsatz werden die Blockchain-Technologie und ihr Potenzial, hinsichtlich der Disintermediation bestehender Strukturen untersucht. Ein besonderer Fokus liegt hierbei auf dem Bereich der ``Social Businesses''. Die Ergebnisse zeigen, dass die Blockchain eine Alternative zu bestehenden IT-Infrastrukturen darstellt und das Potential besitzt, bisher nicht nachhaltige (soziale) Gesch{\"a}ftsmodelle, wettbewerbsf{\"a}hig zu gestalten. Der dritte Forschungsaufsatz analysiert Initial Coin Offerings (ICOs) als neuartige Form von Crowdfunding. Im Forschungsaufsatz werden f{\"u}nf ICO-Archetypen identifiziert und diese detailliert untersucht. Dadurch ist vorliegende Arbeit --- nach bestem Wissen --- die erste Forschungsarbeit, die eine strukturierte Analyse der ICO-Designparameter, eine Betrachtung kurz- und langfristigen Entwicklung von ICO-Archetypen und des Einflusses der Regulierung auf ICOs liefert. Im vierten Forschungsaufsatz wird das Potenzial der Blockchain im Bereich der internationalen Handelsfinanzierung untersucht. Die Ergebnisse deuten darauf hin, dass die Blockchain sich zwar weiterentwickelt und allgemein akzeptiert werden k{\"o}nnte, etablierte Unternehmen wie Banken jedoch in der Finanzdienstleistungsbranche ben{\"o}tigt werden, wenngleich ihre Rollen und Gesch{\"a}ftsmodelle sich jedoch erheblich {\"a}ndern k{\"o}nnen. Die vorliegende Arbeit vermittelt dem Leser ein umfassendes Verst{\"a}ndnis zu den Ph{\"a}nomenen der Fintechs und der Blockchain-Technologie. Des Weiteren liefert sie generalisierbares Wissen hinsichtlich der Auswirkungen von Fintechs und Blockchain auf die Finanzdienstleistungsbranche. Dar{\"u}ber hinaus gibt die Arbeit Empfehlungen ab, wie Unternehmen in der Finanzdienstleistungsbranche mit Fintechs und der Blockchain umgehen sollten, um deren Potentiale auszusch{\"o}pfen.", acknowledgement = ack-nhfb, keywords = "0489:Information Technology; 0508:Finance; 0511:Economic theory; Blockchain technology; Economic theory; Finance; Financial services industry; Information technology", ris-m1 = "27600397", } @Article{Sgantzos:2019:AII, author = "Konstantinos Sgantzos and Ian Grigg", title = "Artificial Intelligence Implementations on the Blockchain. {Use} Cases and Future Applications", journal = j-FUTURE-INTERNET, volume = "11", number = "8", pages = "170", day = "02", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11080170", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:07 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/8/170", abstract = "An exemplary paradigm of how an AI can be a disruptive technological paragon via the utilization of blockchain comes straight from the world of deep learning. Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can be very expensive to purchase, as, depending on both the proper selection of the elements and the homogeneity of the data contained within, constructing and maintaining the integrity of a dataset is difficult. Blockchain as a highly secure storage medium presents a technological quantum leap in maintaining data integrity. Furthermore, blockchain's immutability constructs a fruitful environment for creating high quality, permanent and growing datasets for deep learning. The combination of AI and blockchain could impact fields like Internet of things (IoT), identity, financial markets, civil governance, smart cities, small communities, supply chains, personalized medicine and other fields, and thereby deliver benefits to many people.", acknowledgement = ack-nhfb, remark = "Special Issue Blockchain: Current Challenges and Future Prospects/Applications.", } @Article{Sherman:2019:OVB, author = "A. T. Sherman and F. Javani and H. Zhang and E. Golaszewski", title = "On the Origins and Variations of Blockchain Technologies", journal = j-IEEE-SEC-PRIV, volume = "17", number = "1", pages = "72--77", month = jan # "\slash " # feb, year = "2019", DOI = "https://doi.org/10.1109/MSEC.2019.2893730", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Fri Aug 2 08:20:27 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "https://publications.computer.org/security-and-privacy/", keywords = "Bitcoin; Blockchain; blockchain technologies; blockchain variation; Computer security; cryptography; Fault tolerant systems; financial data processing; Smart contracts", } @MastersThesis{Shivers:2019:TSD, author = "Ryan M. Shivers", title = "Toward a Secure and Decentralized Blockchain-Based Ride-Hailing Platform for Autonomous Vehicles", type = "{M.S.}", school = "Tennessee Technological University", address = "Cookeville, TN, USA", pages = "95", year = "2019", ISBN = "1-392-16110-X", ISBN-13 = "978-1-392-16110-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2231143871", abstract = "Ride-hailing and ride-sharing applications have recently gained in popularity as a convenient alternative to traditional modes of travel. Current research into autonomous vehicles is accelerating rapidly and will soon become a critical component of a ride-hailing platform's architecture. Implementing an autonomous vehicle ride-hailing platform proves a difficult challenge due to the centralized nature of traditional ride-hailing architectures. In a traditional ride-hailing environment the drivers operate their own personal vehicles so it follows that a fleet of autonomous vehicles would be required for a centralized ride-hailing platform to succeed. Decentralization of the ride-hailing platform would remove a road block along the way to an autonomous vehicle ride-hailing platform by allowing owners of autonomous vehicles to add their vehicle to a community driven fleet when not in use. Blockchain technology is an attractive choice for this decentralized architecture due to its immutability and fault tolerance. This thesis proposes a framework for developing a decentralized ride-hailing architecture that is verifiably secure. Implementation of this framework uses Hyperledger Fabric and evaluation of the implementation is done by applying known security models, utilizing a chaincode static analysis tool, and performing a performance analysis under heavy network load.", acknowledgement = ack-nhfb, advisor = "Sheikh K. Ghafoor", keywords = "0771:Robotics; 0984:Computer science; Applied sciences; Blockchain; Computer science; Hyperledger fabric; Information security; Ride-hailing; Robotics", ris-m1 = "13859042", } @MastersThesis{Shukla:2019:SIE, author = "Rohit Shukla", title = "Sharing and Integrating Electronic Health Records Using Blockchain", type = "{M.S.}", school = "State University of New York at Stony Brook", address = "Stony Brook, NY, USA", pages = "46", year = "2019", ISBN = "1-392-06303-5", ISBN-13 = "978-1-392-06303-3", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2217096961", abstract = "With increased specialization of healthcare services, and high mobility of patients, accessing healthcare services across multiple hospitals or clinics become very common for diagnosis and treatment, in particular, for patients with chronic diseases such as cancer. Timely sharing of electronic health records (EHR) across providers is essential for prompt care of cancer patients. With informed knowledge of a patient's history of health, tests, diagnosis and treatment, physicians can make prompt clinical decisions for smarter, safer, and more efficient care. It will also save cost of unnecessary repeated tests thus maximizing the value of services delivered to patients. However, due to privacy and high sensitivity of EHR, most EMR data sharing is still through fax or mails due to lack of systematic infrastructure support for secure and trustable EMR data sharing, which also incurs major delays for prompt care. Recently, blockchain technologies emerge with tremendous momentum with the success of Bitcoin crypto-currency. Blockchain uses distributed ledger to provide a shared, immutable, and transparent history of all the actions that have happened to all the participants of the network. It enables a new generation of transactional applications that establish trust, accountability and transparency. Blockchain makes it possible for a user to have complete control of data and privacy without a central point of control, thus highly cost-effective and efficient for building applications for sharing EHR data. In this thesis, we proposed and developed a secure and trustable security framework based on permissioned blockchain Hyperledger for high sensitive EMR. Through the system, participating healthcare providers will provide validating blockchain nodes integrated with their existing EHR systems to enable, validate and track transactions for EHR data sharing controlled by patients. EHR data are managed in an off-chain HIPAA compliant cloud storage, and metadata on EHR and access control are managed in the chain. To provide interoperable data sharing and integration, we adopt HL7 Fast Healthcare Interoperability Resources (FHIR) standard based approach for representing and sharing EHR data in a unified approach. We also provide a Web based application to enable end users --- patients and doctors to flexibly browse EHR data and manage data sharing.", acknowledgement = ack-nhfb, advisor = "Fusheng Wang", keywords = "0984:Computer science; Applied sciences; Blockchain; Computer science; Cryptography; Electronic health records; Hospital data; Medical records; Privacy", ris-m1 = "13427892", } @Article{Si:2019:IIS, author = "Haiping Si and Changxia Sun and Yanling Li and Hongbo Qiao and Lei Shi", title = "{IoT} information sharing security mechanism based on blockchain technology", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "1028--1040", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.07.036", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19312725", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Singh:2019:BBC, author = "Nikita Singh and Manu Vardhan", title = "Blockchain based e-Cheque Clearing Framework", journal = j-SCPE, volume = "20", number = "3", pages = "511--526", month = "????", year = "2019", CODEN = "????", ISSN = "1895-1767", ISSN-L = "1895-1767", bibdate = "Thu Oct 3 07:39:16 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/scpe.bib", URL = "https://www.scpe.org/index.php/scpe/article/view/1506", acknowledgement = ack-nhfb, fjournal = "Scalable Computing: Practice and Experience", journal-URL = "http://www.scpe.org/", } @Article{Skowronski:2019:OBA, author = "Rafa{\l} Skowro{\'n}ski", title = "The open blockchain-aided multi-agent symbiotic cyber-physical systems", journal = j-FUT-GEN-COMP-SYS, volume = "94", number = "??", pages = "430--443", month = may, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18307520", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{So:2019:NAS, author = "Jaewoo So", title = "A New Attack Scheme on the Bitcoin Reward System", journal = "IEICE Trans. Fundam. Electron. Commun. Comput. Sci.", volume = "102-A", number = "1", pages = "300--302", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1587/transfun.E102.A.300", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.ieice.org/bin/summary.php?id=e102-a_1_300; https://dblp.org/db/journals/ieicet/ieicet102a.html#So19", acknowledgement = ack-nhfb, dblp-key = "journals/ieicet/So19", dblp-mdate = "2020-04-11", } @Article{Spathoulas:2019:CBB, author = "Georgios Spathoulas and Nikolaos Giachoudis and Georgios-Paraskevas Damiris and Georgios Theodoridis", title = "Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on {Internet of Things} Botnets", journal = j-FUTURE-INTERNET, volume = "11", number = "11", pages = "226", day = "25", month = oct, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11110226", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:08 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/11/226", abstract = "Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and software. Existing security models, approaches and solutions are not able to sufficiently protect such systems. In this paper we propose the use of lightweight agents installed at multiple internet of things (IoT) installations (e.g., smart-homes), in order to collaboratively detect distributed denial of service (DDoS) attacks conducted by the use of IoT devices botnets. Specifically, agents exchange outbound traffic information in order to identify possible victims of DDoS attacks. This information exchange is governed by a blockchain smart contract, that ensures the integrity of both the procedure and the information. A simulation of the operation of the proposed methodology has been conducted in order to evaluate both its detection efficiency and its resilience against malicious agents that aim to falsify results.", acknowledgement = ack-nhfb, remark = "Special Issue Security and Reliability of IoT---Selected Papers from SecRIoT 2019.", } @Article{Sturm:2019:BBR, author = "Christian Sturm and Jonas Scalanczi and Stefan Sch{\"o}nig and Stefan Jablonski", title = "A Blockchain-based and resource-aware process execution engine", journal = j-FUT-GEN-COMP-SYS, volume = "100", number = "??", pages = "19--34", month = nov, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.006", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:01 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18327158", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Suda:2019:ACB, author = "David Suda and Luke Spiteri", title = "Analysis and Comparison of Bitcoin and {S and P 500} Market Features Using {HMMs} and {HSMMs}", journal = "Inf.", volume = "10", number = "10", pages = "322", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/info10100322", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/information/information10.html#SudaS19", acknowledgement = ack-nhfb, dblp-key = "journals/information/SudaS19", dblp-mdate = "2020-07-09", } @PhdThesis{Sukhwani:2019:PMA, author = "Harish Sukhwani", title = "Performance Modeling \& Analysis of Hyperledger Fabric (Permissioned Blockchain Network)", type = "{Ph.D.}", school = "Duke University", address = "Durham, NC 27708, USA", pages = "178", year = "2019", ISBN = "0-438-80326-4", ISBN-13 = "978-0-438-80326-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2172417977", abstract = "A blockchain is an immutable record of transactions (called ledger) between a distributed set of mutually untrusting peers. Although blockchain networks provide tremendous benefits, there are concerns about whether their performance would be a hindrance to its adoption. Our research is focused on Hyperledger Fabric (HLF), which is an open-source implementation of a distributed ledger platform for running smart contracts in a modular architecture. This thesis presents our research on performance modeling of Hyperledger Fabric using a Stochastic Petri Nets modeling formalism known as Stochastic Reward Nets (SRN). We capture the key system operations and complex interactions between them. We focus on two different releases of HLF, viz. v0.6 and v1.0+ (V1). HLF v0.6 follows a traditional state-machine replication architecture followed by many other blockchain platforms, whereas HLF V1 follows a novel execute-order-validate architecture. We parameterize and validate our models with data collected from a real-world Fabric network setup. Our models provide a quantitative framework that helps compare different deployment configurations of Fabric and make design trade-off decisions. It also enables us to compute performance for a system with proposed architectural improvements before they are implemented. From our analysis, we recommend design improvements along with the estimates of performance improvement. Overall, our models provide a stepping stone to the Hyperledger Fabric community towards achieving optimal performance of Fabric in the real-world deployments.", acknowledgement = ack-nhfb, advisor = "Kishor S. Trivedi", keywords = "0464:Computer Engineering; 0544:Electrical engineering; 0984:Computer science; Applied sciences; Blockchain; Computer Engineering; Computer science; Electrical engineering; Hyperledger fabric; Model validation; Performance evaluation; Performance modeling; Stochastic reward nets", ris-m1 = "10976818", } @MastersThesis{Tamang:2019:DRM, author = "Sujata Tamang", title = "Decentralized Reputation Model and Trust Framework Blockchain and Smart contracts", type = "{Master's}", school = "Uppsala Universitet", address = "Uppsala, Sweden", year = "2019", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2301552161", abstract = "Blockchain technology is being researched in diverse domains for its ability to provide distributed, decentralized and time-stamped transactions. It is attributed to by its fault-tolerant and zero- downtime characteristics with methods to ensure records of immutable data such that its modification is computationally infeasible. Trust frameworks and reputation models of an online interaction system are responsible for providing enough information (e.g., in the form of trust score) to infer the trustworthiness of interacting entities. The risk of failure or probability of success when interacting with an entity relies on the information provided by the reputation system. Thus, it is crucial to have an accurate, reliable and immutable trust score assigned by the reputation system. The centralized nature of current trust systems, however, leaves the valuable information as such prone to both external and internal attacks. This master's thesis project, therefore, studies the use of blockchain technology as an infrastructure for an online interaction system that can guarantee a reliable and immutable trust score. It proposes a system of smart contracts that specify the logic for interactions and models trust among pseudonymous identities of the system. The contract is deployed on a blockchain network where the trust score of entities are computed, stored and updated. The proposed method and the trust metrics used is evaluated by simulating an interaction graph using an existing dataset. The obtained results then illustrate that the proposed method is resilient against several threat models and distinguishes between honest or malicious participation of entities on the network.", acknowledgement = ack-nhfb, advisor = "Jonatan Bergquist", ris-m1 = "27629376", } @Article{Thai:2019:HBF, author = "Quang Tung Thai and Jong-Chul Yim and Tae-Whan Yoo and Hyun-Kyung Yoo and Ji-Young Kwak and Sun-Me Kim", title = "Hierarchical {Byzantine} fault-tolerance protocol for permissioned blockchain systems", journal = j-J-SUPERCOMPUTING, volume = "75", number = "11", pages = "7337--7365", month = nov, year = "2019", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-019-02939-x", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Sat Jul 25 07:17:52 MDT 2020", bibsource = "http://link.springer.com/journal/11227/75/11; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Tonelli:2019:WSI, author = "Roberto Tonelli and Marco Ortu and Stephane Ducasse and Michele Marchesi", title = "Workshop Summary: {2019 IEEE \slash {ACM} Second International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB 2019)}", journal = j-SIGSOFT, volume = "44", number = "3", pages = "48--52", month = nov, year = "2019", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/3356773.3356807", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Mar 24 14:07:38 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib", URL = "https://dl.acm.org/doi/10.1145/3356773.3356807", abstract = "The second Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB 2019) intends to pursue the experience of WETSEB 2018 which inherited from the past eight editions of WETSoM (Workshop on Emerging Trends on Software Metrics) the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/loi/sigsoft", } @Article{Tuli:2019:FBB, author = "Shreshth Tuli and Redowan Mahmud and Shikhar Tuli and Rajkumar Buyya", title = "{FogBus}: a Blockchain-based Lightweight Framework for Edge and Fog Computing", journal = j-J-SYST-SOFTW, volume = "154", number = "??", pages = "22--36", month = aug, year = "2019", CODEN = "JSSODM", DOI = "https://doi.org/10.1016/j.jss.2019.04.050", ISSN = "0164-1212 (print), 1873-1228 (electronic)", ISSN-L = "0164-1212", bibdate = "Mon May 27 07:11:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0164121219300822", acknowledgement = ack-nhfb, fjournal = "Journal of Systems and Software", journal-URL = "http://www.sciencedirect.com/science/journal/01641212", } @Article{Viswanathan:2019:BSR, author = "R. Viswanathan and D. Dasgupta and S. R. Govindaswamy", title = "{Blockchain Solution Reference Architecture (BSRA)}", journal = j-IBM-JRD, volume = "63", number = "2--3", pages = "1:1--1:12", month = mar # "\slash " # may, year = "2019", CODEN = "IBMJAE", DOI = "https://doi.org/10.1147/JRD.2019.2913629", ISSN = "0018-8646 (print), 2151-8556 (electronic)", ISSN-L = "0018-8646", bibdate = "Thu Jul 25 15:06:42 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib", acknowledgement = ack-nhfb, fjournal = "IBM Journal of Research and Development", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520", keywords = "Architecture; Blockchain; Distributed databases; Distributed ledger; Security; Stakeholders", } @Article{Volety:2019:CBW, author = "Tejaswi Volety and Shalabh Saini and Thomas McGhin and Charles Zhechao Liu and Kim-Kwang Raymond Choo", title = "Cracking {Bitcoin} wallets: {I} want what you have in the wallets", journal = j-FUT-GEN-COMP-SYS, volume = "91", number = "??", pages = "136--143", month = feb, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Feb 5 08:15:51 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X18302929", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Voulgaris:2019:BTI, author = "Spyros Voulgaris and Nikos Fotiou and Vasilios A. Siris and George C. Polyzos and Mikael Jaatinen and Yannis Oikonomidis", title = "Blockchain Technology for Intelligent Environments", journal = j-FUTURE-INTERNET, volume = "11", number = "10", pages = "213", day = "11", month = oct, year = "2019", CODEN = "????", DOI = "https://doi.org/10.3390/fi11100213", ISSN = "1999-5903", bibdate = "Thu Nov 21 16:51:08 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/11/10/213", abstract = "In the last few years, we have been witnessing the convergence of the physical with the digital world. The Internet of Things (IoT) is progressing at a fast pace, and IoT devices are becoming pervasive in our physical environments, bringing the vision of Intelligent Environments closer to reality. At the same time, the newly-introduced blockchain technology is offering for the first time ever cryptographically proven trust based on a set of mutually untrusted nodes. Blockchain technology thus has the potential to become a key component of many IoT systems, offering them an unprecedented level of accountability, transparency, and reliability. This paper first lays out the principles on which blockchain systems are operating, along with descriptions of the most noteworthy blockchain implementations. It then presents a number of systems through which blockchains may interact with external systems and third-party data sources. Finally, it provides a survey of the state-of-the-art blockchain-based systems targeting IoT applications.", acknowledgement = ack-nhfb, remark = "Collection Featured Reviews of Future Internet Research.", } @Article{Waldo:2019:HGB, author = "Jim Waldo", title = "A hitchhiker's guide to the blockchain universe", journal = j-CACM, volume = "62", number = "3", pages = "38--42", month = mar, year = "2019", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3303868", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Mar 4 14:30:18 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2019/3/234926/fulltext", abstract = "Blockchain remains a mystery, despite its growing acceptance.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Wan:2019:MEF, author = "Zhiguo Wan and Robert H. Deng and David Lee and Ying Li", title = "{MicroBTC}: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains", journal = "J. Comput. Sci. Technol.", volume = "34", number = "2", pages = "403--415", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s11390-019-1916-x", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "https://dblp.org/db/journals/jcst/jcst34.html#WanDLL19", acknowledgement = ack-nhfb, dblp-key = "journals/jcst/WanDLL19", dblp-mdate = "2019-09-25", } @Article{Wang:2019:CPB, author = "Licheng Wang and Xiaoying Shen and Jing Li and Jun Shao and Yixian Yang", title = "Cryptographic primitives in blockchains", journal = j-J-NETW-COMPUT-APPL, volume = "127", number = "??", pages = "43--58", day = "1", month = feb, year = "2019", CODEN = "JNCAF3", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon Oct 14 14:16:29 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S108480451830362X", acknowledgement = ack-nhfb, fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Wang:2019:DNP, author = "Shuai Wang and Chengyu Zhang and Zhendong Su", title = "Detecting nondeterministic payment bugs in {Ethereum} smart contracts", journal = j-PACMPL, volume = "3", number = "OOPSLA", pages = "189:1--189:29", month = oct, year = "2019", DOI = "https://doi.org/10.1145/3360615", bibdate = "Fri Aug 7 19:22:30 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3360615", abstract = "The term ``smart contracts'' has become ubiquitous to describe an enormous number of programs uploaded to the popular Ethereum blockchain system. Despite rapid growth of the smart contract ecosystem, errors and exploitations have been constantly reported rom online contract systems, which has put financial stability at risk with losses totaling millions of US dollars. Most existing research focuses on pinpointing specific types of vulnerabilities using known patterns. However, due to the lack of awareness of the inherent nondeterminism in the Ethereum blockchain system and how it affects the funds transfer of smart contracts, there can be unknown vulnerabilities that may be exploited by attackers to access numerous online smart contracts.\par In this paper, we introduce a methodical approach to understanding the inherent nondeterminism in the Ethereum blockchain system and its (unwanted) influence on contract payments. We show that our new focus on nondeterminism-related smart contract payment bugs captures the root causes of many common vulnerabilities without relying on any known patterns and also encompasses recently disclosed issues that are not handled by existing research. To do so, we introduce techniques to systematically model components in the contract execution context and to expose various nondeterministic factors that are not yet fully understood. We further study how these nondeterministic factors impact contract funds transfer using information flow tracking. The technical challenge of detecting nondeterministic payments lies in discovering the contract global variables subtly affected by read-write hazards because of unpredictable transaction scheduling and external callee behavior. We show how to augment and instrument a contract program into a representation that simulates the execution of a large subset of the contract behavior. The instrumented code is then analyzed to flag nondeterministic global variables using off-the-shelf model checkers.\par We implement the proposed techniques as a practical tool named NPChecker (Nondeterministic Payment Checker) and evaluate it on 30K online contracts (3,075 distinct) collected from the Ethereum mainnet. NPChecker has successfully detected nondeterministic payments in 1,111 online contracts with reasonable cost. Further investigation reports high precision of NPChecker (only four false positives in a manual study of 50 contracts). We also show that NPChecker unveils contracts vulnerable to recently-disclosed attack vectors. NPChecker can identify all six new vulnerabilities or variants of common smart contract vulnerabilities that are missed by existing research relying on a ``contract vulnerability checklist.''", acknowledgement = ack-nhfb, articleno = "189", fjournal = "Proceedings of the ACM on Programming Languages", journal-URL = "https://pacmpl.acm.org/", } @Article{Wang:2019:EBP, author = "Liyan Wang and Juntao Gao and Xuelian Li", title = "Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security", journal = "Int. J. Netw. Secur.", volume = "21", number = "5", pages = "774--784", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p774-784.pdf; https://dblp.org/db/journals/ijnsec/ijnsec21.html#WangGL19", acknowledgement = ack-nhfb, dblp-key = "journals/ijnsec/WangGL19", dblp-mdate = "2021-01-04", } @Article{Wang:2019:LBI, author = "Yongge Wang and Qutaibah M. Malluhi", title = "The limit of blockchains: infeasibility of a smart {Obama--Trump} contract", journal = j-CACM, volume = "62", number = "5", pages = "64--69", month = may, year = "2019", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Apr 27 18:22:12 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2010.bib", URL = "https://cacm.acm.org/magazines/2019/5/236410/fulltext", abstract = "Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Wang:2019:LNF, author = "Hao Wang and Chaonian Guo and Shuhan Cheng", title = "{LoC} --- A new financial loan management system based on smart contracts", journal = j-FUT-GEN-COMP-SYS, volume = "100", number = "??", pages = "648--655", month = nov, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.040", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:01 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18324233", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", keywords = "Blockchain; Decentralized ledger technology; Financial loan; Smart contracts", } @Article{Wang:2019:MAB, author = "Canhui Wang and Xiaowen Chu and Qin Yang", title = "Measurement and Analysis of the Bitcoin Networks: a View from Mining Pools", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1902.07549; https://dblp.org/db/journals/corr/corr1902.html#abs-1902-07549", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1902-07549", dblp-mdate = "2021-12-10", } @Article{Wang:2019:MKS, author = "Haiyu Wang and Xuelian Li and Juntao Gao and Wei Li", title = "{MOBT}: a kleptographically-secure hierarchical-deterministic wallet for multiple offline {Bitcoin} transactions", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "315--326", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.04.055", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1733011X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @MastersThesis{Weygand:2019:RKP, author = "Rachel R. Weygand", title = "Refining the {Kimberley Process}: an Analysis of the Certification Scheme's Failings and Exploration of Blockchain Technology as a Solution", type = "{M.S.}", school = "Utica College", address = "Utica, NY, USA", pages = "59", year = "2019", ISBN = "1-392-12426-3", ISBN-13 = "978-1-392-12426-0", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2226166518", abstract = "This capstone project seeks to determine whether blockchain technology presents an effective solution to ongoing abuses of human rights within the diamond industry and to the Kimberley Process Certification Scheme's (KPCS) ineffectiveness in mitigating these issues. Additionally, this project will seek to determine what, if any role, may be best served by the KPCS in a blockchain-enabled industry. Identifying an effective solution for the ethical sourcing of diamonds is of critical importance as parties within the diamond trade continue to use KPCS loopholes and outright fraud to exploit and abuse miners, many of whom represent forced labor. Subject to a myriad of criticism and obstructed by internal politics, the KPCS, tasked with defunding conflict diamonds, is struggling to regain its effectiveness even as blockchain's emergence into the diamond industry threatens the scheme's relevance. Examining blockchain efforts in the cobalt mining industry, which faces concerns and challenges parallel to those seen within the diamond industry, research conducted within this project will determine that although blockchain's application to ethical sourcing is not without its limitations, the technology represents a powerful tool in the fight to defund human rights abuses in the diamond industry. Ultimately, blockchain's continued expansion into the diamond trade appears certain, and research will determine that it would not only be in the best interest of the KPCS to embrace the technology, but that the diamond industry overall would be best served through the repurposing of the KPCS as primary examining body, a role which would require the KPCS to partner with corporate developers of blockchain platforms, perform audits of individual mining sites, and provide assurances to consumers regarding the origin of individual gems.", acknowledgement = ack-nhfb, advisor = "Donald Rebovich", keywords = "0394:Ethics; Blood diamonds; Distributed ledger; Ethical consumerism; Ethics; Philosophy, religion and theology; Supply chain", ris-m1 = "13877472", } @Article{Winnicka:2019:IUB, author = "Alicja Winnicka and Karolina Kesik", title = "Idea of Using Blockchain Technique for Choosing the Best Configuration of Weights in Neural Networks", journal = j-ALGORITHMS-BASEL, volume = "12", number = "8", month = aug, year = "2019", CODEN = "ALGOCH", DOI = "https://doi.org/10.3390/a12080163", ISSN = "1999-4893 (electronic)", ISSN-L = "1999-4893", bibdate = "Thu May 28 08:40:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/algorithms.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.mdpi.com/1999-4893/12/8/163", acknowledgement = ack-nhfb, articleno = "163", fjournal = "163", journal-URL = "https://www.mdpi.com/", pagecount = "??", } @Article{Wu:2019:EAB, author = "Di Wu and Xiang-dong Liu and Xiangbin Yan and Rui Peng and Gang Li", title = "Equilibrium analysis of bitcoin block withholding attack: a generalized model", journal = "Reliab. Eng. Syst. Saf.", volume = "185", number = "??", pages = "318--328", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1016/j.ress.2018.12.026", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ress/ress185.html#WuLYPL19", acknowledgement = ack-nhfb, dblp-key = "journals/ress/WuLYPL19", dblp-mdate = "2020-10-26", } @PhdThesis{Wu:2019:MTA, author = "Qiong Wu", title = "Microstructure Theory Applied in {RMB} Exchange Rate and {Bitcoin} Market Price", type = "{Ph.D.}", school = "Iowa State University", address = "Ames, IA, USA", pages = "190", year = "2019", ISBN = "1-0883-1960-2", ISBN-13 = "978-1-0883-1960-4", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2289586454", abstract = "This dissertation presents the application of microstructure theory on the RMB exchange rate and Bitcoin market price. The existing research on the RMB exchange rate and Bitcoin market price mainly studied their statistical characteristics through empirical methodologies. This dissertation fills the research gap in microstructure theory applied to the RMB exchange rate and Bitcoin market price. First, the model for the determination of the two Renminbi (RMB) exchange rates and their interactions is established, and empirical analysis suggests that the interactions among the two exchange rates and the explanatory variables are time-varying, in particular, after the ``811 RMB exchange rate reform'', the offshore RMB exchange rate replaced the onshore RMB exchange rate as the leading indicator. Second, a model describing the speculative behavior in the Bitcoin trading market is developed. This theoretical model captures the statistical characteristics of Bitcoin market prices. The fundamental value of Bitcoin system is controversial, and the mysterious and innovative features of the Bitcoin system incite the speculation behaviours. The speculation leads to the market bubble that brought the soaring and plunges of Bitcoin market price. Finally, an economic model for Bitcoin mining competition based on the Bitcoin protocol is established, which provides a benchmark for further research on mining competition in economics. For any Bitcoin miners, the equilibrium input depends on the comparison of the miner's own marginal cost with that of other miners, however, whether profit can be obtained or not depends on the miner's own fixed cost.", acknowledgement = ack-nhfb, advisor = "Sergio Lence and Rajesh Singh", keywords = "0501:Economics; 0508:Finance; 0511:Economic theory; Bitcoin; Economic theory; Economics; Finance; Microstructure theory; Renminbi; RMB exchange rate", ris-m1 = "13886384", } @Article{Xu:2019:DBB, author = "Xiwei Xu and Qinghua Lu and Yue Liu and Liming Zhu and Haonan Yao and Athanasios V. Vasilakos", title = "Designing blockchain-based applications: a case study for imported product traceability", journal = j-FUT-GEN-COMP-SYS, volume = "92", number = "??", pages = "399--406", month = mar, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2018.10.010", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Feb 5 08:15:51 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X18314298", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Xu:2019:ESC, author = "Xiaolin Xu and Fahim Rahman and Bicky Shakya and Apostol Vassilev and Domenic Forte and Mark Tehranipoor", title = "Electronics Supply Chain Integrity Enabled by Blockchain", journal = j-TODAES, volume = "24", number = "3", pages = "31:1--31:25", month = jun, year = "2019", CODEN = "ATASFO", DOI = "https://doi.org/10.1145/3315571", ISSN = "1084-4309 (print), 1557-7309 (electronic)", ISSN-L = "1084-4309", bibdate = "Thu Jan 30 09:00:30 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/todaes.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3315571", abstract = "Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives, as well as in critical infrastructures such as power grids, satellite communications, and public transportation. In the past few decades, the security of \ldots{}", acknowledgement = ack-nhfb, articleno = "31", fjournal = "ACM Transactions on Design Automation of Electronic Systems", journal-URL = "https://dl.acm.org/loi/todaes", } @Article{Xu:2019:MBD, author = "Chenhan Xu and Kun Wang and Peng Li and Song Guo and Jiangtao Luo and Baoliu Ye and Minyi Guo", title = "Making Big Data Open in Edges: A Resource-Efficient Blockchain-Based Approach", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "30", number = "4", pages = "870--882", month = apr, year = "2019", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2018.2871449", ISSN = "1045-9219 (print), 1558-2183 (electronic)ITDSEO", ISSN-L = "1045-9219", bibdate = "Fri Mar 15 09:32:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", URL = "https://ieeexplore.ieee.org/document/8469010/", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "http://www.computer.org/portal/web/csdl/transactions/tpds", } @Article{Yang:2019:BBL, author = "Mengmeng Yang and Tianqing Zhu and Kaitai Liang and Wanlei Zhou and Robert H. Deng", title = "A blockchain-based location privacy-preserving crowdsensing system", journal = j-FUT-GEN-COMP-SYS, volume = "94", number = "??", pages = "408--418", month = may, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Oct 14 16:09:56 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18320909", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Yu:2019:CAF, author = "Xingjie Yu and Michael Shiwen Thang and Yingjiu Li and Robert Huijie Deng", title = "Collusion attacks and fair time-locked deposits for fast-payment transactions in {Bitcoin}", journal = j-J-COMP-SECUR, volume = "27", number = "3", pages = "375--403", month = "????", year = "2019", CODEN = "JCSIET", DOI = "https://doi.org/10.3233/JCS-191274", ISSN = "0926-227X (print), 1875-8924 (electronic)", ISSN-L = "0926-227X", bibdate = "Mon Sep 23 05:47:22 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib", acknowledgement = ack-nhfb, journal-URL = "http://content.iospress.com/journals/journal-of-computer-security", } @Article{Yu:2019:RYR, author = "J. Yu and D. Kozhaya and J. Decouchant and P. Esteves-Verissimo", title = "{RepuCoin}: Your Reputation Is Your Power", journal = j-IEEE-TRANS-COMPUT, volume = "68", number = "8", pages = "1225--1237", month = aug, year = "2019", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.2019.2900648", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Thu Jul 11 09:46:20 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", keywords = "Bitcoin; Blockchain; consensus; cryptocurrency; fault tolerance; Fault tolerance; Fault tolerant systems; Peer-to-peer computing; Protocols; Throughput", } @Article{Yue:2019:BIV, author = "Xuanwu Yue and Xinhuan Shu and Xinyu Zhu and Xinnan Du and Zheqing Yu and Dimitrios Papadopoulos and Siyuan Liu", title = "{BitExTract}: Interactive Visualization for Extracting {Bitcoin} Exchange Intelligence", journal = j-IEEE-TRANS-VIS-COMPUT-GRAPH, volume = "25", number = "1", pages = "162--171", month = jan, year = "2019", CODEN = "ITVGEA", DOI = "https://doi.org/10.1109/TVCG.2018.2864814", ISSN = "1077-2626 (print), 1941-0506 (electronic), 2160-9306", ISSN-L = "1077-2626", bibdate = "Wed Jan 2 16:40:19 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransviscomputgraph.bib", URL = "https://www.computer.org/csdl/trans/tg/2019/01/08440044-abs.html", acknowledgement = ack-nhfb, journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945", } @Article{Zaghloul:2019:BBS, author = "Ehab Zaghloul and Tongtong Li and Matt W. Mutka and Jian Ren", title = "Bitcoin and Blockchain: Security and Privacy", journal = "CoRR", volume = "abs/1904.11435", number = "??", pages = "??--??", month = "????", year = "2019", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://arxiv.org/abs/1904.11435; https://dblp.org/db/journals/corr/corr1904.html#abs-1904-11435", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-1904-11435", dblp-mdate = "2022-06-23", } @MastersThesis{Zamir:2019:ABN, author = "Linir Zamir", title = "Application of Blockchain Network for the Use of Information Sharing", type = "{M.S.}", school = "Florida Atlantic University", address = "Boca Raton, FL, USA", pages = "65", year = "2019", ISBN = "1-68793-236-0", ISBN-13 = "978-1-68793-236-5", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2305945825", abstract = "The Blockchain concept was originally developed to provide security in the Bitcoin cryptocurrency network, where trust is achieved through the provision of an agreed-upon and immutable record of transactions between parties. The use of a Blockchain as a secure, publicly distributed ledger is applicable to fields beyond finance, and is an emerging area of research across many other fields in the industry.", acknowledgement = ack-nhfb, advisor = "Feng-Hao Liu", keywords = "0984:Computer science; Blockchain; Computer science; Information Sharin", ris-m1 = "22617599", } @Article{Zhang:2019:DSS, author = "Shijie Zhang and Jong-Hyouk Lee", title = "Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network", journal = "IEEE Trans. Ind. Informatics", volume = "15", number = "10", pages = "5715--5722", month = "????", year = "2019", CODEN = "????", DOI = "https://doi.org/10.1109/TII.2019.2921566", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/tii/tii15.html#ZhangL19", acknowledgement = ack-nhfb, dblp-key = "journals/tii/ZhangL19", dblp-mdate = "2020-05-21", } @Article{Zhang:2019:ELG, author = "Lingyue Zhang and Huilin Li and Yannan Li and Yong Yu and Man Ho Au and Baocang Wang", title = "An efficient linkable group signature for payer tracing in anonymous cryptocurrencies", journal = j-FUT-GEN-COMP-SYS, volume = "101", number = "??", pages = "29--38", month = dec, year = "2019", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.05.081", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:02 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19303115", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @MastersThesis{Zhang:2019:SBA, author = "Yuxi Zhang", title = "Scaling Blockchain Applications with {Pub\slash Sub}", type = "{M.A.S.}", school = "University of Toronto", address = "Toronto, ON, Canada", pages = "85", year = "2019", ISBN = "1-392-01457-3", ISBN-13 = "978-1-392-01457-8", bibdate = "Fri Nov 29 08:59:46 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.proquest.com/pqdtglobal/docview/2202997651", abstract = "The world of distributed ledger technology(DLT) has been getting significant attention. Many new applications want to utilize the trustless model and the high consistency guarantees this technology grants. This thesis aims to identify the needs of various business use cases and explores how DLT technology can be adapted to suit these applications. We recognize existing initiatives to adopt certain DLTs with some applications, however, there still exists gaps between these initiatives and production grade solutions. We provide a list of applications that can utilize the features of DLT technology and propose an encompassing structure to facilitate the needs of these applications. Specically, we focus on a DLT-based publish and subscribe system for a subset of the interested applications. We provide the design and rationale behind the technology selection and analyze the relationship between DLT technology and Pub/Sub.", acknowledgement = ack-nhfb, advisor = "Hans-Arno Jacobsen", keywords = "0464:Computer Engineering; Applied sciences; Blockchain; Computer Engineering; Pub/sub", ris-m1 = "13427691", } @Article{Zhang:2019:SPB, author = "Rui Zhang and Rui Xue and Ling Liu", title = "Security and Privacy on Blockchain", journal = j-COMP-SURV, volume = "52", number = "3", pages = "51:1--51:??", month = jul, year = "2019", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3316481", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sat Aug 31 09:04:37 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3316481", abstract = "Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for cryptography and cybersecurity, with use cases ranging from globally deployed cryptocurrency systems like Bitcoin, to smart contracts, smart grids over the Internet of Things, and so forth. Although blockchain has received growing interests in both academia and industry in the recent years, the security and privacy of blockchains continue to be at the center of the debate when deploying blockchain in different applications. This article presents a comprehensive overview of the security and privacy of blockchain. To facilitate the discussion, we first introduce the notion of blockchains and its utility in the context of Bitcoin-like online transactions. Then, we describe the basic security properties that are supported as the essential requirements and building blocks for Bitcoin-like cryptocurrency systems, followed by presenting the additional security and privacy properties that are desired in many blockchain applications. Finally, we review the security and privacy techniques for achieving these security properties in blockchain-based systems, including representative consensus algorithms, hash chained storage, mixing protocols, anonymous signatures, non-interactive zero-knowledge proof, and so forth. We conjecture that this survey can help readers to gain an in-depth understanding of the security and privacy of blockchain with respect to concept, attributes, techniques, and systems.", acknowledgement = ack-nhfb, articleno = "51", fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @Article{Zhang:2019:ZCS, author = "Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang Liu and Dawu Gu", title = "{Z-Channel}: Scalable and efficient scheme in {Zerocash}", journal = j-COMPUT-SECUR, volume = "86", number = "??", pages = "112--131", month = sep, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:02 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313737", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Zhao:2019:BBP, author = "Yanqi Zhao and Yiming Liu and Aikui Tian and Yong Yu and Xiaojiang Du", title = "Blockchain based privacy-preserving software updates with proof-of-delivery for {Internet of Things}", journal = j-J-PAR-DIST-COMP, volume = "132", number = "??", pages = "141--149", month = oct, year = "2019", CODEN = "JPDCER", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Fri Sep 13 10:25:20 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S074373151930098X", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Zhong:2019:SLS, author = "Lin Zhong and Qianhong Wu and Jan Xie and Zhenyu Guan and Bo Qin", title = "A secure large-scale instant payment system based on blockchain", journal = j-COMPUT-SECUR, volume = "84", number = "??", pages = "349--364", month = jul, year = "2019", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:47:00 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S016740481831407X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "https://www.sciencedirect.com/science/journal/01674048", } @Article{Zhong:2019:SVL, author = "Lin Zhong and Qianhong Wu and Jan Xie and Jin Li and Bo Qin", title = "A secure versatile light payment system based on blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "93", number = "??", pages = "327--337", month = apr, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Feb 5 08:15:52 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X18302656", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zhu:2019:CTB, author = "Liehuang Zhu and Yulu Wu and Keke Gai and Kim-Kwang Raymond Choo", title = "Controllable and trustworthy blockchain-based cloud data management", journal = j-FUT-GEN-COMP-SYS, volume = "91", number = "??", pages = "527--535", month = feb, year = "2019", CODEN = "FGSEVI", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Feb 5 08:15:51 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167739X18311993", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ahmed:2020:BCI, author = "M. Ahmed and A. K. Pathan", title = "Blockchain: Can It Be Trusted?", journal = j-COMPUTER, volume = "53", number = "4", pages = "31--35", year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Apr 16 06:11:05 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Alcaraz:2020:BAA, author = "Cristina Alcaraz and Juan E. Rubio and Javier Lopez", title = "Blockchain-assisted access for federated Smart Grid domains: Coupling and features", journal = j-J-PAR-DIST-COMP, volume = "144", number = "??", pages = "124--135", month = oct, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.012", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520302914", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Ali:2020:CBE, author = "F. S. Ali and M. Aloqaily and O. Alfandi and O. Ozkasap", title = "Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading", journal = j-COMPUTER, volume = "53", number = "9", pages = "56--65", year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Sep 10 08:39:27 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{AlJawaheri:2020:DTH, author = "Husam {Al Jawaheri} and Mashael {Al Sabah} and Yazan Boshmaf and Aiman Erbad", title = "Deanonymizing {Tor} hidden service users through {Bitcoin} transactions analysis", journal = j-COMPUT-SECUR, volume = "89", number = "??", pages = "Article 101684", month = feb, year = "2020", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Mar 14 18:49:57 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404818309908", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Almasoud:2020:SCB, author = "Ahmed S. Almasoud and Farookh Khadeer Hussain and Omar K. Hussain", title = "Smart contracts for blockchain-based reputation systems: a systematic literature review", journal = j-J-NETW-COMPUT-APPL, volume = "170", number = "??", pages = "??--??", day = "15", month = nov, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102814", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:39 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S108480452030285X", acknowledgement = ack-nhfb, articleno = "102814", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{AlSuwaidan:2020:VAH, author = "Lulwah AlSuwaidan and Nuha Almegren", title = "Validating the Adoption of Heterogeneous {Internet of Things} with Blockchain", journal = j-FUTURE-INTERNET, volume = "12", number = "6", pages = "107", day = "21", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12060107", ISSN = "1999-5903", bibdate = "Tue Jun 30 14:45:27 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/6/107", abstract = "Emerging technologies such as Internet of Things (IoT) and blockchain have affected the digital transformation. Blockchain, on the one hand, was initially developed for the purpose of financial trading due to its robustness especially for fault tolerance and cryptographic security in addition to its decentralized architecture. IoT, on the other hand, is an open interconnected network of smart devices able to communicate simultaneously. This arises a challenge in privacy and security, specifically for the data being exchanged. To overcome this, studies have focused on the blockchain to resolve the security and privacy issues of IoT. Indeed, limited studies have proposed to assess blockchain's viability for IoT and the associated challenges. In this paper, a conceptual model has proposed to identify the crucial factors affecting the adoption of blockchain in IoT. The model consists of four dimensions of factors that we assume will affect the adoption of the two technologies. The dimensions are: attitude-related factors, social influence related factors, data-related factors, and security-related factors. This model is validated through a survey that was distributed between professionals in blockchain and IoT. The findings show a significant impact of data-related factors on the adoption of blockchain in IoT and the intention to use them. The model can play an important role in the development of strategies, standards, and performance assessment.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Network Economics and Utility Maximization.", } @Article{Alzahrani:2020:NPA, author = "Naif Alzahrani and Nirupama Bulusu", title = "A new product anti-counterfeiting blockchain using a truly decentralized dynamic consensus protocol", journal = j-CCPE, volume = "32", number = "12", pages = "e5232:1--e5232:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5232", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "05 March 2019", } @Article{Anonymous:2020:DS, author = "Anonymous", title = "Demystifying {Stablecoins}", journal = j-QUEUE, volume = "18", number = "1", pages = "??--??", month = jan, year = "2020", CODEN = "AQCUAE", DOI = "https://doi.org/10.1145/3387945.3388781", ISSN = "1542-7730 (print), 1542-7749 (electronic)", ISSN-L = "1542-7730", bibdate = "Tue Mar 17 07:51:39 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/queue.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3387945.3388781", abstract = "Cryptography meets monetary policy.", acknowledgement = ack-nhfb, fjournal = "ACM Queue: Tomorrow's Computing Today", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J882", } @Article{Anser:2020:SMU, author = "Muhammad Khalid Anser and Ghulam Hussain Khan Zaigham and Muhammad Imran Rasheed and Abdul Hameed Pitafi and Jawad Iqbal and Adeel Luqman", title = "Social media usage and individuals' intentions toward adopting Bitcoin: The role of the theory of planned behavior and perceived risk", journal = "Int. J. Commun. Syst.", volume = "33", number = "17", pages = "??--??", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1002/dac.4590", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijcomsys/ijcomsys33.html#AnserZRPIL20", acknowledgement = ack-nhfb, dblp-key = "journals/ijcomsys/AnserZRPIL20", dblp-mdate = "2022-04-09", } @Article{Ante:2020:PNS, author = "Lennart Ante", title = "A place next to {Satoshi}: foundations of blockchain and cryptocurrency research in business and economics", journal = j-SCIENTOMETRICS, volume = "124", number = "2", pages = "1305--1333", month = aug, year = "2020", CODEN = "SCNTDX", DOI = "https://doi.org/10.1007/s11192-020-03492-8", ISSN = "0138-9130 (print), 1588-2861 (electronic)", ISSN-L = "0138-9130", bibdate = "Fri Jul 10 10:28:58 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/scientometrics2020.bib", URL = "http://link.springer.com/article/10.1007/s11192-020-03492-8; http://link.springer.com/content/pdf/10.1007/s11192-020-03492-8.pdf", acknowledgement = ack-nhfb, fjournal = "Scientometrics", journal-URL = "http://link.springer.com/journal/11192", } @Article{Asaf:2020:BTN, author = "Khizra Asaf and Rana Asif Rehman and Byung-Seo Kim", title = "Blockchain technology in {Named Data Networks}: a detailed survey", journal = j-J-NETW-COMPUT-APPL, volume = "171", number = "??", pages = "??--??", day = "1", month = dec, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102840", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:39 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303088", acknowledgement = ack-nhfb, articleno = "102840", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Au:2020:SIC, author = "Man Ho Au and Jinguang Han and Qianhong Wu and Colin Boyd", title = "Special Issue on Cryptographic Currency and Blockchain Technology", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "758--759", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.06.001", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19314840", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bai:2020:QEP, author = "Shuangjie Bai and Geng Yang and Chunming Rong and Guoxiu Liu and Hua Dai", title = "{QHSE}: an efficient privacy-preserving scheme for blockchain-based transactions", journal = j-FUT-GEN-COMP-SYS, volume = "112", number = "??", pages = "930--944", month = nov, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.06.025", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19334508", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bala:2020:EBP, author = "R. Bala and R. Manoharan", title = "Enhanced Bitcoin Protocol with Effective Block Creation and Verification by Trusted Miners", journal = "EAI Endorsed Trans. Scalable Inf. Syst.", volume = "7", number = "27", pages = "e8", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.4108/eai.13-7-2018.163836", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/sis/sis7.html#BalaM20", acknowledgement = ack-nhfb, dblp-key = "journals/sis/BalaM20", dblp-mdate = "2022-10-02", } @Article{Bao:2020:LSP, author = "Zijian Bao and Wenbo Shi and Saru Kumari and Zhi-yin Kong and Chien-Ming Chen", title = "{Lockmix}: a secure and privacy-preserving mix service for {Bitcoin} anonymity", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "311--321", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-019-00459-6", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-019-00459-6", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Barman:2020:BVS, author = "Nabajeet Barman and Deepak {G C} and Maria G. Martini", title = "Blockchain for Video Streaming: Opportunities, Challenges, and Open Issues", journal = j-COMPUTER, volume = "53", number = "7", pages = "45--56", month = jul, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.2989051", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jul 16 15:14:43 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Bartoletti:2020:CSB, author = "Massimo Bartoletti and Stefano Lande and Roberto Zunino", title = "Computationally sound Bitcoin tokens", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2010.01347; https://dblp.org/db/journals/corr/corr2010.html#abs-2010-01347", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2010-01347", dblp-mdate = "2020-10-12", } @Article{Bartoletti:2020:DPS, author = "Massimo Bartoletti and Salvatore Carta and Tiziana Cimoli and Roberto Saia", title = "Dissecting {Ponzi} schemes on {Ethereum}: Identification, analysis, and impact", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "259--277", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.08.014", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18301407", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bartoletti:2020:VRB, author = "Massimo Bartoletti and Stefano Lande and Maurizio Murgia and Roberto Zunino", title = "Verification of recursive Bitcoin contracts", journal = "CoRR", volume = "abs/2011.14165", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2011.14165; https://dblp.org/db/journals/corr/corr2011.html#abs-2011-14165", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2011-14165", dblp-mdate = "2022-02-08", } @Article{Benil:2020:CBS, author = "T. Benil and J. Jasper", title = "Cloud based security on outsourcing using blockchain in E-health systems", journal = j-COMP-NET-AMSTERDAM, volume = "178", number = "??", pages = "Article 107344", day = "4", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2020.107344", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Sat Mar 27 13:48:23 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128619316986", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Benisi:2020:BBD, author = "Nazanin Zahed Benisi and Mehdi Aminian and Bahman Javadi", title = "Blockchain-based decentralized storage networks: a survey", journal = j-J-NETW-COMPUT-APPL, volume = "162", number = "??", pages = "??--??", day = "15", month = jul, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102656", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:36 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520301302", acknowledgement = ack-nhfb, articleno = "102656", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Bergman:2020:PBD, author = "Sara Bergman and Mikael Asplund and Simin Nadjm-Tehrani", title = "Permissioned blockchains and distributed databases: a performance study", journal = j-CCPE, volume = "32", number = "12", pages = "e5227:1--e5227:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5227", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "25 March 2019", } @Article{Bigini:2020:RBI, author = "Gioele Bigini", title = "A Review on Blockchain for the {Internet of Medical Things}: Definitions, Challenges, Applications, and Vision", journal = j-FUTURE-INTERNET, volume = "12", number = "12", pages = "208", day = "25", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12120208", ISSN = "1999-5903", bibdate = "Fri Jan 22 11:26:00 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/12/208", abstract = "Nowadays, there are a lot of new mobile devices that have the potential to assist healthcare professionals when working and help to increase the well-being of the people. These devices comprise the Internet of Medical Things, but it is generally difficult for healthcare institutions to meet compliance of their systems with new medical solutions efficiently. A technology that promises the sharing of data in a trust-less scenario is the Distributed Ledger Technology through its properties of decentralization, immutability, and transparency. The Blockchain and the Internet of Medical Things can be considered as at an early stage, and the implementations successfully applying the technology are not so many. Some aspects covered by these implementations are data sharing, interoperability of systems, security of devices, the opportunity of data monetization and data ownership that will be the focus of this review. This work aims at giving an overview of the current state-of-the-art of the Blockchain-based systems for the Internet of Medical Things, specifically addressing the challenges of reaching user-centricity for these combined systems, and thus highlighting the potential future directions to follow for full ownership of data by users.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue The Future Internet of Medical Things.", } @Article{Biswas:2020:BHC, author = "Sujit Biswas and Kashif Sharif and Fan Li and Saraju Mohanty", title = "Blockchain for E-Health-Care Systems: Easier Said Than Done", journal = j-COMPUTER, volume = "53", number = "7", pages = "57--67", month = jul, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.2989781", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jul 16 15:14:43 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Bohme:2020:RVD, author = "Rainer B{\"o}hme and Lisa Eckey and Tyler Moore and Neha Narula and Tim Ruffing and Aviv Zohar", title = "Responsible vulnerability disclosure in cryptocurrencies", journal = j-CACM, volume = "63", number = "10", pages = "62--71", month = sep, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3372115", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Sep 24 07:02:28 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3372115", abstract = "Software weaknesses in cryptocurrencies create unique challenges in responsible revelations.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Bonnah:2020:DDS, author = "Ernest Bonnah and Ju Shiguang", title = "{DecChain}: a decentralized security approach in Edge Computing based on Blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "113", number = "??", pages = "363--379", month = dec, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.07.009", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:09 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19323933", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bouachir:2020:BFC, author = "O. Bouachir and M. Aloqaily and L. Tseng and A. Boukerche", title = "Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry", journal = j-COMPUTER, volume = "53", number = "9", pages = "36--45", year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Sep 10 08:39:27 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Braeken:2020:BCS, author = "A. Braeken and M. Liyanage and S. S. Kanhere and S. Dixit", title = "Blockchain and Cyberphysical Systems", journal = j-COMPUTER, volume = "53", number = "9", pages = "31--35", year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Sep 10 08:39:27 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Brody:2020:TCI, author = "Dorje Brody and Lane Hughston and Bernhard Meister", title = "Theory of Cryptocurrency Interest Rates", journal = j-SIAM-J-FINANCIAL-MATH, volume = "11", number = "1", pages = "148--168", month = "????", year = "2020", CODEN = "SJFMBJ", DOI = "https://doi.org/10.1137/19M1263042", ISSN = "1945-497X", bibdate = "Thu May 28 10:38:11 MDT 2020", bibsource = "http://epubs.siam.org/sam-bin/dbq/toclist/SIFIN/11/1; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/siamjfinancialmath.bib", acknowledgement = ack-nhfb, fjournal = "SIAM Journal on Financial Mathematics", journal-URL = "http://epubs.siam.org/sifin", onlinedate = "January 2020", } @Article{Buchnik:2020:FHT, author = "Yehonatan Buchnik and Roy Friedman", title = "{FireLedger}: a high throughput blockchain consensus protocol", journal = j-PROC-VLDB-ENDOWMENT, volume = "13", number = "9", pages = "1525--1539", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.14778/3397230.3397246", ISSN = "2150-8097", bibdate = "Wed Jul 8 18:23:01 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/abs/10.14778/3397230.3397246", abstract = "Blockchains are distributed secure ledgers to which transactions are issued continuously and each block of transactions is tightly coupled to its predecessors. Permissioned blockchains place special emphasis on transactions throughput. In this paper we \ldots{}", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Butijn:2020:BSM, author = "Bert-Jan Butijn and Damian A. Tamburri and Willem-Jan van den Heuvel", title = "Blockchains: a Systematic Multivocal Literature Review", journal = j-COMP-SURV, volume = "53", number = "3", pages = "61:1--61:37", month = jul, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3369052", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Wed Jul 8 17:24:44 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3369052", abstract = "Blockchain technology has gained tremendous popularity both in practice and academia. The goal of this article is to develop a coherent overview of the state of the art in blockchain technology, using a systematic (i.e., protocol-based, replicable), multivocal (i.e., featuring both white and grey literature alike) literature review to (1) define blockchain technology, (2) elaborate on its architecture options and (3) tradeoffs, as well as to understand (4) the current applications and challenges, as evident from the state of the art. We derive a systematic definition of blockchain technology, based on a formal concept analysis. Further, we flesh out an overview of blockchain technology elaborated by means of Grounded-Theory.", acknowledgement = ack-nhfb, articleno = "61", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Cao:2020:BAA, author = "Sean Cao and Lin William Cong and Meng Han and Qixuan Hou and Baozhong Yang", title = "Blockchain Architecture for Auditing Automation and Trust Building in Public Markets", journal = j-COMPUTER, volume = "53", number = "7", pages = "20--28", month = jul, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.2989789", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jul 16 15:14:43 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Cao:2020:BBA, author = "Huikang Cao and Ruixuan Li and Wenlong Tian and Zhiyong Xu and Weijun Xiao", title = "Blockchain-based accountability for multi-party oblivious {RAM}", journal = j-J-PAR-DIST-COMP, volume = "137", number = "??", pages = "224--237", month = mar, year = "2020", CODEN = "JPDCER", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed Mar 18 09:26:11 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731519303387", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Carver:2020:BSC, author = "Jeffrey C. Carver and Miroslaw Staron", title = "Blockchain and Smart Contract Engineering", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "94--96", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.2999995", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Catalini:2020:SSE, author = "Christian Catalini and Joshua S. Gans", title = "Some simple economics of the blockchain", journal = j-CACM, volume = "63", number = "7", pages = "80--90", month = jul, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3359552", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jun 22 06:05:31 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3359552", abstract = "Blockchain technology can shape innovation and competition in digital platforms, but under what conditions?", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Chen:2020:BIT, author = "Fei Chen and Zhe Xiao and Laizhong Cui and Qiuzhen Lin and Jianqiang Li and Shui Yu", title = "Blockchain for {Internet of Things} applications: a review and open issues", journal = j-J-NETW-COMPUT-APPL, volume = "172", number = "??", pages = "??--??", day = "15", month = dec, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102839", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303076", acknowledgement = ack-nhfb, articleno = "102839", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Chen:2020:BPP, author = "Zheshi Chen and Chunhong Li and Wenjun Sun", title = "Bitcoin price prediction using machine learning: an approach to sample dimension engineering", journal = j-J-COMPUT-APPL-MATH, volume = "365", number = "??", pages = "Article 112395", month = feb, year = "2020", CODEN = "JCAMDI", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Fri Sep 13 09:36:33 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2020.bib", URL = "https://www.sciencedirect.com/science/article/pii/S037704271930398X", acknowledgement = ack-nhfb, fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Chen:2020:MLP, author = "Huan Chen and Yijie Wang", title = "{MiniChain}: a lightweight protocol to combat the {UTXO} growth in public blockchain", journal = j-J-PAR-DIST-COMP, volume = "143", number = "??", pages = "67--76", month = sep, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.001", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520302732", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Chen:2020:SES, author = "Huashan Chen and Marcus Pendleton and Laurent Njilla and Shouhuai Xu", title = "A Survey on {Ethereum} Systems Security: Vulnerabilities, Attacks, and Defenses", journal = j-COMP-SURV, volume = "53", number = "3", pages = "67:1--67:43", month = jul, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3391195", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Wed Jul 8 17:24:44 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3391195", abstract = "Blockchain technology is believed by many to be a game changer in many application domains. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency, the second generation (i.e., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of computing Decentralized Applications (DApps) running on top of blockchains. The rich applications and semantics of DApps inevitably introduce many security vulnerabilities, which have no counterparts in pure cryptocurrency systems like Bitcoin. Since Ethereum is a new, yet complex, system, it is imperative to have a systematic and comprehensive understanding on its security from a holistic perspective, which was previously unavailable in the literature. To the best of our knowledge, the present survey, which can also be used as a tutorial, fills this void. We systematize three aspects of Ethereum systems security: vulnerabilities, attacks, and defenses. We draw insights into vulnerability root causes, attack consequences, and defense capabilities, which shed light on future research directions.", acknowledgement = ack-nhfb, articleno = "67", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Chen:2020:UEG, author = "Ting Chen and Zihao Li and Yuxiao Zhu and Jiachi Chen and Xiapu Luo and John Chi-Shing Lui and Xiaodong Lin and Xiaosong Zhang", title = "Understanding {Ethereum} via Graph Analysis", journal = j-TOIT, volume = "20", number = "2", pages = "18:1--18:32", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3381036", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed May 27 07:53:04 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3381036", abstract = "Ethereum, a blockchain, supports its own cryptocurrency named Ether and smart contracts. Although more than 8M smart contracts have been deployed on Ethereum, little is known about the characteristics of its users, smart contracts, and the relationships \ldots{}", acknowledgement = ack-nhfb, articleno = "18", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Chi:2020:SED, author = "Jiancheng Chi and Yu Li and Jing Huang and Jing Liu and Yingwei Jin and Chen Chen and Tie Qiu", title = "A secure and efficient data sharing scheme based on blockchain in industrial {Internet of Things}", journal = j-J-NETW-COMPUT-APPL, volume = "167", number = "??", pages = "??--??", day = "1", month = oct, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102710", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:38 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520301843", acknowledgement = ack-nhfb, articleno = "102710", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Clark:2020:DS, author = "Jeremy Clark and Didem Demirag and Seyedehmahsa Moosavi", title = "Demystifying {Stablecoins}", journal = j-CACM, volume = "63", number = "7", pages = "40--46", month = jul, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3386275", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jun 22 06:05:31 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3386275", abstract = "Cryptography meets monetary policy.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Clavin:2020:BGU, author = "James Clavin and Sisi Duan and Haibin Zhang and Vandana P. Janeja and Karuna P. Joshi and Yelena Yesha and Lucy C. Erickson and Justin D. Li", title = "Blockchains for Government: Use Cases and Challenges", journal = j-DGOV, volume = "1", number = "3", pages = "22:1--22:21", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3427097", ISSN = "2691-199X (print), 2639-0175 (electronic)", ISSN-L = "2639-0175", bibdate = "Tue Mar 30 16:40:12 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/dgov.bib", URL = "https://dl.acm.org/doi/10.1145/3427097", abstract = "Blockchain is the technology used by developers of cryptocurrencies, like Bitcoin, to enable exchange of financial ``coins'' between participants in the absence of a trusted third party to ensure the transaction, such as is typically done by governments. \ldots{}", acknowledgement = ack-nhfb, articleno = "22", fjournal = "Digital Government: Research and Practice (DGOV)", journal-URL = "https://dl.acm.org/loi/dgov", } @Article{Coblenz:2020:CAT, author = "Michael Coblenz and Jonathan Aldrich and Brad A. Myers and Joshua Sunshine", title = "Can advanced type systems be usable? {An} empirical study of ownership, assets, and typestate in {Obsidian}", journal = j-PACMPL, volume = "4", number = "OOPSLA", pages = "132:1--132:28", month = nov, year = "2020", DOI = "https://doi.org/10.1145/3428200", bibdate = "Tue Mar 30 08:10:50 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", URL = "https://dl.acm.org/doi/10.1145/3428200", abstract = "Some blockchain programs (smart contracts) have included serious security vulnerabilities. Obsidian is a new typestate-oriented programming language that uses a strong type system to rule out some of these vulnerabilities. Although Obsidian was designed to promote usability to make it as easy as possible to write programs, strong type systems can cause a language to be difficult to use. In particular, ownership, typestate, and assets, which Obsidian uses to provide safety guarantees, have not seen broad adoption together in popular languages and result in significant usability challenges. We performed an empirical study with 20 participants comparing Obsidian to Solidity, which is the language most commonly used for writing smart contracts today. We observed that Obsidian participants were able to successfully complete more of the programming tasks than the Solidity participants. We also found that the Solidity participants commonly inserted asset-related bugs, which Obsidian detects at compile time.", acknowledgement = ack-nhfb, articleno = "132", fjournal = "Proceedings of the ACM on Programming Languages", journal-URL = "https://pacmpl.acm.org/", } @Article{Coblenz:2020:OTA, author = "Michael Coblenz and Reed Oei and Tyler Etzel and Paulette Koronkevich and Miles Baker and Yannick Bloem and Brad A. Myers and Joshua Sunshine and Jonathan Aldrich", title = "{Obsidian}: Typestate and Assets for Safer Blockchain Programming", journal = j-TOPLAS, volume = "42", number = "3", pages = "14:1--14:82", month = dec, year = "2020", CODEN = "ATPSDT", DOI = "https://doi.org/10.1145/3417516", ISSN = "0164-0925 (print), 1558-4593 (electronic)", ISSN-L = "0164-0925", bibdate = "Fri Feb 5 10:23:03 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toplas.bib", URL = "https://dl.acm.org/doi/10.1145/3417516", abstract = "Blockchain platforms are coming into use for processing critical transactions among participants who have not established mutual trust. Many blockchains are programmable, supporting smart contracts, which maintain persistent state and support transactions that transform the state. Unfortunately, bugs in many smart contracts have been exploited by hackers. Obsidian is a novel programming language with a type system that enables static detection of bugs that are common in smart contracts today. Obsidian is based on a core calculus, Silica, for which we proved type soundness. Obsidian uses typestate to detect improper state manipulation and uses linear types to detect abuse of assets. We integrated a permissions system that encodes a notion of ownership to allow for safe, flexible aliasing. We describe two case studies that evaluate Obsidian's applicability to the domains of parametric insurance and supply chain management, finding that Obsidian's type system facilitates reasoning about high-level states and ownership of resources. We compared our Obsidian implementation to a Solidity implementation, observing that the Solidity implementation requires much boilerplate checking and tracking of state, whereas Obsidian does this work statically.", acknowledgement = ack-nhfb, articleno = "14", fjournal = "ACM Transactions on Programming Languages and Systems", journal-URL = "https://dl.acm.org/loi/toplas", } @Article{Coelho:2020:CPI, author = "Igor M. Coelho and Vitor N. Coelho and Rodolfo P. Araujo and Wang Yong Qiang and Brett D. Rhodes", title = "Challenges of {PBFT}-Inspired Consensus for Blockchain and Enhancements over Neo {dBFT}", journal = j-FUTURE-INTERNET, volume = "12", number = "8", pages = "129", day = "30", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12080129", ISSN = "1999-5903", bibdate = "Fri Aug 28 12:33:08 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/8/129", abstract = "Consensus mechanisms are a core feature for handling negotiation and agreements. Blockchain technology has seen the introduction of different sorts of consensus mechanism, ranging from tasks of heavy computation to the subtle mathematical proofs of Byzantine agreements. This paper presents the pioneer Delegated Byzantine Fault Tolerance (dBFT) protocol of Neo Blockchain, which was inspired by the Practical Byzantine Fault Tolerance (PBFT). Besides introducing its history, this study describes proofs and didactic examples, as well as novel design and extensions for Neo dBFT with multiple block proposals. Finally, we discuss challenges when dealing with strong Byzantine adversaries, and propose solutions inspired on PBFT for current weak-synchrony problems and increasing system robustness against attacks. Key Contribution: Presents an overview of the history of PBFT-inspired consensus for blockchain, highlighting its current importance on the literature, challenges and assumptions. Contributes to the field of Distributed Consensus, proposing novel extensions for the Neo dBFT (dBFT 2.0+, dBFT 3.0 and dBFT 3.0+), with new insights on innovative consensus mechanisms.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Special Issue on Cyber Physical Systems: Prospects, Challenges, and Role in Software Defined Networking and Blockchain.", } @Article{Coelho:2020:MMB, author = "Vitor Naz{\'a}rio Coelho", title = "A {MILP} Model for a {Byzantine} Fault Tolerant Blockchain Consensus", journal = j-FUTURE-INTERNET, volume = "12", number = "11", pages = "185", day = "29", month = oct, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12110185", ISSN = "1999-5903", bibdate = "Fri Jan 22 11:25:59 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/11/185", abstract = "Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios where a linear programming model can be devised. This paper explores its use to model very strong Byzantine adversaries, in the context of distributed consensus systems. In particular, we apply the proposed technique to find challenging adversarial conditions on a state-of-the-art blockchain consensus: the Neo dBFT. Neo Blockchain has been using the dBFT algorithm since its foundation, but, due to the complexity of the algorithm, it is challenging to devise definitive algebraic proofs that guarantee safety/liveness of the system (and adjust for every change proposed by the community). Core developers have to manually devise and explore possible adversarial attacks scenarios as an exhaustive task. The proposed multi-objective model is intended to assist the search of possible faulty scenario, which includes three objective functions that can be combined as a maximization problem for testing one-block finality or a minimization problem for ensuring liveness. Automated graphics help developers to visually observe attack conditions and to quickly find a solution. This paper proposes an exact adversarial model that explores current limits for practical blockchain consensus applications such as dBFT, with ideas that can also be extended to other decentralized ledger technologies.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Special Issue on Cyber Physical Systems: Prospects, Challenges, and Role in Software Defined Networking and Blockchain.", } @Article{Cohen:2020:FBT, author = "Gil Cohen", title = "Forecasting Bitcoin Trends Using Algorithmic Learning Systems", journal = j-ENTROPY, volume = "22", number = "8", pages = "838", month = "????", year = "2020", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e22080838", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy22.html#Cohen20; https://www.wikidata.org/entity/Q104107938", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/Cohen20", dblp-mdate = "2020-12-25", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Colomo-Palacios:2020:CRB, author = "Ricardo Colomo-Palacios and Mary S{\'a}nchez-Gord{\'o}n and Daniel Arias-Aranda", title = "A critical review on blockchain assessment initiatives: a technology evolution viewpoint", journal = j-J-SOFTW-EVOL-PROC, volume = "32", number = "11", pages = "e2272:1--e2272:??", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1002/smr.2272", ISSN = "2047-7473 (print), 2047-7481 (electronic)", ISSN-L = "2047-7473", bibdate = "Mon May 17 08:20:31 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsoftwevolproc.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Journal of Software: Evolution and Process", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2047-7481", onlinedate = "30 May 2020", } @Article{DeAguiar:2020:SBB, author = "Erikson J{\'u}lio {De Aguiar} and Bruno S. Fai{\c{c}}al and Bhaskar Krishnamachari and J{\'o} Ueyama", title = "A Survey of Blockchain-Based Strategies for Healthcare", journal = j-COMP-SURV, volume = "53", number = "2", pages = "27:1--27:27", month = jul, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3376915", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Wed Jul 8 17:24:43 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3376915", abstract = "Blockchain technology has been gaining visibility owing to its ability to enhance the security, reliability, and robustness of distributed systems. Several areas have benefited from research based on this technology, such as finance, remote sensing, data analysis, and healthcare. Data immutability, privacy, transparency, decentralization, and distributed ledgers are the main features that make blockchain an attractive technology. However, healthcare records that contain confidential patient data make this system very complicated because there is a risk of a privacy breach. This study aims to address research into the applications of the blockchain healthcare area. It sets out by discussing the management of medical information, as well as the sharing of medical records, image sharing, and log management. We also discuss papers that intersect with other areas, such as the Internet of Things, the management of information, tracking of drugs along their supply chain, and aspects of security and privacy. As we are aware that there are other surveys of blockchain in healthcare, we analyze and compare both the positive and negative aspects of their papers. Finally, we seek to examine the concepts of blockchain in the medical area, by assessing their benefits and drawbacks and thus giving guidance to other researchers in the area. Additionally, we summarize the methods used in healthcare per application area and show their pros and cons.", acknowledgement = ack-nhfb, articleno = "27", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Delgado-Mohatar:2020:BBS, author = "Oscar Delgado-Mohatar and Jos{\'e} Mar{\'\i}a Sierra-C{\'a}mara and Eloy Anguiano", title = "Blockchain-based semi-autonomous ransomware", journal = j-FUT-GEN-COMP-SYS, volume = "112", number = "??", pages = "589--603", month = nov, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.02.037", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19317406", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Delgado-Segura:2020:FPD, author = "Sergi Delgado-Segura and Cristina P{\'e}rez-Sol{\`a} and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\'\i}", title = "A fair protocol for data trading based on {Bitcoin} transactions", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "832--840", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.021", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318344", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Demir:2020:ETG, author = "M. Demir and O. Turetken and A. Mashatan", title = "An Enterprise Transformation Guide for the Inevitable Blockchain Disruption", journal = j-COMPUTER, volume = "53", number = "6", pages = "34--43", month = jun, year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Jun 17 11:55:02 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{deOliveira:2020:BRB, author = "Marcela T. de Oliveira and L{\'u}cio H. A. Reis and Dianne S. V. Medeiros and Ricardo C. Carrano and S{\'{\i}}lvia D. Olabarriaga and Diogo M. F. Mattos", title = "Blockchain reputation-based consensus: a scalable and resilient mechanism for distributed mistrusting applications", journal = j-COMP-NET-AMSTERDAM, volume = "179", number = "??", pages = "Article 107367", day = "9", month = oct, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2020.107367", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Sat Mar 27 13:48:24 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128620300360", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Dey:2020:RLB, author = "Asim K. Dey and Cuneyt G. Akcora and Yulia R. Gel and Murat Kantarcioglu", title = "On the role of local blockchain network features in cryptocurrency price formation", journal = j-CAN-J-STAT, volume = "48", number = "3", pages = "561--581", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1002/cjs.11547", ISSN = "0319-5724 (print), 1708-945X (electronic)", ISSN-L = "0319-5724", bibdate = "Wed Mar 31 14:51:47 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/canjstat.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", acknowledgement = ack-nhfb, ajournal = "Can. J. Stat.", fjournal = "The Canadian Journal of Statistics = La revue canadienne de statistique", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1708-945X/", onlinedate = "18 March 2020", } @Article{DiFrancescoMaesa:2020:BAS, author = "Damiano {Di Francesco Maesa} and Paolo Mori", title = "{Blockchain 3.0} applications survey", journal = j-J-PAR-DIST-COMP, volume = "138", number = "??", pages = "99--114", month = apr, year = "2020", CODEN = "JPDCER", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed Mar 18 09:26:11 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731519308664", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Dimitriou:2020:ECF, author = "Tassos Dimitriou", title = "Efficient, Coercion-free and Universally Verifiable {Blockchain}-based Voting", journal = j-COMP-NET-AMSTERDAM, volume = "174", number = "??", pages = "Article 107234", day = "19", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2020.107234", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Fri Aug 14 10:03:48 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128619317414", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Duong:2020:FAB, author = "Le Vu Trung Duong and Nguyen Thi Thanh Thuy and Lam Duc Khai", title = "A fast approach for bitcoin blockchain cryptocurrency mining system", journal = "Integr.", volume = "74", number = "??", pages = "107--114", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.vlsi.2020.05.003", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/integration/integration74.html#DuongTK20", acknowledgement = ack-nhfb, dblp-key = "journals/integration/DuongTK20", dblp-mdate = "2022-10-02", } @Article{Durand:2020:DLI, author = "Arnaud Durand and Pascal Gremaud and Jacques Pasquier", title = "Decentralized {LPWAN} infrastructure using blockchain and digital signatures", journal = j-CCPE, volume = "32", number = "12", pages = "e5352:1--e5352:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5352", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "24 May 2019", } @Article{Ebert:2020:BTP, author = "C. Ebert and P. Louridas and T. M. Fern{\'a}ndez-Caram{\'e}s and P. Fraga-Lamas", title = "{Blockchain} Technologies in Practice", journal = j-IEEE-SOFTWARE, volume = "37", number = "4", pages = "17--25", month = jul # "\slash " # aug, year = "2020", CODEN = "IESOEG", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Wed Aug 12 15:32:32 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Eisele:2020:BTE, author = "S. Eisele and C. Barreto and A. Dubey and X. Koutsoukos and T. Eghtesad and A. Laszka and A. Mavridou", title = "Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches", journal = j-COMPUTER, volume = "53", number = "9", pages = "66--76", year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Sep 10 08:39:27 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Elagin:2020:BBT, author = "Vasiliy Elagin and Anastasia Spirkina and Andrei Levakov and Ilya Belozertsev", title = "Blockchain Behavioral Traffic Model as a Tool to Influence Service {IT} Security", journal = j-FUTURE-INTERNET, volume = "12", number = "4", pages = "68", day = "15", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12040068", ISSN = "1999-5903", bibdate = "Thu May 28 15:16:57 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/4/68", abstract = "The present article describes the behavioral model of blockchain services; their reliability is confirmed on the basis of experimental data. The authors identify the main technical characteristics and features associated with data transmission through the network. The authors determine the network scheme, working with blockchain transactions and the dependence of network characteristics on application parameters. They analyze the application of this model for the detection of the blockchain service and the possibility of the existing security mechanisms of this technology being evaded. Furthermore, the article offers recommendations for hiding the blockchain traffic profile to significantly complicate its identification in the data network.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Cyber Security of the Continuous Digital Environment: Challenges, Solutions and Future Directions.", } @Article{Erdin:2020:BPN, author = "Enes Erdin and Mumin Cebe and Kemal Akkaya and Senay Solak and Eyuphan Bulut and Selcuk Uluagac", title = "A {Bitcoin} payment network with reduced transaction fees and confirmation times", journal = j-COMP-NET-AMSTERDAM, volume = "172", number = "??", pages = "Article 107098", day = "8", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2020.107098", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Fri Aug 14 10:03:47 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128619308850", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Ezhilchelvan:2020:NBT, author = "Paul Ezhilchelvan and Amjad Aldweesh and Aad van Moorsel", title = "Non-blocking two-phase commit using blockchain", journal = j-CCPE, volume = "32", number = "12", pages = "e5276:1--e5276:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5276", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "01 April 2019", } @Article{Fan:2020:DDR, author = "Kuan Fan and Zijian Bao and Mingxi Liu and Athanasios V. Vasilakos and Wenbo Shi", title = "{Dredas}: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial {IoT}", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "665--674", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.10.014", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19315560", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Fan:2020:SHB, author = "Chun-I Fan and Yi-Fan Tseng and Hui-Po Su and Ruei-Hau Hsu and Hiroaki Kikuchi", title = "Secure hierarchical {Bitcoin} wallet scheme against privilege escalation attacks", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "245--255", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-019-00476-5", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-019-00476-5", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Feng:2020:TRH, author = "Jingyu Feng and Xinyu Zhao and Kexuan Chen and Feng Zhao and Guanghua Zhang", title = "Towards random-honest miners selection and multi-blocks creation: Proof-of-negotiation consensus mechanism in blockchain networks", journal = j-FUT-GEN-COMP-SYS, volume = "105", number = "??", pages = "248--258", month = apr, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.11.026", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:07 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19313044", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ferretti:2020:EBS, author = "Stefano Ferretti and Gabriele D'Angelo", title = "On the {Ethereum} blockchain structure: a complex networks theory perspective", journal = j-CCPE, volume = "32", number = "12", pages = "e5493:1--e5493:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5493", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "22 August 2019", } @Article{Ferretti:2020:FSI, author = "Stefano Ferretti and Gabriele D'Angelo", title = "Foreword to the special issue on cryptocurrencies and blockchains for distributed systems", journal = j-CCPE, volume = "32", number = "12", pages = "e5539:1--e5539:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5539", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "23 October 2019", } @Article{Fry:2020:QSB, author = "John Fry and Jean-Philippe Serbera", title = "Quantifying the sustainability of Bitcoin and Blockchain", journal = "J. Enterp. Inf. Manag.", volume = "33", number = "6", pages = "1379--1394", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1108/JEIM-06-2018-0134", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jeim/jeim33.html#FryS20", acknowledgement = ack-nhfb, dblp-key = "journals/jeim/FryS20", dblp-mdate = "2021-10-14", } @Article{Gao:2020:ABC, author = "Wenyou Gao and Chang Su", title = "Analysis on block chain financial transaction under artificial neural network of deep learning", journal = j-J-COMPUT-APPL-MATH, volume = "380", number = "??", pages = "Article 112991", day = "15", month = dec, year = "2020", CODEN = "JCAMDI", DOI = "https://doi.org/10.1016/j.cam.2020.112991", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Wed Jul 8 06:51:59 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S037704272030282X", acknowledgement = ack-nhfb, fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Gao:2020:AEF, author = "Wenyou Gao and Chang Su", title = "Analysis of earnings forecast of blockchain financial products based on particle swarm optimization", journal = j-J-COMPUT-APPL-MATH, volume = "372", number = "??", pages = "Article 112724", month = jul, year = "2020", CODEN = "JCAMDI", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Wed May 13 06:58:33 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0377042720300157", acknowledgement = ack-nhfb, fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Garrocho:2020:RTS, author = "C. T. B. Garrocho and M. C. Silva and C. M. S. Ferreira and C. F. M. d. C. Cavalcanti and R. A. {Rabelo Oliveira}", title = "Real-Time Systems Implications in the Blockchain-Based Vertical Integration of {Industry 4.0}", journal = j-COMPUTER, volume = "53", number = "9", pages = "46--55", year = "2020", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Sep 10 08:39:27 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Ge:2020:BBD, author = "Chunpeng Ge and Zhe Liu and Liming Fang", title = "A blockchain based decentralized data security mechanism for the {Internet of Things}", journal = j-J-PAR-DIST-COMP, volume = "141", number = "??", pages = "1--9", month = jul, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.03.005", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:01 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S074373151930810X", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Ghosh:2020:SCB, author = "Arunima Ghosh and Shashank Gupta and Amit Dua and Neeraj Kumar", title = "Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects", journal = j-J-NETW-COMPUT-APPL, volume = "163", number = "??", pages = "??--??", day = "1", month = aug, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102635", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:36 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520301090", acknowledgement = ack-nhfb, articleno = "102635", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Goldsmith:2020:AHS, author = "Daniel Goldsmith and Kim Grauer and Yonah Shmalo", title = "Analyzing hack subnetworks in the bitcoin transaction graph", journal = "Appl. Netw. Sci.", volume = "5", number = "1", pages = "22", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s41109-020-00261-7", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ans/ans5.html#GoldsmithGS20", acknowledgement = ack-nhfb, dblp-key = "journals/ans/GoldsmithGS20", dblp-mdate = "2022-02-14", } @Article{Gopalan:2020:SSB, author = "Aditya Gopalan and Abishek Sankararaman and Anwar Walid and Sriram Vishwanath", title = "Stability and Scalability of Blockchain Systems", journal = j-POMACS, volume = "4", number = "2", pages = "35:1--35:35", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3392153", ISSN = "2476-1249", ISSN-L = "2476-1249", bibdate = "Mon Mar 29 10:31:35 MDT 2021", bibsource = "http://portal.acm.org/https://www.math.utah.edu/pub/tex/bib/pomacs.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dl.acm.org/doi/10.1145/3392153", abstract = "The blockchain paradigm provides a mechanism for content dissemination and distributed consensus on Peer-to-Peer (P2P) networks. While this paradigm has been widely adopted in industry, it has not been carefully analyzed in terms of its network scaling with respect to the number of peers. Applications for blockchain systems, such as cryptocurrencies and IoT, require this form of network scaling. In this paper, we propose a new stochastic network model for a blockchain system. We identify a structural property called one-endedness, which we show to be desirable in any blockchain system as it is directly related to distributed consensus among the peers. We show that the stochastic stability of the network is sufficient for the one-endedness of a blockchain. We further establish that our model belongs to a class of network models, called monotone separable models. This allows us to establish upper and lower bounds on the stability region. The bounds on stability depend on the connectivity of the P2P network through its conductance and allow us to analyze the scalability of blockchain systems on large P2P networks. We verify our theoretical insights using both synthetic data and real data from the Bitcoin network.", acknowledgement = ack-nhfb, articleno = "35", fjournal = "Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)", journal-URL = "https://dl.acm.org/loi/pomacs", } @Article{Gramoli:2020:BCB, author = "Vincent Gramoli", title = "From blockchain consensus back to {Byzantine} consensus", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "760--769", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.09.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17320095", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Grech:2020:MAG, author = "Neville Grech and Michael Kong and Anton Jurisevic and Lexi Brent and Bernhard Scholz and Yannis Smaragdakis", title = "{MadMax}: analyzing the out-of-gas world of smart contracts", journal = j-CACM, volume = "63", number = "10", pages = "87--95", month = sep, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3416262", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Sep 24 07:02:28 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3416262", abstract = "Ethereum is a distributed blockchain platform, serving as an ecosystem for smart contracts: full-fledged intercommunicating programs that capture the transaction logic of an account. A gas limit caps the execution of an Ethereum smart contract: \ldots{}", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Guan:2020:TSE, author = "Zhitao Guan and Xin Lu and Naiyu Wang and Jun Wu and Xiaojiang Du and Mohsen Guizani", title = "Towards secure and efficient energy trading in {IIoT}-enabled energy {Internet}: a blockchain approach", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "686--695", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.027", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19315018", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Gupta:2020:RGS, author = "Suyash Gupta and Sajjad Rahnama and Jelle Hellings and Mohammad Sadoghi", title = "{ResilientDB}: global scale resilient blockchain fabric", journal = j-PROC-VLDB-ENDOWMENT, volume = "13", number = "6", pages = "868--883", month = feb, year = "2020", CODEN = "????", DOI = "https://doi.org/10.14778/3380750.3380757", ISSN = "2150-8097", bibdate = "Thu Apr 2 10:51:28 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/abs/10.14778/3380750.3380757", abstract = "Recent developments in blockchain technology have inspired innovative new designs in resilient distributed and database systems. At their core, these blockchain applications typically use Byzantine fault-tolerant consensus protocols to maintain a common \ldots{}", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Haghighat:2020:CIA, author = "Alireza Toroghi Haghighat and Mehdi Shajari", title = "Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools", journal = "IET Inf. Secur.", volume = "14", number = "5", pages = "553--561", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1049/iet-ifs.2018.5496", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/iet-ifs/iet-ifs14.html#HaghighatS20", acknowledgement = ack-nhfb, dblp-key = "journals/iet-ifs/HaghighatS20", dblp-mdate = "2020-09-10", } @Article{Hanaoka:2020:SFT, author = "Goichiro Hanaoka and Yusuke Sakai and Toshiya Shimizu and Takeshi Shimoyama and SeongHan Shin", title = "A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications", journal = "IEICE Trans. Fundam. Electron. Commun. Comput. Sci.", volume = "103-A", number = "1", pages = "150--164", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1587/transfun.2019CIP0018", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://search.ieice.org/bin/summary.php?id=e103-a_1_150; https://dblp.org/db/journals/ieiceta/ieiceta103.html#HanaokaSSSS20", acknowledgement = ack-nhfb, dblp-key = "journals/ieicet/HanaokaSSSS20", dblp-mdate = "2021-01-18", } @Article{UlHassan:2020:DPB, author = "Muneeb {Ul Hassan} and Mubashir Husain Rehmani and Jinjun Chen", title = "Differential privacy in blockchain technology: a futuristic approach", journal = j-J-PAR-DIST-COMP, volume = "145", number = "??", pages = "50--74", month = nov, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.06.003", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520303105", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Hazari:2020:ITS, author = "Shihab Shahriar Hazari and Qusay H. Mahmoud", title = "Improving Transaction Speed and Scalability of Blockchain Systems via Parallel Proof of Work", journal = j-FUTURE-INTERNET, volume = "12", number = "8", pages = "125", day = "27", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12080125", ISSN = "1999-5903", bibdate = "Fri Aug 28 12:33:08 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/8/125", abstract = "A blockchain is a distributed ledger forming a distributed consensus on a history of transactions, and is the underlying technology for the Bitcoin cryptocurrency. Its applications are far beyond the financial sector. The transaction verification process for cryptocurrencies is much slower than traditional digital transaction systems. One approach to scalability or the speed at which transactions are processed is to design a solution that offers faster Proof of Work. In this paper, we propose a method for accelerating the process of Proof of Work based on parallel mining rather than solo mining. The goal is to ensure that no more than two or more miners put the same effort into solving a specific block. The proposed method includes a process for selection of a manager, distribution of work and a reward system. This method has been implemented in a test environment that contains all the characteristics needed to perform Proof of Work for Bitcoin and has been tested, using a variety of case scenarios, by varying the difficulty level and number of validators. Experimental evaluations were performed locally and in a cloud environment, and experimental results demonstrate the feasibility the proposed method.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Special Issue on Cyber Physical Systems: Prospects, Challenges, and Role in Software Defined Networking and Blockchain.", } @Article{He:2020:TRT, author = "Guobiao He and Wei Su and Shuai Gao and Jiarui Yue", title = "{TD-Root}: a trustworthy decentralized {DNS} root management architecture based on permissioned blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "912--924", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.037", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19312762", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Herskind:2020:BER, author = "Lasse Herskind and Alberto Giaretta and Michele {De Donno} and Nicola Dragoni", title = "{BitFlow}: Enabling real-time cash-flow evaluations through blockchain", journal = j-CCPE, volume = "32", number = "12", pages = "e5333:1--e5333:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5333", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "24 May 2019", } @Article{Howard:2020:BCF, author = "J. P. Howard and M. E. Vachino", title = "Blockchain Compliance With Federal Cryptographic Information-Processing Standards", journal = j-IEEE-SEC-PRIV, volume = "18", number = "1", pages = "65--70", month = jan, year = "2020", DOI = "https://doi.org/10.1109/MSEC.2019.2944290", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Fri Feb 21 14:45:55 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "https://publications.computer.org/security-and-privacy/", keywords = "Blockchain; blockchain technologies; cryptography; Cryptography; Digital signatures; distributed databases; Distributed ledger; Ethereum technologies; Federal cryptographic Information-processing Standards; Federal Information Security Management Act; FISMA; Government policies; Hyperledger Fabric technologies; multichain technologies; National Institute of Standards and Technology cryptographic standards; NIST; NIST compliance; R3s Corda technologies", } @Article{Howson:2020:BTE, author = "Peter Howson", title = "Building trust and equity in marine conservation and fisheries supply chain management with blockchain", journal = j-MAR-POLICY, volume = "115", number = "??", pages = "Article 103873", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.marpol.2020.103873", ISSN = "0308-597X (print), 1872-9460 (electronic)", ISSN-L = "0308-597X", bibdate = "Tue Nov 16 11:09:45 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/marpolicy2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0308597X19307067", acknowledgement = ack-nhfb, ajournal = "Mar. Policy", fjournal = "Marine Policy", journal-URL = "https://www.sciencedirect.com/journal/marine-policy", } @Article{Huang:2020:BBS, author = "Haiping Huang and Peng Zhu and Fu Xiao and Xiang Sun and Qinglong Huang", title = "A blockchain-based scheme for privacy-preserving and secure sharing of medical data", journal = j-COMPUT-SECUR, volume = "99", number = "??", pages = "Article 102010", month = dec, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102010", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:07 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820302832", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Huang:2020:BRE, author = "Bobo Huang and Rui Zhang and Zhihui Lu and Yiming Zhang and Jie Wu and Lu Zhan and Patrick C. K. Hung", title = "{BPS}: a reliable and efficient pub\slash sub communication model with blockchain-enhanced paradigm in multi-tenant edge cloud", journal = j-J-PAR-DIST-COMP, volume = "143", number = "??", pages = "167--178", month = sep, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.005", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520302847", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Huang:2020:IUP, author = "Xinyi Huang and Yuexin Zhang", title = "Indistinguishability and unextractablility of password-based authentication in blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "112", number = "??", pages = "561--566", month = nov, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.05.009", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X20300327", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Huang:2020:UMB, author = "Yuheng Huang and Haoyu Wang and Lei Wu and Gareth Tyson and Xiapu Luo and Run Zhang and Xuanzhe Liu and Gang Huang and Xuxian Jiang", title = "Understanding (Mis){Behavior} on the {EOSIO} Blockchain", journal = j-POMACS, volume = "4", number = "2", pages = "37:1--37:28", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3392155", ISSN = "2476-1249", ISSN-L = "2476-1249", bibdate = "Mon Mar 29 10:31:35 MDT 2021", bibsource = "http://portal.acm.org/https://www.math.utah.edu/pub/tex/bib/pomacs.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dl.acm.org/doi/10.1145/3392155", abstract = "EOSIO has become one of the most popular blockchain platforms since its mainnet launch in June 2018. In contrast to the traditional PoW-based systems (e.g., Bitcoin and Ethereum), which are limited by low throughput, EOSIO is the first high throughput Delegated Proof of Stake system that has been widely adopted by many decentralized applications. Although EOSIO has millions of accounts and billions of transactions, little is known about its ecosystem, especially related to security and fraud. In this paper, we perform a large-scale measurement study of the EOSIO blockchain and its associated DApps. We gather a large-scale dataset of EOSIO and characterize activities including money transfers, account creation and contract invocation. Using our insights, we then develop techniques to automatically detect bots and fraudulent activity. We discover thousands of bot accounts (over 30\% of the accounts in the platform) and a number of real-world attacks (301 attack accounts). By the time of our study, 80 attack accounts we identified have been confirmed by DApp teams, causing 828,824 EOS tokens losses (roughly \$2.6 million) in total.", acknowledgement = ack-nhfb, articleno = "37", fjournal = "Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)", journal-URL = "https://dl.acm.org/loi/pomacs", } @Article{Jiang:2020:SBB, author = "Peng Jiang and Fuchun Guo and Kaitai Liang and Jianchang Lai and Qiaoyan Wen", title = "{Searchain}: Blockchain-based private keyword search in decentralized storage", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "781--792", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.036", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318630", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Jumnongsaksub:2020:RSC, author = "Siwapol Jumnongsaksub and Kunwadee Sripanidkulchai", title = "Reducing Smart Contract Runtime Errors on {Ethereum}", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "55--59", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.2993882", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Kabbinale:2020:BES, author = "Aniruddh Rao Kabbinale and Emmanouil Dimogerontakis and Mennan Selimi and Anwaar Ali and Leandro Navarro and Arjuna Sathiaseelan and Jon Crowcroft", title = "Blockchain for economically sustainable wireless mesh networks", journal = j-CCPE, volume = "32", number = "12", pages = "e5349:1--e5349:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5349", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "28 May 2019", } @Article{Kabra:2020:MBB, author = "Naman Kabra and Pronaya Bhattacharya and Sudeep Tanwar and Sudhanshu Tyagi", title = "{{\em MudraChain}}: Blockchain-based framework for automated cheque clearance in financial institutions", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "574--587", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.08.035", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19311896", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Kadadha:2020:SBB, author = "Maha Kadadha and Hadi Otrok and Rabeb Mizouni and Shakti Singh and Anis Ouali", title = "{SenseChain}: a blockchain-based crowdsensing framework for multiple requesters and multiple workers", journal = j-FUT-GEN-COMP-SYS, volume = "105", number = "??", pages = "650--664", month = apr, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.12.007", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:07 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19312579", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Kalampakas:2020:SAB, author = "Argyrios Kalampakas and Georgios C. Makris", title = "Statistical Analysis to Bitcoin Transactions Network", journal = j-INT-J-STAT-PROBAB, volume = "9", number = "5", pages = "85--??", month = "????", year = "2020", CODEN = "????", ISSN = "1927-7032 (print), 1927-7040 (electronic)", ISSN-L = "1927-7032", bibdate = "Fri May 21 15:18:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjstatprobab.bib", URL = "http://www.ccsenet.org/journal/index.php/ijsp/article/view/0/43581", acknowledgement = ack-nhfb, fjournal = "International Journal of Statistics and Probability", journal-URL = "http://www.ccsenet.org/journal/index.php/ijsp/issue/archive", } @Article{Kannengiesser:2020:TOB, author = "Niclas Kannengie{\ss}er and Sebastian Lins and Tobias Dehling and Ali Sunyaev", title = "Trade-offs between Distributed Ledger Technology Characteristics", journal = j-COMP-SURV, volume = "53", number = "2", pages = "42:1--42:37", month = jul, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3379463", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Wed Jul 8 17:24:43 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3379463", abstract = "When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection \ldots{}", acknowledgement = ack-nhfb, articleno = "42", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Kanza:2020:TPR, author = "Yaron Kanza", title = "Technical Perspective: Revealing Every Story of Data in Blockchain Systems", journal = j-SIGMOD, volume = "49", number = "1", pages = "69--69", month = sep, year = "2020", CODEN = "SRECD8", DOI = "https://doi.org/10.1145/3422648.3422664", ISSN = "0163-5808 (print), 1943-5835 (electronic)", ISSN-L = "0163-5808", bibdate = "Sun Sep 6 17:50:43 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmod.bib", URL = "https://dl.acm.org/doi/10.1145/3422648.3422664", abstract = "For many applications, data are worthy only if they are trustworthy. The concept of trust is sometimes elusive, and yet it is fundamental in data management. Even when not expressed explicitly, the correctness of computations and reliability of depend on trustworthy management of the data. These notions received new attention with the advent of blockchain and distributed ledger technology.", acknowledgement = ack-nhfb, fjournal = "SIGMOD Record (ACM Special Interest Group on Management of Data)", journal-URL = "https://dl.acm.org/loi/sigmod", } @Article{Kapsoulis:2020:CBS, author = "Nikolaos Kapsoulis and Alexandros Psychas and Georgios Palaiokrassas and Achilleas Marinakis and Antonios Litke and Theodora Varvarigou and Charalampos Bouchlis and Amaryllis Raouzaiou and Gon{\c{c}}al Calvo and Jordi Escudero Subirana", title = "Consortium Blockchain Smart Contracts for Musical Rights Governance in a Collective Management Organizations {(CMOs)} Use Case", journal = j-FUTURE-INTERNET, volume = "12", number = "8", pages = "134", day = "11", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12080134", ISSN = "1999-5903", bibdate = "Fri Aug 28 12:33:08 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/8/134", abstract = "Private and permissioned blockchains are conceptualized and mostly assembled for fulfilling corporations' demands and needs in the context of their own premises. This paper presents a complete and sophisticated end-to-end permissioned blockchain application for governance and management of musical rights endorsed by smart contract development. In a music industry use case, this disclosed solution monitors and regulates conflicting musical rights of diverse entities under a popular permissioned distributed ledger technology network. The proposed implementation couples various and distinct business domains across the music industry organizations and non-profit blockchain associations.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Intelligent Innovations in Multimedia Data.", } @Article{Khan:2020:BEC, author = "Zaheer Khan and Abdul Ghafoor Abbasi and Zeeshan Pervez", title = "Blockchain and edge computing-based architecture for participatory smart city applications", journal = j-CCPE, volume = "32", number = "12", pages = "e5566:1--e5566:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5566", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "11 November 2019", } @Article{Khan:2020:IPC, author = "Kashif Mehboob Khan and Junaid Arshad and Muhammad Mubashir Khan", title = "Investigating performance constraints for blockchain based secure e-voting system", journal = j-FUT-GEN-COMP-SYS, volume = "105", number = "??", pages = "13--26", month = apr, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.11.005", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:07 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19310805", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Kim:2020:MBS, author = "Mihui Kim and Youngmin Kim", title = "Multi-Blockchain Structure for a Crowdsensing-Based Smart Parking System", journal = j-FUTURE-INTERNET, volume = "12", number = "5", pages = "90", day = "16", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12050090", ISSN = "1999-5903", bibdate = "Thu May 28 15:16:57 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/5/90", abstract = "As a representative example for the construction of a smart city, a smart parking system has been developed in past research and implemented through IoT and cloud technologies. However, the initial installation cost of IoT sensor devices is preventing the spread of this technology, and thus as an alternative, a crowdsensing-based system, operating through data from publicly owned mobile devices, has been proposed. In this paper, we propose a multi-blockchain structure (i.e., constructed with public chain and private chain) in a crowdsensing-based smart parking system. In this structure, many sensing data contributors participate through the opened public blockchain, to transparently provide sensing information and to claim corresponding rewards. The private blockchain provides an environment for sharing the collected information among service providers in real time and for providing parking information to users. The bridge node performs an information relay role between the two blockchains. Performance analysis and security analysis on the implemented proposed system show the feasibility of our proposed system.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Internet of Things (IoT) Applications for Industry 4.0.", } @Article{Kim:2020:NCS, author = "Yonggun Kim and Yoojae Won", title = "A new cost-saving and efficient method for patch management using blockchain", journal = j-J-SUPERCOMPUTING, volume = "76", number = "7", pages = "5301--5319", month = jul, year = "2020", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-019-02946-y", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Sat Jul 25 07:17:58 MDT 2020", bibsource = "http://link.springer.com/journal/11227/76/7; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Kolb:2020:CCC, author = "John Kolb and Moustafa AbdelBaky and Randy H. Katz and David E. Culler", title = "Core Concepts, Challenges, and Future Directions in Blockchain: a Centralized Tutorial", journal = j-COMP-SURV, volume = "53", number = "1", pages = "9:1--9:39", month = may, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3366370", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sat May 30 20:55:29 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3366370", abstract = "Blockchains are a topic of immense interest in academia and industry, but their true nature is often obscured by marketing and hype. In this tutorial, we explain the fundamental elements of blockchains. We discuss their ability to achieve availability, \ldots{}", acknowledgement = ack-nhfb, articleno = "9", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Konashevych:2020:RTB, author = "Oleksii Konashevych and Oleg Khovayko", title = "Randpay: the technology for blockchain micropayments and transactions which require recipient's consent", journal = j-COMPUT-SECUR, volume = "96", number = "??", pages = "Article 101892", month = sep, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.101892", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:05 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820301656", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kondo:2020:CCS, author = "Masanari Kondo and Gustavo A. Oliva and Zhen Ming (Jack) Jiang and Ahmed E. Hassan and Osamu Mizuno", title = "Code cloning in smart contracts: a case study on verified contracts from the {Ethereum} blockchain platform", journal = j-EMPIR-SOFTWARE-ENG, volume = "25", number = "6", pages = "4617--4675", month = nov, year = "2020", CODEN = "ESENFW", DOI = "https://doi.org/10.1007/s10664-020-09852-5", ISSN = "1382-3256 (print), 1573-7616 (electronic)", ISSN-L = "1382-3256", bibdate = "Tue Mar 30 15:09:47 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/empir-software-eng.bib", URL = "http://link.springer.com/article/10.1007/s10664-020-09852-5", acknowledgement = ack-nhfb, fjournal = "Empirical Software Engineering", journal-URL = "http://link.springer.com/journal/10664", } @Article{Konig:2020:CBS, author = "Lukas K{\"o}nig", title = "Comparing Blockchain Standards and Recommendations", journal = j-FUTURE-INTERNET, volume = "12", number = "12", pages = "222", day = "07", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12120222", ISSN = "1999-5903", bibdate = "Fri Jan 22 11:26:00 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/12/222", abstract = "Since the introduction of Bitcoin, the term ``blockchain'' has attracted many start-ups and companies over the years, especially in the financial sector. However, technology is evolving faster than standardization frameworks. This left the industry in the position of having to use this emerging technology, without being backed by any international standards organization regarding for neither the technology itself, nor for a blockchain specific information security framework. In times of the General Data Protection Regulation and growing international trade conflicts, protecting information is more relevant than ever. Standardization of blockchains is an appeal to raise the development of information technologies to the next level. Therefore, this paper shall provide an overview of standardization organization's publications about blockchains/distributed ledger technologies, a set of comparison criteria for future work and a comparison of the existing standards work itself. With that information, aligning to existing standardization efforts becomes easier, and might even present the possibility to create frameworks where there are none at the moment.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Information and Future Internet Security, Trust and Privacy.", } @Article{Kshetri:2020:BBF, author = "N. Kshetri", title = "Blockchain-Based Financial Technologies and Cryptocurrencies for Low-Income People: Technical Potential Versus Practical Reality", journal = j-COMPUTER, volume = "53", number = "1", pages = "18--29", month = jan, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2019.2951977", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Jan 22 06:53:36 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "Blockchain; Cryptocurrency; Market opportunities", } @Article{Kshetri:2020:EBF, author = "N. Kshetri and J. DeFranco", title = "The Economics Behind Food Supply Blockchains", journal = j-COMPUTER, volume = "53", number = "12", pages = "106--110", year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.3021549", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Feb 3 20:15:14 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Kumari:2020:BAA, author = "Aparna Kumari and Rajesh Gupta and Sudeep Tanwar and Neeraj Kumar", title = "Blockchain and {AI} amalgamation for energy cloud management: Challenges, solutions, and future directions", journal = j-J-PAR-DIST-COMP, volume = "143", number = "??", pages = "148--166", month = sep, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.004", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S074373152030277X", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Lafourcade:2020:ABI, author = "Pascal Lafourcade and Marius Lombard-Platet", title = "About blockchain interoperability", journal = j-INFO-PROC-LETT, volume = "161", number = "??", pages = "Article 105976", month = sep, year = "2020", CODEN = "IFPLAT", DOI = "https://doi.org/10.1016/j.ipl.2020.105976", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Mar 24 11:59:25 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/infoproc2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0020019020300636", acknowledgement = ack-nhfb, fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", } @Article{Lagouvardos:2020:PSM, author = "Sifis Lagouvardos and Neville Grech and Ilias Tsatiris and Yannis Smaragdakis", title = "Precise static modeling of {Ethereum} ``memory''", journal = j-PACMPL, volume = "4", number = "OOPSLA", pages = "190:1--190:26", month = nov, year = "2020", DOI = "https://doi.org/10.1145/3428258", bibdate = "Tue Mar 30 08:10:50 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", URL = "https://dl.acm.org/doi/10.1145/3428258", abstract = "Static analysis of smart contracts as-deployed on the Ethereum blockchain has received much recent attention. However, high-precision analyses currently face significant challenges when dealing with the Ethereum VM (EVM) execution model. A major such \ldots{}", acknowledgement = ack-nhfb, articleno = "190", fjournal = "Proceedings of the ACM on Programming Languages", journal-URL = "https://pacmpl.acm.org/", } @Article{Lao:2020:SIA, author = "Laphou Lao and Zecheng Li and Songlin Hou and Bin Xiao and Songtao Guo and Yuanyuan Yang", title = "A Survey of {IoT} Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling", journal = j-COMP-SURV, volume = "53", number = "1", pages = "18:1--18:32", month = may, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3372136", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sat May 30 20:55:29 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3372136", abstract = "Blockchain technology can be extensively applied in diverse services, including online micro-payments, supply chain tracking, digital forensics, health-care record sharing, and insurance payments. Extending the technology to the Internet of things (IoT),. \ldots{}", acknowledgement = ack-nhfb, articleno = "18", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Larrucea:2020:BSC, author = "Xabier Larrucea and Cesare Pautasso", title = "{Blockchain} and Smart Contract Engineering", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "23--29", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.3000354", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Lasi:2020:SDM, author = "Davide Lasi and Lukas Saul", title = "A System Dynamics Model of Bitcoin: Mining as an Efficient Market and the Possibility of {``Peak} Hash''", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2004.09212; https://dblp.org/db/journals/corr/corr2004.html#abs-2004-09212", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2004-09212", dblp-mdate = "2020-04-22", } @Article{Lee:2020:BBM, author = "Han Lee and Maode Ma", title = "Blockchain-based mobility management for {5G}", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "638--646", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.08.008", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19306843", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Lee:2020:TBS, author = "Yu-Tse Lee and Jhan-Jia Lin and Jane Yung-Jen Hsu and Ja-Ling Wu", title = "A Time Bank System Design on the Basis of Hyperledger Fabric Blockchain", journal = j-FUTURE-INTERNET, volume = "12", number = "5", pages = "84", day = "08", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12050084", ISSN = "1999-5903", bibdate = "Thu May 28 15:16:57 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/5/84", abstract = "This paper presents a blockchain-based time bank system on the basis of the Hyperledger Fabric framework, which is one of the permissioned blockchain networks. Most of the services provided by existing Time Bank systems were recorded and conducted manually in the past; furthermore, jobs for matching services with receivers were managed by people. Running a time bank in this way will cost lots of time and human resources and, worse, it lacks security. This work designs and realizes a time bank system enabling all the service-related processes being executed and recorded on a blockchain. The matching between services' supply-and-demand tasks can directly be done through autonomous smart contracts. Building a time bank system on blockchain benefits the transaction of time credit which plays the role of digital currency on the system. In addition, the proposed time bank also retains a grading system, allowing its members to give each other a grade for reflecting their degrees of satisfaction about the results provided by the system. This grading system will incentivize the members to provide a better quality of service and adopt a nicer attitude for receiving a service, which may positively endorse the development of a worldwide time bank system.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", remark = "Special Issue Selected Papers from the 3rd Annual Decentralized Conference (DECENTRALIZED 2019).", } @Article{Lei:2020:BBC, author = "Ao Lei and Yue Cao and Shihan Bao and Dasen Li and Philip Asuquo and Haitham Cruickshank and Zhili Sun", title = "A blockchain based certificate revocation scheme for vehicular communication systems", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "892--903", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.03.039", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1831522X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Leong:2020:SSB, author = "Lambert T. Leong", title = "Snapshot Samplings of the Bitcoin Transaction Network and Analysis of Cryptocurrency Growth", journal = "CoRR", volume = "abs/2003.06068", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2003.06068; https://dblp.org/db/journals/corr/corr2003.html#abs-2003-06068", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2003-06068", dblp-mdate = "2020-03-17", } @Article{Li:2020:DSB, author = "Ya-Nan Li and Xiaotao Feng and Jan Xie and Hanwen Feng and Zhenyu Guan and Qianhong Wu", title = "A decentralized and secure blockchain platform for open fair data trading", journal = j-CCPE, volume = "32", number = "7", pages = "e5578:1--e5578:??", day = "10", month = apr, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5578", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:14 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "03 December 2019", } @Article{Li:2020:IDL, author = "Defeng Li and Yuan Hu and Mingming Lan", title = "{IoT} device location information storage system based on blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "109", number = "??", pages = "95--102", month = aug, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.03.025", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:18 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X20300169", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Li:2020:SSB, author = "Xiaoqi Li and Peng Jiang and Ting Chen and Xiapu Luo and Qiaoyan Wen", title = "A survey on the security of blockchain systems", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "841--853", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.020", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318332", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Li:2020:TCA, author = "Lun Li and Jiqiang Liu and Xiaolin Chang and Tianhao Liu and Jingxian Liu", title = "Toward conditionally anonymous Bitcoin transactions: a lightweight-script approach", journal = "Inf. Sci.", volume = "509", number = "??", pages = "290--303", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.ins.2019.09.011", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/isci/isci509.html#LiLCLL20", acknowledgement = ack-nhfb, dblp-key = "journals/isci/LiLCLL20", dblp-mdate = "2019-10-15", } @Article{Lin:2020:LNS, author = "Jian-Hong Lin and Kevin Primicerio and Tiziano Squartini and Christian Decker and Claudio J. Tessone", title = "Lightning Network: a second path towards centralisation of the Bitcoin economy", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2002.02819; https://dblp.org/db/journals/corr/corr2002.html#abs-2002-02819", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2002-02819", dblp-mdate = "2020-02-10", } @Article{Liu:2020:ABW, author = "Lin Liu and Wei-Tek Tsai and Md Zakirul Alam Bhuiyan and Dong Yang", title = "Automatic blockchain whitepapers analysis via heterogeneous graph neural network", journal = j-J-PAR-DIST-COMP, volume = "145", number = "??", pages = "1--12", month = nov, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.014", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520302938", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Liu:2020:BBI, author = "Yang Liu and Debiao He and Mohammad S. Obaidat and Neeraj Kumar and Muhammad Khurram Khan and Kim-Kwang Raymond Choo", title = "Blockchain-based identity management systems: a review", journal = j-J-NETW-COMPUT-APPL, volume = "166", number = "??", pages = "??--??", day = "15", month = sep, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102731", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:38 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520302058", acknowledgement = ack-nhfb, articleno = "102731", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Liu:2020:DPS, author = "Yue Liu and Qinghua Lu and Hye-Young Paik and Xiwei Xu and Shiping Chen and Liming Zhu", title = "Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "30--36", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.2992783", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Liu:2020:FSP, author = "Yizhong Liu and Jianwei Liu and Zongyang Zhang and Hui Yu", title = "A fair selection protocol for committee-based permissionless blockchains", journal = j-COMPUT-SECUR, volume = "91", number = "??", pages = "Article 101718", month = apr, year = "2020", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Mar 14 18:49:58 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820300055", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Liu:2020:NRV, author = "Yaping Liu and Shuo Zhang and Haojin Zhu and Peng-Jun Wan and Lixin Gao and Yaoxue Zhang and Zhihong Tian", title = "A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks", journal = j-J-PAR-DIST-COMP, volume = "142", number = "??", pages = "77--89", month = aug, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.04.005", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731519308317", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Livieris:2020:EDL, author = "Ioannis E. Livieris and Emmanuel Pintelas and Stavros Stavroyiannis and Panagiotis Pintelas", title = "Ensemble Deep Learning Models for Forecasting Cryptocurrency Time-Series", journal = j-ALGORITHMS-BASEL, volume = "13", number = "5", month = may, year = "2020", CODEN = "ALGOCH", DOI = "https://doi.org/10.3390/a13050121", ISSN = "1999-4893 (electronic)", ISSN-L = "1999-4893", bibdate = "Thu May 28 08:40:48 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/algorithms.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.mdpi.com/1999-4893/13/5/121", acknowledgement = ack-nhfb, articleno = "121", fjournal = "Algorithms (Basel)", journal-URL = "https://www.mdpi.com/", pagecount = "??", } @Article{Livshits:2020:ASC, author = "Benjamin Livshits", title = "Analyzing smart contracts with {MadMax}: technical perspective", journal = j-CACM, volume = "63", number = "10", pages = "86--86", month = sep, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3416259", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Sep 24 07:02:28 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3416259", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Longo:2020:ACP, author = "Riccardo Longo and Alessandro Sebastian Podda and Roberto Saia", title = "Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain", journal = "Comput.", volume = "8", number = "3", pages = "67", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/computation8030067", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/computation/computation8.html#LongoPS20", acknowledgement = ack-nhfb, dblp-key = "journals/computation/LongoPS20", dblp-mdate = "2021-01-21", } @Article{Luo:2020:AHI, author = "Anthony Luo and Dianxiang Xu", title = "Assessing Holistic Impacts of Major Events on the Bitcoin Blockchain Network", journal = "CoRR", volume = "abs/2006.02416", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2006.02416; https://dblp.org/db/journals/corr/corr2006.html#abs-2006-02416", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2006-02416", dblp-mdate = "2021-10-14", } @Article{Lyu:2020:SSB, author = "Qiuyun Lyu and Yizhen Qi and Xiaochen Zhang and Huaping Liu and Qiuhua Wang and Ning Zheng", title = "{SBAC}: a secure blockchain-based access control framework for information-centric networking", journal = j-J-NETW-COMPUT-APPL, volume = "149", number = "??", pages = "??--??", day = "1", month = jan, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2019.102444", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:31 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519303042", acknowledgement = ack-nhfb, articleno = "102444", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Ma:2020:BBM, author = "Haiying Ma and Elmo X. Huang and Kwok-Yan Lam", title = "Blockchain-based mechanism for fine-grained authorization in data crowdsourcing", journal = j-FUT-GEN-COMP-SYS, volume = "106", number = "??", pages = "121--134", month = may, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.12.037", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:13 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19300822", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ma:2020:TBE, author = "Zhaofeng Ma and Weizhe Zhao and Shoushan Luo and Lingyun Wang", title = "{TrustedBaaS}: Blockchain-Enabled Distributed and Higher-Level Trusted Platform", journal = j-COMP-NET-AMSTERDAM, volume = "183", number = "??", pages = "Article 107600", day = "24", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2020.107600", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Sat Mar 27 13:48:26 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128620312330", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Makhdoom:2020:PBB, author = "Imran Makhdoom and Ian Zhou and Mehran Abolhasan and Justin Lipman and Wei Ni", title = "{PrivySharing}: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities", journal = j-COMPUT-SECUR, volume = "88", number = "??", pages = "Article 101653", month = jan, year = "2020", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Mar 14 18:49:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S016740481930197X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Mazzei:2020:BTI, author = "Daniele Mazzei and Giacomo Baldi and Gualtiero Fantoni and Gabriele Montelisciani and Antonio Pitasi and Laura Ricci and Lorenzo Rizzello", title = "A {Blockchain Tokenizer for Industrial IOT} trustless applications", journal = j-FUT-GEN-COMP-SYS, volume = "105", number = "??", pages = "432--445", month = apr, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.12.020", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:07 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19317686", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Meng:2020:ECB, author = "Weizhi Meng and Wenjuan Li and Laurence T. Yang and Peng Li", title = "Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "279--290", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-019-00462-x", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-019-00462-x", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Meng:2020:TBE, author = "Weizhi Meng and Wenjuan Li and Steven Tug and Jiao Tan", title = "Towards blockchain-enabled single character frequency-based exclusive signature matching in {IoT}-assisted smart cities", journal = j-J-PAR-DIST-COMP, volume = "144", number = "??", pages = "268--277", month = oct, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.013", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520302926", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Mhaisen:2020:CCR, author = "Naram Mhaisen and Noora Fetais and Aiman Erbad and Amr Mohamed and Mohsen Guizani", title = "To chain or not to chain: a reinforcement learning approach for blockchain-enabled {IoT} monitoring applications", journal = j-FUT-GEN-COMP-SYS, volume = "111", number = "??", pages = "39--51", month = oct, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.04.035", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:21 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19334399", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Mirsky:2020:LCA, author = "Yisroel Mirsky and Tomer Golomb and Yuval Elovici", title = "Lightweight collaborative anomaly detection for the {IoT} using blockchain", journal = j-J-PAR-DIST-COMP, volume = "145", number = "??", pages = "75--97", month = nov, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.06.008", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520303154", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Mohanty:2020:ELI, author = "Sachi Nandan Mohanty and K. C. Ramya and S. Sheeba Rani and Deepak Gupta and K. Shankar and S. K. Lakshmanaprabu and Ashish Khanna", title = "An {efficient Lightweight integrated Blockchain (ELIB)} model for {IoT} security and privacy", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "1027--1037", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.050", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19319843", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Moubarak:2020:DLS, author = "Joanna Moubarak and Maroun Chamoun and Eric Filiol", title = "On distributed ledgers security and illegal uses", journal = j-FUT-GEN-COMP-SYS, volume = "113", number = "??", pages = "183--195", month = dec, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.06.044", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:09 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17330650", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Myung:2020:ESC, author = "Sein Myung and Jong-Hyouk Lee", title = "{Ethereum} smart contract-based automated power trading algorithm in a microgrid environment", journal = j-J-SUPERCOMPUTING, volume = "76", number = "7", pages = "4904--4914", month = jul, year = "2020", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-018-2697-7", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Sat Jul 25 07:17:59 MDT 2020", bibsource = "http://link.springer.com/journal/11227/76/7; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", acknowledgement = ack-nhfb, fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Nandakumar:2020:BTM, author = "Karthik Nandakumar and Nalini Ratha and Sharath Pankanti and Alex Pentland and Maurice Herlihy", title = "Blockchain: From Technology to Marketplaces", journal = j-COMPUTER, volume = "53", number = "7", pages = "14--18", month = jul, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.2990776", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jul 16 15:14:43 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Nguyen:2020:BBN, author = "Dinh C. Nguyen and Pubudu N. Pathirana and Ming Ding and Aruna Seneviratne", title = "Blockchain for {5G} and beyond networks: a state of the art survey", journal = j-J-NETW-COMPUT-APPL, volume = "166", number = "??", pages = "??--??", day = "15", month = sep, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102693", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:38 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520301673", acknowledgement = ack-nhfb, articleno = "102693", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Ning:2020:SMD, author = "Pengxiang Ning and Boqin Qin", title = "Stuck-me-not: A deadlock detector on blockchain software in {Rust}", journal = "Procedia Computer Science", volume = "177", pages = "599--604", year = "2020", DOI = "https://doi.org/10.1016/j.procs.2020.10.085", ISSN = "1877-0509", ISSN-L = "1877-0509", bibdate = "Fri Apr 9 15:09:48 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/rust.bib", note = "The 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2020) / Affiliated Workshops", URL = "https://www.sciencedirect.com/science/article/pii/S1877050920323565", abstract = "Recent years have witnessed a boom in blockchain systems written in Rust to utilize its efficiency and safety. Unfortunately, deadlock bugs have become one of the ubiquitous banes to these systems due to the heavy use of locks for parallelism and the misunderstanding of the lock mechanism in Rust. This paper analyzed the common lock-related pitfalls in blockchain systems written in Rust and proposed Stuck-me-not, the first MIR-based static deadlock detector, for the most common deadlock type: double-lock. We have discovered 29 previously unknown double-lock bugs in 11 popular blockchain-related projects. We believe our work can greatly improve the concurrency security of the current blockchain ecosystem.", acknowledgement = ack-nhfb, journal-URL = "https://www.sciencedirect.com/journal/procedia-computer-science", keywords = "deadlock detection; Rust programming language; static analysis", } @Article{Niu:2020:IABa, author = "Jianyu Niu and Ziyu Wang and Fangyu Gai and Chen Feng", title = "Incentive analysis of {Bitcoin-NG}, revisited", journal = "Perform. Evaluation", volume = "144", number = "??", pages = "102144", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.peva.2020.102144", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/pe/pe144.html#NiuWGF20", acknowledgement = ack-nhfb, dblp-key = "journals/pe/NiuWGF20", dblp-mdate = "2021-09-16", } @Article{Niu:2020:IAB, author = "Jianyu Niu and Ziyu Wang and Fangyu Gai and Chen Feng", title = "Incentive Analysis of {Bitcoin-NG}, Revisited", journal = j-SIGMETRICS, volume = "48", number = "3", pages = "59--60", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3453953.3453966", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Sat Mar 6 08:32:44 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dblp.org/db/journals/sigmetrics/sigmetrics48.html#NiuWGF20; https://dl.acm.org/doi/10.1145/3453953.3453966", abstract = "Bitcoin-NG is among the first scalable blockchain protocols by decoupling blockchain operation into two planes: leader election and transaction serialization. Its decoupling idea has inspired a new generation of blockchain protocols. However, the \ldots{}", acknowledgement = ack-nhfb, dblp-key = "journals/sigmetrics/NiuWGF20", dblp-mdate = "2021-04-26", fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Nosouhi:2020:BSL, author = "Mohammad Reza Nosouhi and Shui Yu and Wanlei Zhou and Marthie Grobler and Habiba Keshtiar", title = "Blockchain for secure location verification", journal = j-J-PAR-DIST-COMP, volume = "136", number = "??", pages = "40--51", month = feb, year = "2020", CODEN = "JPDCER", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed Mar 18 09:26:11 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S074373151930320X", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Oliva:2020:ESS, author = "Gustavo A. Oliva and Ahmed E. Hassan and Zhen Ming (Jack) Jiang", title = "An exploratory study of smart contracts in the {Ethereum} blockchain platform", journal = j-EMPIR-SOFTWARE-ENG, volume = "25", number = "3", pages = "1864--1904", month = may, year = "2020", CODEN = "ESENFW", DOI = "https://doi.org/10.1007/s10664-019-09796-5", ISSN = "1382-3256 (print), 1573-7616 (electronic)", ISSN-L = "1382-3256", bibdate = "Fri Jun 19 07:35:07 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/empir-software-eng.bib", URL = "http://link.springer.com/article/10.1007/s10664-019-09796-5", acknowledgement = ack-nhfb, fjournal = "Empirical Software Engineering", journal-URL = "http://link.springer.com/journal/10664", } @Article{Otte:2020:TSR, author = "Pim Otte and Martijn de Vos and Johan Pouwelse", title = "{TrustChain}: a {Sybil}-resistant scalable blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "770--780", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.048", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318988", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Paez:2020:ABE, author = "Rafael P{\'a}ez and Manuel P{\'e}rez and Gustavo Ram{\'\i}rez and Juan Montes and Lucas Bouvarel", title = "An Architecture for Biometric Electronic Identification Document System Based on Blockchain", journal = j-FUTURE-INTERNET, volume = "12", number = "1", pages = "10", day = "11", month = jan, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12010010", ISSN = "1999-5903", bibdate = "Mon Mar 2 12:22:41 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/1/10", abstract = "This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health services and registration of economic activities, among others. To validate the user authentication, a biometric e-ID system is used to avoid spoofing and related attacks. Also, to validate the document a digital certificate is used with the corresponding public and private key for each citizen by using a user's PIN. The proposed transaction validation process was implemented on a Blockchain system in order to record and verify the transactions made by all citizens registered in the electoral census, which guarantees security, integrity, scalability, traceability, and no-ambiguity. Additionally, a Blockchain network architecture is presented in a distributed and decentralized way including all the nodes of the network, database and government entities such as national register and notary offices. The results of the application of a new consensus algorithm to our Blockchain network are also presented showing mining time, memory and CPU usage when the number of transactions scales up.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Smart Cities, Innovation, and Multi-Dimensionality.", } @Article{Pandey:2020:SAH, author = "Prateek Pandey and Ratnesh Litoriya", title = "Securing and authenticating healthcare records through blockchain technology", journal = j-CRYPTOLOGIA, volume = "44", number = "4", pages = "341--356", year = "2020", CODEN = "CRYPE6", DOI = "https://doi.org/10.1080/01611194.2019.1706060", ISSN = "0161-1194 (print), 1558-1586 (electronic)", ISSN-L = "0161-1194", bibdate = "Fri Jul 10 09:45:59 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptologia.bib", URL = "http://www.tandfonline.com/doi/full/10.1080/01611194.2019.1706060", acknowledgement = ack-nhfb, fjournal = "Cryptologia", journal-URL = "https://www.tandfonline.com/loi/ucry20", onlinedate = "30 Jan 2020", } @Article{Patil:2020:EPP, author = "Akash Suresh Patil and Rafik Hamza and Alzubair Hassan and Nan Jiang and Hongyang Yan and Jin Li", title = "Efficient privacy-preserving authentication protocol using {PUFs} with blockchain smart contracts", journal = j-COMPUT-SECUR, volume = "97", number = "??", pages = "Article 101958", month = oct, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.101958", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:06 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820302340", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pautasso:2020:UBH, author = "Cesare Pautasso and Olaf Zimmermann and Liming Zhu and Thomas Bocek and Xabier Larrucea", title = "Unchain or Block the Hype?: Decision Drivers, Success Factors, and Perspectives for Blockchain Adoption", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "97--103", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.2999989", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Perry:2020:AVY, author = "Tekla S. Perry", title = "{AR\slash VR} is this year's hot ticket for jobs: But growth in demand for blockchain developers stutters --- [Careers]", journal = j-IEEE-SPECTRUM, volume = "57", number = "4", pages = "19--19", year = "2020", CODEN = "IEESAM", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Tue Apr 21 09:16:38 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Article{Phillip:2020:GBS, author = "Andrew Phillip and Jennifer Chan and Shelton Peiris", title = "On generalized bivariate {Student}-$t$ {Gegenbauer} long memory stochastic volatility models with leverage: {Bayesian} forecasting of cryptocurrencies with a focus on {Bitcoin}", journal = j-ECONOM-STAT, volume = "16", number = "??", pages = "69--90", month = oct, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.ecosta.2018.10.003", ISSN = "2452-3062", ISSN-L = "2452-3062", bibdate = "Tue Mar 30 15:57:31 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/economstat.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2452306218300753", acknowledgement = ack-nhfb, fjournal = "Econometrics and Statistics", journal-URL = "https://www.sciencedirect.com/journal/econometrics-and-statistics", } @Article{Pierro:2020:ORE, author = "Giuseppe Antonio Pierro", title = "An Organized Repository of {Ethereum} Smart Contracts' Source Codes and Metrics", journal = j-FUTURE-INTERNET, volume = "12", number = "11", pages = "197", day = "15", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12110197", ISSN = "1999-5903", bibdate = "Fri Jan 22 11:25:59 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/11/197", abstract = "Many empirical software engineering studies show that there is a need for repositories where source codes are acquired, filtered and classified. During the last few years, Ethereum block explorer services have emerged as a popular project to explore and search for Ethereum blockchain data such as transactions, addresses, tokens, smart contracts' source codes, prices and other activities taking place on the Ethereum blockchain. Despite the availability of this kind of service, retrieving specific information useful to empirical software engineering studies, such as the study of smart contracts' software metrics, might require many subtasks, such as searching for specific transactions in a block, parsing files in HTML format, and filtering the smart contracts to remove duplicated code or unused smart contracts. In this paper, we afford this problem by creating Smart Corpus, a corpus of smart contracts in an organized, reasoned and up-to-date repository where Solidity source code and other metadata about Ethereum smart contracts can easily and systematically be retrieved. We present Smart Corpus's design and its initial implementation, and we show how the data set of smart contracts' source codes in a variety of programming languages can be queried and processed to get useful information on smart contracts and their software metrics. Smart Corpus aims to create a smart-contract repository where smart-contract data (source code, application binary interface (ABI) and byte code) are freely and immediately available and are classified based on the main software metrics identified in the scientific literature. Smart contracts' source codes have been validated by EtherScan, and each contract comes with its own associated software metrics as computed by the freely available software PASO. Moreover, Smart Corpus can be easily extended as the number of new smart contracts increases day by day.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Pournaras:2020:PWP, author = "Evangelos Pournaras", title = "Proof of witness presence: Blockchain consensus for augmented democracy in smart cities", journal = j-J-PAR-DIST-COMP, volume = "145", number = "??", pages = "160--175", month = nov, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.06.015", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520303282", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Prybila:2020:RVB, author = "Christoph Prybila and Stefan Schulte and Christoph Hochreiner and Ingo Weber", title = "Runtime verification for business processes utilizing the {Bitcoin} blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "816--831", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.024", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1731837X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Qin:2020:CDP, author = "Bo Qin and Jikun Huang and Qin Wang and Xizhao Luo and Bin Liang and Wenchang Shi", title = "{Cecoin}: a decentralized {PKI} mitigating {MitM} attacks", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "805--815", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.025", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318381", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Rahman:2020:BBA, author = "Mohsin Ur Rahman and Barbara Guidi and Fabrizio Baiardi", title = "Blockchain-based access control management for Decentralized Online Social Networks", journal = j-J-PAR-DIST-COMP, volume = "144", number = "??", pages = "41--54", month = oct, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.05.011", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520302902", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Raju:2020:RTP, author = "S. M. Raju and Ali Mohammad Tarif", title = "Real-Time Prediction of {BITCOIN} Price using Machine Learning Techniques and Public Sentiment Analysis", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2006.14473; https://dblp.org/db/journals/corr/corr2006.html#abs-2006-14473", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2006-14473", dblp-mdate = "2021-01-23", } @Article{Ruan:2020:RES, author = "Pingcheng Ruan and Tien Tuan Anh Dinh and Qian Lin and Meihui Zhang and Gang Chen and Beng Chin Ooi", title = "Revealing Every Story of Data in Blockchain Systems", journal = j-SIGMOD, volume = "49", number = "1", pages = "70--77", month = sep, year = "2020", CODEN = "SRECD8", DOI = "https://doi.org/10.1145/3422648.3422665", ISSN = "0163-5808 (print), 1943-5835 (electronic)", ISSN-L = "0163-5808", bibdate = "Sun Sep 6 17:50:43 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmod.bib", URL = "https://dl.acm.org/doi/10.1145/3422648.3422665", abstract = "The success of Bitcoin and other cryptocurrencies bring enormous interest to blockchains. A blockchain system implements a tamper-evident ledger for recording transactions that modify some global states. The system captures the entire evolution history of the states. The management of that history, also known as data provenance or lineage, has been studied extensively in database systems. However, querying data history in existing blockchains can only be done by replaying all transactions. This approach is feasible for large-scale, offline analysis, but is not suitable for online transaction processing.\par We present LineageChain, a fine-grained, secure, and efficient provenance system for blockchains. LineageChain exposes provenance information to smart contracts via simple interfaces, thereby enabling a new class of blockchain applications whose execution logics depend on provenance information at runtime. LineageChain captures provenance during contract execution and stores it in a Merkle tree. LineageChain provides a novel skip list index that supports efficient provenance queries. We have implemented LineageChain on top of Hyperledger Fabric and a blockchain-optimized storage system called ForkBase. We conduct extensive evaluation, demonstrating benefits of LineageChain, its efficient querying, and its small storage overhead.", acknowledgement = ack-nhfb, fjournal = "SIGMOD Record (ACM Special Interest Group on Management of Data)", journal-URL = "https://dl.acm.org/loi/sigmod", } @Article{Ruan:2020:URP, author = "Na Ruan and Dongli Zhou and Weijia Jia", title = "{Ursa}: Robust Performance for {Nakamoto} Consensus with Self-adaptive Throughput", journal = j-TOIT, volume = "20", number = "4", pages = "41:1--41:26", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3412341", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Fri Feb 5 18:12:52 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3412341", abstract = "With the increasing number of users in blockchain-based cryptocurrencies, the public has raised the demand for transaction throughput, and many protocols are designed to improve the throughput following the Nakamoto consensus. Although astonishing \ldots{}", acknowledgement = ack-nhfb, articleno = "41", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Ruoti:2020:BTW, author = "Scott Ruoti and Ben Kaiser and Arkady Yerukhimovich and Jeremy Clark and Robert Cunningham", title = "Blockchain technology: what is it good for?", journal = j-CACM, volume = "63", number = "1", pages = "46--53", month = jan, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3369752", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Jan 2 16:41:05 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3369752", abstract = "Industry's dreams and fears for this new technology.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Sahay:2020:NBB, author = "Rashmi Sahay and G. Geethakumari and Barsha Mitra", title = "A novel blockchain based framework to secure {IoT--LLNs} against routing attacks", journal = j-COMPUTING, volume = "102", number = "11", pages = "2445--2470", month = nov, year = "2020", CODEN = "CMPTA2", DOI = "https://doi.org/10.1007/s00607-020-00823-8", ISSN = "0010-485X (print), 1436-5057 (electronic)", ISSN-L = "0010-485X", bibdate = "Wed Mar 31 15:46:37 MDT 2021", bibsource = "http://link.springer.com/journal/607/102/11; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computing.bib", acknowledgement = ack-nhfb, fjournal = "Computing", journal-URL = "http://link.springer.com/journal/607", } @Article{Sajid:2020:SCR, author = "Adnan Sajid and Bilal Khalid and Mudassar Ali and Shahid Mumtaz and Usman Masud and Farhan Qamar", title = "Securing Cognitive Radio Networks using blockchains", journal = j-FUT-GEN-COMP-SYS, volume = "108", number = "??", pages = "816--826", month = jul, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.03.020", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:16 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19315997", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Sandner:2020:RCI, author = "Philipp Sandner and Anna Lange and Philipp Schulden", title = "The Role of the {CFO} of an Industrial Company: An Analysis of the Impact of Blockchain Technology", journal = j-FUTURE-INTERNET, volume = "12", number = "8", pages = "128", day = "30", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12080128", ISSN = "1999-5903", bibdate = "Fri Aug 28 12:33:08 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/8/128", abstract = "This qualitative multiple case study explores the influence of blockchain technology on the chief financial officer (CFO) of an industrial company. Due to the advancing digitalization of business sectors and increasing competitive pressures, industrial companies are forced to promote their own digital transformation to sustain on the market. Here, the literature regards the CFO as a key corporate function to induce digitization initiatives within organizations. The blockchain technology, due to its features of transparency, immutability and cryptography combined with its ability to coordinate data flows of e.g., the Internet of Things (IoT) or Artificial Intelligence (AI), constitutes a suitable instrument for the CFO to meet the requirements of Industry 4.0. This paper provides a contribution to address existing research gaps regarding the application side of blockchain technology. Thus, the objective of this work is to provide corporate financial functions, such as the CFO of an industrial company, with an understanding of the extent to which blockchain technology can be used for the role-specific responsibilities. Therefore, the underlying qualitative study explores the influence of blockchain technology on the CFO-function of an industrial company. Thus, intending to address a research gap on the application side, it asks (1) What is the impact of blockchain technology on the financial as well strategic role of the CFO? (2) What is the impact of blockchain technology in convergence with the Machine Economy on the key performance indicators (KPIs) of the CFO? (3) What is the impact of blockchain-enabled integrated business ecosystems on the role of the CFO? Based on a review of literature, semi-structured expert interviews were conducted with 23 participants. Analysis of the responses demonstrated a considerable impact of blockchain technology on the CFO-function. The results indicate improvements of business processes in regard to efficiency and automation, a relocation of the CFO's strategic role, improvements of CFO-relevant KPIs through integrating machines into payment networks as well as the emergence of integrated business ecosystems facilitating new forms of inter-organizational collaboration. Necessary prerequisites for adoption include digital competences of the CFO, appropriate organizational structures, digital currencies and identities on the blockchain, a change of the competitive mindset as well as standardized platforms with a neutral governance.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Selected Papers from the 3rd Annual Decentralized Conference (DECENTRALIZED 2019).", } @Article{Sattath:2020:IQB, author = "Or Sattath", title = "On the insecurity of quantum {Bitcoin} mining", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "291--302", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-020-00493-9", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-020-00493-9", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Saxena:2020:PBC, author = "Neetesh Saxena and Ieuan Thomas and Prosante Gope and Pete Burnap and Neeraj Kumar", title = "{PharmaCrypt}: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs", journal = j-COMPUTER, volume = "53", number = "7", pages = "29--44", month = jul, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.2989238", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jul 16 15:14:43 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Seifert:2020:DIS, author = "Ren{\'e} Seifert", title = "Digital identities --- self-sovereignty and blockchain are the keys to success", journal = j-NETWORK-SECURITY, volume = "2020", number = "11", pages = "17--19", month = nov, year = "2020", CODEN = "NTSCF5", ISSN = "1353-4858 (print), 1872-9371 (electronic)", ISSN-L = "1353-4858", bibdate = "Tue Mar 30 10:58:11 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/network-security.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1353485820301318", acknowledgement = ack-nhfb, fjournal = "Network Security", journal-URL = "https://www.sciencedirect.com/journal/network-security", } @Article{Sengupta:2020:CSA, author = "Jayasree Sengupta and Sushmita Ruj and Sipra Das Bit", title = "A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for {IoT} and {IIoT}", journal = j-J-NETW-COMPUT-APPL, volume = "149", number = "??", pages = "??--??", day = "1", month = jan, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2019.102481", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:31 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519303418", acknowledgement = ack-nhfb, articleno = "102481", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Setty:2020:VSM, author = "Srinath Setty and Sebastian Angel and Jonathan Lee", title = "Verifiable state machines: Proofs that untrusted services operate correctly", journal = j-OPER-SYS-REV, volume = "54", number = "1", pages = "40--46", month = aug, year = "2020", CODEN = "OSRED8", DOI = "https://doi.org/10.1145/3421473.3421479", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Tue Sep 1 12:58:05 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/opersysrev.bib", URL = "https://dl.acm.org/doi/10.1145/3421473.3421479", abstract = "This article describes recent progress in realizing verifiable state machines, a primitive that enables untrusted services to provide cryptographic proofs that they operate correctly. Applications of this primitive range from proving the correct operation of distributed and concurrent cloud services to reducing blockchain transaction costs by leveraging inexpensive off-chain computation without trust.", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", journal-URL = "https://dl.acm.org/loi/sigops", } @Article{Shahid:2020:SDS, author = "Furqan Shahid and Abid Khan", title = "{Smart Digital Signatures (SDS)}: a post-quantum digital signature scheme for distributed ledgers", journal = j-FUT-GEN-COMP-SYS, volume = "111", number = "??", pages = "241--253", month = oct, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.04.042", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:21 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19319892", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Shao:2020:ADT, author = "Wei Shao and Chunfu Jia and Yunkai Xu and Kefan Qiu and Yan Gao and Yituo He", title = "{AttriChain}: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain", journal = j-COMPUT-SECUR, volume = "99", number = "??", pages = "Article 102069", month = dec, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102069", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:07 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820303424", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sharma:2020:BTC, author = "Pratima Sharma and Rajni Jindal and Malaya Dutta Borah", title = "Blockchain Technology for Cloud Storage: a Systematic Literature Review", journal = j-COMP-SURV, volume = "53", number = "4", pages = "89:1--89:32", month = sep, year = "2020", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3403954", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sun Sep 27 07:06:06 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3403954", abstract = "The demand for Blockchain innovation and the significance of its application has inspired ever-progressing exploration in various scientific and practical areas. Even though it is still in the initial testing stage, the blockchain is being viewed as a progressive solution to address present-day technology concerns, such as decentralization, identity, trust, character, ownership of data, and information-driven choices. Simultaneously, the world is facing an increase in the diversity and quantity of digital information produced by machines and users. While effectively looking for the ideal approach to storing and processing cloud data, the blockchain innovation provides significant inputs. This article reviews the application of blockchain technology for securing cloud storage.", acknowledgement = ack-nhfb, articleno = "89", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Shi:2020:ABE, author = "Shuyun Shi and Debiao He and Li Li and Neeraj Kumar and Muhammad Khurram Khan and Kim-Kwang Raymond Choo", title = "Applications of blockchain in ensuring the security and privacy of electronic health record systems: a survey", journal = j-COMPUT-SECUR, volume = "97", number = "??", pages = "Article 101966", month = oct, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.101966", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:06 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S016740482030239X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Silvano:2020:ITC, author = "Wellington Fernandes Silvano and Roderval Marcelino", title = "{Iota Tangle}: a cryptocurrency to communicate {Internet-of-Things} data", journal = j-FUT-GEN-COMP-SYS, volume = "112", number = "??", pages = "307--319", month = nov, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.05.047", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19329048", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Singh:2020:BBE, author = "Sushil Kumar Singh and Shailendra Rathore and Jong Hyuk Park", title = "{BlockIoTIntelligence}: a Blockchain-enabled Intelligent {IoT} Architecture with Artificial Intelligence", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "721--743", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.002", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19316474", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Singh:2020:BFB, author = "Parminder Singh and Anand Nayyar and Avinash Kaur and Uttam Ghosh", title = "Blockchain and Fog Based Architecture for {Internet of Everything} in Smart Cities", journal = j-FUTURE-INTERNET, volume = "12", number = "4", pages = "61", day = "26", month = mar, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12040061", ISSN = "1999-5903", bibdate = "Thu May 28 15:16:57 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/4/61", abstract = "Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities' applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time response applications. There are various frameworks in real-world to support the IoE in smart-cities but they face the issues like security, platform Independence, multi-application assistance, and resource management. This article is motivated from the Blockchain and Fog computing technologies and presents a secured architecture Blockchain and Fog-based Architecture Network (BFAN) for IoE applications in the smart cities. The proposed architecture secures sensitive data with encryption, authentication, and Blockchain. It assists the System-developers and Architects to deploy the applications in smart city paradigm. The goal of the proposed architecture is to reduce the latency and energy, and ensure improved security features through Blockchain technology. The simulation results demonstrate that the proposed architecture performs better than the existing frameworks for smart-cities.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Special Issue on Cyber Physical Systems: Prospects, Challenges, and Role in Software Defined Networking and Blockchain.", } @Article{Singh:2020:BSC, author = "Amritraj Singh and Reza M. Parizi and Qi Zhang and Kim-Kwang Raymond Choo and Ali Dehghantanha", title = "Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities", journal = j-COMPUT-SECUR, volume = "88", number = "??", pages = "Article 101654", month = jan, year = "2020", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Mar 14 18:49:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404818310927", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Singh:2020:CGV, author = "M. P. Singh and A. K. Chopra", title = "Computational Governance and Violable Contracts for Blockchain Applications", journal = j-COMPUTER, volume = "53", number = "1", pages = "53--62", month = jan, year = "2020", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2019.2947372", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Jan 22 06:53:36 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "Autonomous systems; Blockchain; Computer architecture; Contracts; Socio-technical systems", } @Article{Singh:2020:RRE, author = "Irish Singh and Seok-Won Lee", title = "{RE\_BBC}: Requirements Engineering in a Blockchain-Based Cloud System: Its Role in Service-Level Agreement Specification", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "7--12", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.3000579", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Singh:2020:STB, author = "Amritraj Singh and Kelly Click and Reza M. Parizi and Qi Zhang and Ali Dehghantanha and Kim-Kwang Raymond Choo", title = "Sidechain technologies in blockchain networks: an examination and state-of-the-art review", journal = j-J-NETW-COMPUT-APPL, volume = "149", number = "??", pages = "??--??", day = "1", month = jan, year = "2020", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2019.102471", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:31 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804519303315", acknowledgement = ack-nhfb, articleno = "102471", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Song:2020:CBM, author = "Yo-Der Song and Tomaso Aste", title = "The cost of Bitcoin mining has never really increased", journal = "CoRR", volume = "abs/2004.04605", number = "??", pages = "??--??", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2004.04605; https://dblp.org/db/journals/corr/corr2004.html#abs-2004-04605", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2004-04605", dblp-mdate = "2020-04-14", } @Article{Stockton:2020:CTB, author = "N. Stockton", title = "{China} takes blockchain national: The state-sponsored platform will launch in 100 cities", journal = j-IEEE-SPECTRUM, volume = "57", number = "4", pages = "11--12", year = "2020", CODEN = "IEESAM", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Tue Apr 21 09:16:38 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Article{Strehle:2020:DOR, author = "Elias Strehle and Fred Steinmetz", title = "Dominating {OP} Returns: The Impact of {Omni} and {Veriblock} on Bitcoin", journal = j-J-GRID-COMP, volume = "18", number = "4", pages = "575--592", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10723-020-09537-9", ISSN = "????", ISSN-L = "1570-7873", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/grid/grid18.html#StrehleS20", acknowledgement = ack-nhfb, dblp-key = "journals/grid/StrehleS20", dblp-mdate = "2022-10-02", fjournal = "Journal of Grid Computing", journal-URL = "http://link.springer.com/journal/10723", } @Article{Sutra:2020:CEP, author = "Pierre Sutra", title = "On the correctness of {Egalitarian Paxos}", journal = j-INFO-PROC-LETT, volume = "156", number = "??", pages = "Article 105901", month = apr, year = "2020", CODEN = "IFPLAT", DOI = "https://doi.org/10.1016/j.ipl.2019.105901", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Mar 24 11:59:23 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/infoproc2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S002001901930184X", acknowledgement = ack-nhfb, fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", } @Article{Talamo:2020:BBP, author = "Maurizio Talamo and Franco Arcieri and Andrea Dimitri and Christian H. Schunck", title = "A Blockchain based {PKI} Validation System based on Rare Events Management", journal = j-FUTURE-INTERNET, volume = "12", number = "2", pages = "40", day = "14", month = feb, year = "2020", CODEN = "????", DOI = "https://doi.org/10.3390/fi12020040", ISSN = "1999-5903", bibdate = "Mon Mar 2 12:22:42 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/12/2/40", abstract = "Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is an infrastructure based on a hierarchical model, but the use of PKIs in non-hierarchical contexts has exposed them to many types of attacks. Here, we discuss weaknesses exploited in past attacks and we propose a solution based on an original consensus algorithm developed for use on blockchain technology. In this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining fast consensus. The main properties of the solution are that a consensus may be reached even when not all members of the involved PKI participate in a transaction, and that no advanced trust agreement among PKIs is needed. The proposed solution is able to detect PKI attacks and can distinguish errors from attacks, allowing precise management of anomalies.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Blockchain: Current Challenges and Future Prospects/Applications.", } @Article{Tang:2020:PUT, author = "Weizhao Tang and Weina Wang and Giulia Fanti and Sewoong Oh", title = "Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks", journal = j-POMACS, volume = "4", number = "2", pages = "29:1--29:39", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3392147", ISSN = "2476-1249", ISSN-L = "2476-1249", bibdate = "Mon Mar 29 10:31:35 MDT 2021", bibsource = "http://portal.acm.org/https://www.math.utah.edu/pub/tex/bib/pomacs.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dl.acm.org/doi/10.1145/3392147", abstract = "Payment channel networks (PCNs) are viewed as one of the most promising scalability solutions for cryptocurrencies today. Roughly, PCNs are networks where each node represents a user and each directed, weighted edge represents funds escrowed on a blockchain; these funds can be transacted only between the endpoints of the edge. Users efficiently transmit funds from node A to B by relaying them over a path connecting A to B, as long as each edge in the path contains enough balance (escrowed funds) to support the transaction. Whenever a transaction succeeds, the edge weights are updated accordingly. In deployed PCNs, channel balances (i.e., edge weights) are not revealed to users for privacy reasons; users know only the initial weights at time 0. Hence, when routing transactions, users typically first guess a path, then check if it supports the transaction. This guess-and-check process dramatically reduces the success rate of transactions. At the other extreme, knowing full channel balances can give substantial improvements in transaction success rate at the expense of privacy. In this work, we ask whether a network can reveal noisy channel balances to trade off privacy for utility. We show fundamental limits on such a tradeoff, and propose noise mechanisms that achieve the fundamental limit for a general class of graph topologies. Our results suggest that in practice, PCNs should operate either in the low-privacy or low-utility regime; it is not possible to get large gains in utility by giving up a little privacy, or large gains in privacy by sacrificing a little utility.", acknowledgement = ack-nhfb, articleno = "29", fjournal = "Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)", journal-URL = "https://dl.acm.org/loi/pomacs", } @Article{Taylor:2020:ACS, author = "Michael Bedford Taylor and Luis Vega and Moein Khazraee and Ikuo Magaki and Scott Davidson and Dustin Richmond", title = "{ASIC} clouds: specializing the datacenter for planet-scale applications", journal = j-CACM, volume = "63", number = "7", pages = "103--109", month = jul, year = "2020", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3399734", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jun 22 06:05:31 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3399734", abstract = "Planet-scale applications are driving the exponential growth of the Cloud, and datacenter specialization is the key enabler of this trend. GPU- and FPGA-based clouds have already been deployed to accelerate compute-intensive workloads. ASIC-based clouds are a natural evolution as cloud services expand across the planet. ASIC Clouds are purpose-built datacenters comprised of large arrays of ASIC accelerators that optimize the total cost of ownership (TCO) of large, high-volume scale-out computations. On the surface, ASIC Clouds may seem improbable due to high NREs and ASIC inflexibility, but large-scale ASIC Clouds have already been deployed for the Bitcoin cryptocurrency system. This paper distills lessons from these Bitcoin ASIC Clouds and applies them to other large scale workloads such as YouTube-style video-transcoding and Deep Learning, showing superior TCO versus CPU and GPU. It derives Pareto-optimal ASIC Cloud servers based on accelerator properties, by jointly optimizing ASIC architecture, DRAM, motherboard, power delivery, cooling, and operating voltage. Finally, the authors examine the impact of ASIC NRE and when it makes sense to build an ASIC Cloud.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Tomar:2020:MTV, author = "Ravi Tomar and Sarishma", title = "Maintaining Trust in {VANETs} using Blockchain", journal = j-SIGADA-LETTERS, volume = "40", number = "1", pages = "91--96", month = oct, year = "2020", CODEN = "AALEE5", DOI = "https://doi.org/10.1145/3431235.3431244", ISSN = "1094-3641 (print), 1557-9476 (electronic)", ISSN-L = "0736-721X", bibdate = "Thu Mar 11 06:32:11 MST 2021", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigada.bib", URL = "https://dl.acm.org/doi/10.1145/3431235.3431244", abstract = "Vehicular ad-hoc networks are networks formed by fast moving vehicles which come in contact momentarily and exchange information. Since it's an ad-hoc network, it becomes difficult to maintain trust, security and authenticity of information being exchanged in the network. In this paper, we leverage the concepts of blockchain to maintain trust in the network. Since blockchain provides a tamper-proof, decentralized mechanism to store data, we use it to store information related to events such as collision, accident, SOS etc. The information stored on blockchain can be used to validate it at later points of time so as to minimize the false benefit cases by use of Proof of Location certificates. The proposed system has the potential to increase the trust of end users in VANETs. It can also be integrated into the design of future vehicles because of its ease of implementation. The paper also discusses the benefits and constraints of the proposed model along with the related future work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGADA Ada Letters", journal-URL = "http://portal.acm.org/citation.cfm?id=J32", } @Article{vanOorschot:2020:BST, author = "P. C. {van Oorschot}", title = "Blockchains and Stealth Tactics for Teaching Security", journal = j-IEEE-SEC-PRIV, volume = "18", number = "5", pages = "3--5", month = sep # "\slash " # oct, year = "2020", DOI = "https://doi.org/10.1109/MSEC.2020.3004974", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Fri Feb 5 14:25:50 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "https://publications.computer.org/security-and-privacy/", } @Book{vanOorschot:2020:CSI, author = "Paul C. van Oorschot", title = "Computer Security and the {Internet}: Tools and Jewels", publisher = "Springer", address = "Cham, Switzerland", pages = "xxi + 365", year = "2020", DOI = "https://doi.org/10.1007/978-3-030-33649-3", ISBN = "3-030-33648-4 (hardcover), 3-030-33649-2 (e-book), 3-030-33650-6", ISBN-13 = "978-3-030-33648-6 (hardcover), 978-3-030-33649-3 (e-book), 978-3-030-33650-9 (print)", LCCN = "QA76.9.A25", bibdate = "Thu Jul 15 06:50:48 MDT 2021", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", series = "Information Security and Cryptography Series", URL = "https://people.scs.carleton.ca/~paulv/toolsjewels.html", abstract = "This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security --- including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is ``elementary'' in that it assumes no background in security, but unlike ``soft'' high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.", acknowledgement = ack-nhfb, remark = "Description based upon print version of record. 5.1 Memory protection, supervisor mode, and accountability.", shorttableofcontents = "1: Basic Concepts and Principles \\ 2: Cryptographic Building Blocks \\ 3: User Authentication: Passwords, Biometrics and Alternatives \\ 4: Authentication Protocols and Key Establishment \\ 5: Operating System Security and Access Control \\ 6: Software Security: Exploits and Privilege Escalation \\ 7: Malicious Software \\ 8: Public-Key Certificate Management and Use Cases \\ 9: Web and Browser Security \\ 10: Firewalls and Tunnels \\ 11: Intrusion Detection and Network-Based Attacks \\ 12: Wireless LAN Security: 802.11 and Wi-Fi \\ 13: Bitcoin, Blockchains and Ethereum \\ Epilogue \\ Index", subject = "Computer security; Internet; Security measures; Computer security.; Security measures.", tableofcontents = "Intro \\ Contents in Brief \\ Table of Contents \\ Foreword \\ Preface \\ Why this book, approach and target audience \\ Selection of topics \\ Framework and systematization \\ Length, prioritization and optional sections \\ Order of chapters, and relationships between them \\ Cryptography vs. security course \\ Helpful background \\ Trendy topics vs. foundational concepts \\ Acknowledgements \\ Typesetting Conventions \\ 1: Basic Concepts and Principles \\ 1.1 Fundamental goals of computer security \\ 1.2 Computer security policies and attacks \\ 1.3 Risk, risk assessment, and modeling expected losses \\ 1.4 Adversary modeling and security analysis \\ 1.5 Threat modeling: diagrams, trees, lists and STRIDE \\ 1.5.1 Diagram-driven threat modeling \\ 1.5.2 Attack trees for threat modeling \\ 1.5.3 Other threat modeling approaches: checklists and STRIDE \\ 1.6 Model-reality gaps and real-world outcomes \\ 1.6.1 Threat modeling and model-reality gaps \\ 1.6.2 Tying security policy back to real outcomes and security analysis \\ 1.7 Design principles for computer security \\ 1.8 Why computer security is hard \\ 1.9 End notes and further reading \\ References \\ 2: Cryptographic Building Blocks \\ 2.1 Encryption and decryption (generic concepts) \\ 2.2 Symmetric-key encryption and decryption \\ 2.3 Public-key encryption and decryption \\ 2.4 Digital signatures and verification using public keys \\ 2.5 Cryptographic hash functions \\ 2.6 Message authentication (data origin authentication) \\ 2.7 Authenticated encryption and further modes of operation \\ 2.8 Certificates, elliptic curves, and equivalent keylengths \\ 2.9 End notes and further reading \\ References \\ 3: User Authentication-Passwords, Biometrics and Alternatives \\ 3.1 Password authentication \\ 3.2 Password-guessing strategies and defenses \\ 3.3 Account recovery and secret questions \\ 3.4 One-time password generators and hardware tokens \\ 3.5 Biometric authentication \\ 3.6 Password managers and graphical passwords \\ 3.7 CAPTCHAs (humans-in-the-loop) vs. automated attacks \\ 3.8 Entropy, passwords, and partial-guessing metrics \\ 3.9 End notes and further reading \\ References \\ 4: Authentication Protocols and Key Establishment \\ 4.1 Entity authentication and key establishment (context) \\ 4.2 Authentication protocols: concepts and mistakes \\ 4.3 Establishing shared keys by public agreement (DH) \\ 4.4 Key authentication properties and goals \\ 4.5 Password-authenticated key exchange: EKE and SPEKE \\ 4.6 Weak secrets and forward search in authentication \\ 4.7 Single sign-on (SSO) and federated identity systems \\ 4.8 Cyclic groups and subgroup attacks on Diffie--Hellman \\ 4.9 End notes and further reading \\ References \\ 5: Operating System Security and Access Control \\ \ldots{}", } @Article{Velasco:2020:NDL, author = "Carlos Velasco and Ricardo Colomo-Palacios and Ramon Cano", title = "Neural Distributed Ledger", journal = j-IEEE-SOFTWARE, volume = "37", number = "5", pages = "43--48", month = sep # "\slash " # oct, year = "2020", CODEN = "IESOEG", DOI = "https://doi.org/10.1109/MS.2020.2993370", ISSN = "0740-7459 (print), 1937-4194 (electronic)", ISSN-L = "0740-7459", bibdate = "Thu May 27 17:14:52 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Software", journal-URL = "http://www.computer.org/portal/web/csdl/magazines/software", } @Article{Vizier:2020:CBB, author = "Guillaume Vizier and Vincent Gramoli", title = "{ComChain}: a blockchain with {Byzantine} fault-tolerant reconfiguration", journal = j-CCPE, volume = "32", number = "12", pages = "e5494:1--e5494:??", day = "25", month = jun, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5494", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "23 October 2019", } @Article{Wang:2020:BBD, author = "Hao Wang and Shenglan Ma and Hong-Ning Dai and Muhammad Imran and Tongsen Wang", title = "Blockchain-based data privacy management with {Nudge} theory in open banking", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "812--823", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.010", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X18322702", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:BBE, author = "Junchao Wang and Kaining Han and Anastasios Alexandridis and Zhiyu Chen and Zeljko Zilic and Yu Pang and Gwanggil Jeon and Francesco Piccialli", title = "A blockchain-based {eHealthcare} system interoperating with {WBANs}", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "675--685", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.049", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19321247", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:DVP, author = "Huaqun Wang and Debiao He and Yimu Ji", title = "Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "854--862", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.06.028", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1731350X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:ESW, author = "Qin Wang and Haitao Zhao and Qianqian Wang and Haotong Cao and Gagangeet Singh Aujla and Hongbo Zhu", title = "Enabling secure wireless multimedia resource pricing using consortium blockchains", journal = j-FUT-GEN-COMP-SYS, volume = "110", number = "??", pages = "696--707", month = sep, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.026", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:19 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19315791", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:EWR, author = "Ziyu Wang and Hui Yu and Zongyang Zhang and Jiaming Piao and Jianwei Liu", title = "{ECDSA} weak randomness in Bitcoin", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "507--513", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.08.034", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17330030", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:GBE, author = "Ziyu Wang and Nanqing Luo and Pan Zhou", title = "{GuardHealth}: Blockchain empowered secure data management and Graph Convolutional Network enabled anomaly detection in smart healthcare", journal = j-J-PAR-DIST-COMP, volume = "142", number = "??", pages = "1--12", month = aug, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.03.004", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731519308470", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Wang:2020:PRI, author = "Eric Ke Wang and Zuodong Liang and Chien-Ming Chen and Saru Kumari and Muhammad Khurram Khan", title = "{PoRX}: a reputation incentive scheme for blockchain consensus of {IIoT}", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "140--151", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.08.005", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19310581", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:PTP, author = "Qin Wang and Bo Qin and Jiankun Hu and Fu Xiao", title = "Preserving transaction privacy in bitcoin", journal = j-FUT-GEN-COMP-SYS, volume = "107", number = "??", pages = "793--804", month = jun, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2017.08.026", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:14 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17318393", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2020:PXR, author = "Eric Ke Wang and RuiPei Sun and Chien-Ming Chen and Zuodong Liang and Saru Kumari and Muhammad Khurram Khan", title = "Proof of {X}-repute blockchain consensus protocol for {IoT} systems", journal = j-COMPUT-SECUR, volume = "95", number = "??", pages = "Article 101871", month = aug, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.101871", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:04 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820301449", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wei:2020:BDB, author = "PengCheng Wei and Dahu Wang and Yu Zhao and Sumarga Kumar Sah Tyagi and Neeraj Kumar", title = "Blockchain data-based cloud data integrity protection mechanism", journal = j-FUT-GEN-COMP-SYS, volume = "102", number = "??", pages = "902--911", month = jan, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2019.09.028", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Feb 10 12:55:04 MST 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19313494", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wingreen:2020:SCV, author = "Stephen C. Wingreen and Donncha Kavanagh and Paul John Ennis and Gianluca Miscione", title = "Sources of Cryptocurrency Value Systems: The Case of Bitcoin", journal = "Int. J. Electron. Commer.", volume = "24", number = "4", pages = "474--496", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1080/10864415.2020.1806469", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijecommerce/ijecommerce24.html#WingreenKEM20", acknowledgement = ack-nhfb, dblp-key = "journals/ijecommerce/WingreenKEM20", dblp-mdate = "2021-06-04", } @Article{Wu:2020:CVM, author = "Keke Wu and Bo Peng and Hua Xie and Shaobin Zhan", title = "A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and {Ethereum} Networks", journal = "Int. J. Netw. Secur.", volume = "22", number = "2", pages = "191--200", month = "????", year = "2020", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://ijns.jalaxy.com.tw/contents/ijns-v22-n2/ijns-2020-v22-n2-p191-200.pdf; https://dblp.org/db/journals/ijnsec/ijnsec22.html#WuPXZ20", acknowledgement = ack-nhfb, dblp-key = "journals/ijnsec/WuPXZ20", dblp-mdate = "2021-01-04", } @Article{Xie:2020:BFI, author = "Meihua Xie and Haiyan Li and Yuanjun Zhao", title = "Blockchain financial investment based on deep learning network algorithm", journal = j-J-COMPUT-APPL-MATH, volume = "372", number = "??", pages = "Article 112723", month = jul, year = "2020", CODEN = "JCAMDI", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Wed May 13 06:58:33 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0377042720300145", acknowledgement = ack-nhfb, fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Xu:2020:ESD, author = "Guangquan Xu and Bingjiang Guo and Chunhua Su and Xi Zheng and Kaitai Liang and Duncan S. Wong and Hao Wang", title = "Am {I} eclipsed? {A} smart detector of eclipse attacks for {Ethereum}", journal = j-COMPUT-SECUR, volume = "88", number = "??", pages = "Article 101604", month = jan, year = "2020", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Tue Oct 22 14:36:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313798", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Xu:2020:FAN, author = "Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos", title = "A flexible $ n / 2 $ adversary node resistant and halting recoverable blockchain sharding protocol", journal = j-CCPE, volume = "32", number = "19", pages = "e5773:1--e5773:??", day = "10", month = oct, year = "2020", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5773", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Mar 31 07:52:20 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "14 April 2020", } @Article{Yang:2020:ABS, author = "Runkai Yang and Xiaolin Chang and Jelena Misi{\'c} and Vojislav B. Misi{\'c}", title = "Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views", journal = j-COMPUT-SECUR, volume = "97", number = "??", pages = "Article 101956", month = oct, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.101956", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:06 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820302327", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Yang:2020:BVP, author = "Xuechao Yang and Xun Yi and Surya Nepal and Andrei Kelarev and Fengling Han", title = "Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities", journal = j-FUT-GEN-COMP-SYS, volume = "112", number = "??", pages = "859--874", month = nov, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.06.051", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X17327656", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Yang:2020:ZKP, author = "Xiaohui Yang and Wenjie Li", title = "A zero-knowledge-proof-based digital identity management scheme in blockchain", journal = j-COMPUT-SECUR, volume = "99", number = "??", pages = "Article 102050", month = dec, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102050", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:07 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820303230", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Yazdinejad:2020:PBS, author = "Abbas Yazdinejad and Reza M. Parizi and Ali Dehghantanha and Kim-Kwang Raymond Choo", title = "{P4}-to-blockchain: a secure blockchain-enabled packet parser for software defined networking", journal = j-COMPUT-SECUR, volume = "88", number = "??", pages = "Article 101629", month = jan, year = "2020", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Tue Oct 22 14:36:57 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301762", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Yeh:2020:SIS, author = "Kuo-Hui Yeh and Chunhua Su and Robert H. Deng and Moti Yung and Miroslaw Kutylowski", title = "Special issue on security and privacy of blockchain technologies", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "243--244", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-020-00496-6", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-020-00496-6; http://link.springer.com/content/pdf/10.1007/s10207-020-00496-6.pdf", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Yohan:2020:FSB, author = "Alexander Yohan and Nai-Wei Lo", title = "{FOTB}: a secure blockchain-based firmware update framework for {IoT} environment", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "257--278", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-019-00467-6", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-019-00467-6", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Yu:2020:KDP, author = "Dejian Yu and Libo Sheng", title = "Knowledge diffusion paths of blockchain domain: the main path analysis", journal = j-SCIENTOMETRICS, volume = "125", number = "1", pages = "471--497", month = oct, year = "2020", CODEN = "SCNTDX", DOI = "https://doi.org/10.1007/s11192-020-03650-y", ISSN = "0138-9130 (print), 1588-2861 (electronic)", ISSN-L = "0138-9130", bibdate = "Thu Sep 10 10:52:03 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/scientometrics2020.bib", URL = "http://link.springer.com/article/10.1007/s11192-020-03650-y", acknowledgement = ack-nhfb, fjournal = "Scientometrics", journal-URL = "http://link.springer.com/journal/11192", } @Article{Yu:2020:VBG, author = "Bin Yu and Xiaofeng Li and He Zhao", title = "Virtual Block Group: a Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table", journal = j-COMP-J, volume = "63", number = "10", pages = "1524--1536", month = oct, year = "2020", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/bxaa046", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Mon Oct 19 08:41:03 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2020.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://academic.oup.com/comjnl/article/63/10/1524/5828295", acknowledgement = ack-nhfb, fjournal = "Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Article{Yue:2020:BBV, author = "Dongdong Yue and Ruixuan Li and Yan Zhang and Wenlong Tian and Yongfeng Huang", title = "Blockchain-based verification framework for data integrity in edge-cloud storage", journal = j-J-PAR-DIST-COMP, volume = "146", number = "??", pages = "1--14", month = dec, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.06.007", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520303142", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Yuen:2020:PPA, author = "Tsz Hon Yuen", title = "{PAChain}: Private, authenticated \& auditable consortium blockchain and its implementation", journal = j-FUT-GEN-COMP-SYS, volume = "112", number = "??", pages = "913--929", month = nov, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.05.011", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19328547", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zakhary:2020:ACA, author = "Victor Zakhary and Divyakant Agrawal and Amr {El Abbadi}", title = "Atomic commitment across blockchains", journal = j-PROC-VLDB-ENDOWMENT, volume = "13", number = "9", pages = "1319--1331", month = may, year = "2020", CODEN = "????", DOI = "https://doi.org/10.14778/3397230.3397231", ISSN = "2150-8097", bibdate = "Wed Jul 8 18:23:01 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/abs/10.14778/3397230.3397231", abstract = "The recent adoption of blockchain technologies and open permissionless networks suggest the importance of peer-to-peer atomic cross-chain transaction protocols. Users should be able to atomically exchange tokens and assets without depending on ...$^$", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Zhang:2020:BBB, author = "Junwei Zhang and Zhuzhu Wang and Lei Shang and Di Lu and Jianfeng Ma", title = "{BTNC}: a blockchain based trusted network connection protocol in {IoT}", journal = j-J-PAR-DIST-COMP, volume = "143", number = "??", pages = "1--16", month = sep, year = "2020", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.04.004", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731519308457", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Zhang:2020:CBE, author = "Shufan Zhang and Lili Wang and Hu Xiong", title = "{Chaintegrity}: blockchain-enabled large-scale e-voting system with robustness and universal verifiability", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "323--341", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-019-00465-8", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-019-00465-8", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Zhang:2020:EPC, author = "F. Zhang and W. He and R. Cheng and J. Kos and N. Hynes and N. Johnson and A. Juels and A. Miller and D. Song", title = "The {Ekiden} Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts", journal = j-IEEE-SEC-PRIV, volume = "18", number = "3", pages = "17--27", month = may # "\slash " # jun, year = "2020", DOI = "https://doi.org/10.1109/MSEC.2020.2976984", ISSN = "1558-4046", ISSN-L = "1540-7993", bibdate = "Wed May 27 17:52:17 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "https://publications.computer.org/security-and-privacy/", keywords = "blockchain; cryptography; privacy; smart contracts", } @Article{Zhang:2020:LLD, author = "Wenbo Zhang and Zonglin Wu and Guangjie Han and Yongxin Feng and Lei Shu", title = "{LDC}: a lightweight dada consensus algorithm based on the blockchain for the industrial {Internet of Things} for smart city applications", journal = j-FUT-GEN-COMP-SYS, volume = "108", number = "??", pages = "574--582", month = jul, year = "2020", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.03.009", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 19 07:44:16 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19333503", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zheng:2020:OFB, author = "Haibin Zheng and Qianhong Wu and Jan Xie and Zhenyu Guan and Bo Qin and Zhiqiang Gu", title = "An organization-friendly blockchain system", journal = j-COMPUT-SECUR, volume = "88", number = "??", pages = "Article 101598", month = jan, year = "2020", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.101598", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Mar 14 18:49:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404818314111", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zhou:2020:IFV, author = "Yuanjian Zhou and Yining Liu and Chengshun Jiang and Shulan Wang", title = "An improved {FOO} voting scheme using blockchain", journal = j-INT-J-INFO-SEC, volume = "19", number = "3", pages = "303--310", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-019-00457-8", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue May 19 08:49:45 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-019-00457-8", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Zhou:2020:KCC, author = "Yusheng Zhou and Ying Shan Soh and Hui Shan Loh and Kum Fai Yuen", title = "The key challenges and critical success factors of blockchain implementation: {Policy} implications for {Singapore}'s maritime industry", journal = j-MAR-POLICY, volume = "122", number = "??", pages = "Article 104265", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.marpol.2020.104265", ISSN = "0308-597X (print), 1872-9460 (electronic)", ISSN-L = "0308-597X", bibdate = "Tue Nov 16 11:10:04 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/marpolicy2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0308597X20309118", acknowledgement = ack-nhfb, ajournal = "Mar. Policy", fjournal = "Marine Policy", journal-URL = "https://www.sciencedirect.com/journal/marine-policy", } @Article{Zhu:2020:DSP, author = "Liehuang Zhu and Baokun Zheng and Meng Shen and Feng Gao and Hongyu Li and Kexin Shi", title = "Data Security and Privacy in Bitcoin System: a Survey", journal = "J. Comput. Sci. Technol.", volume = "35", number = "4", pages = "843--862", month = "????", year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s11390-020-9638-7", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jcst/jcst35.html#ZhuZSGLS20", acknowledgement = ack-nhfb, dblp-key = "journals/jcst/ZhuZSGLS20", dblp-mdate = "2020-08-04", } @Article{Abduljabbar:2021:SPS, author = "Tamara Abdulmunim Abduljabbar and Xiaohui Tao and Ji Zhang and Xujuan Zhou and Lin Li and Yi Cai", title = "A Survey of Privacy Solutions using Blockchain for Recommender Systems: Current Status, Classification and Open Issues", journal = j-COMP-J, volume = "64", number = "7", pages = "1104--1129", month = jul, year = "2021", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/bxab065", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Sat Aug 28 14:54:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2020.bib", URL = "http://academic.oup.com/comjnl/article/64/7/1104/6289879", acknowledgement = ack-nhfb, fjournal = "Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Article{Adja:2021:BBC, author = "Yves Christian Elloh Adja and Badis Hammi and Ahmed Serhrouchni and Sherali Zeadally", title = "A blockchain-based certificate revocation management and status verification system", journal = j-COMPUT-SECUR, volume = "104", number = "??", pages = "Article 102209", month = may, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102209", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:10 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S016740482100033X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ali:2021:BBF, author = "Muhammad Salek Ali and Massimo Vecchio and Fabio Antonelli", title = "A Blockchain-Based Framework for {IoT} Data Monetization Services", journal = j-COMP-J, volume = "64", number = "2", pages = "195--210", month = feb, year = "2021", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/bxaa119", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Sun Feb 21 09:05:23 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2020.bib", URL = "http://academic.oup.com/comjnl/article/64/2/195/5911075", acknowledgement = ack-nhfb, fjournal = "Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Article{AlRidhawi:2021:IBM, author = "Ismaeel {Al Ridhawi} and Moayad Aloqaily and Yaser Jararweh", title = "An Incentive-based Mechanism for Volunteer Computing Using Blockchain", journal = j-TOIT, volume = "21", number = "4", pages = "87:1--87:22", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3419104", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Sep 29 06:52:50 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3419104", abstract = "The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their \ldots{}", acknowledgement = ack-nhfb, articleno = "87", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Altarawneh:2021:AAP, author = "Amani Altarawneh and Fei Sun and Richard R. Brooks and Owulakemi Hambolu and Lu Yu and Anthony Skjellum", title = "Availability analysis of a permissioned blockchain with a lightweight consensus protocol", journal = j-COMPUT-SECUR, volume = "102", number = "??", pages = "Article 102098", month = mar, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102098", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:09 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820303710", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Amiet:2021:BVP, author = "Nils Amiet", title = "Blockchain Vulnerabilities in Practice", journal = j-DTRAP, volume = "2", number = "2", pages = "8:1--8:7", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3407230", ISSN = "2692-1626 (print), 2576-5337 (electronic)", ISSN-L = "2576-5337", bibdate = "Tue Mar 30 16:33:10 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/dtrap.bib", URL = "https://dl.acm.org/doi/10.1145/3407230", abstract = "Blockchains are not invulnerable. There are known vulnerabilities in various blockchain ecosystem components. This field note describes some vulnerabilities observed in smart contracts and node software, their exploitation, and how to avoid them, with a \ldots{}", acknowledgement = ack-nhfb, articleno = "8", fjournal = "Digital Threats: Research and Practice (DTRAP)", journal-URL = "https://dl.acm.org/loi/dtrap", } @Article{Aniello:2021:ABT, author = "Leonardo Aniello and Basel Halak and Peter Chai and Riddhi Dhall and Mircea Mihalea and Adrian Wilczynski", title = "{Anti-BlUFf}: towards counterfeit mitigation in {IC} supply chains using blockchain and {PUF}", journal = j-INT-J-INFO-SEC, volume = "20", number = "3", pages = "445--460", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-020-00513-8", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Sat May 29 07:09:27 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-020-00513-8; http://link.springer.com/content/pdf/10.1007/s10207-020-00513-8.pdf", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Anonymous:2021:AMI, author = "Anonymous", title = "Analysis of multi-input multi-output transactions in the {Bitcoin} network", journal = j-CCPE, volume = "33", number = "1", pages = "e5629:1--e5629:??", day = "10", month = jan, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5629", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:19 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "19 December 2019", } @Article{Anonymous:2021:BAB, author = "Anonymous", title = "Blockchain applications beyond the cryptocurrency casino: The Punishment not Reward blockchain architecture", journal = j-CCPE, volume = "33", number = "1", pages = "e5749:1--e5749:??", day = "10", month = jan, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5749", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:19 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "03 April 2020", } @Article{Anonymous:2021:ETT, author = "Anonymous", title = "Ensuring transparency and traceability of food local products: a blockchain application to a {Smart Tourism Region}", journal = j-CCPE, volume = "33", number = "1", pages = "e5857:1--e5857:??", day = "10", month = jan, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5857", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:19 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "15 June 2020", } @Article{Anonymous:2021:IES, author = "Anonymous", title = "Implementation and evaluation of smart contracts using a hybrid on- and off-blockchain architecture", journal = j-CCPE, volume = "33", number = "1", pages = "e5811:1--e5811:??", day = "10", month = jan, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5811", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:19 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "13 May 2020", } @Article{Anonymous:2021:TSR, author = "Anonymous", title = "Trusted systems of records based on Blockchain technology --- a prototype for mileage storing in the automotive industry", journal = j-CCPE, volume = "33", number = "1", pages = "e5630:1--e5630:??", day = "10", month = jan, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5630", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:19 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "19 January 2020", } @Article{Antal:2021:DLT, author = "Claudia Antal", title = "Distributed Ledger Technology Review and Decentralized Applications Development Guidelines", journal = j-FUTURE-INTERNET, volume = "13", number = "3", pages = "62", day = "27", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13030062", ISSN = "1999-5903", bibdate = "Fri Mar 26 12:47:18 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/3/62", abstract = "The Distributed Ledger Technology (DLT) provides an infrastructure for developing decentralized applications with no central authority for registering, sharing, and synchronizing transactions on digital assets. In the last years, it has drawn high interest from the academic community, technology developers, and startups mostly by the advent of its most popular type, blockchain technology. In this paper, we provide a comprehensive overview of DLT analyzing the challenges, provided solutions or alternatives, and their usage for developing decentralized applications. We define a three-tier based architecture for DLT applications to systematically classify the technology solutions described in over 100 papers and startup initiatives. Protocol and Network Tier contains solutions for digital assets registration, transactions, data structure, and privacy and business rules implementation and the creation of peer-to-peer networks, ledger replication, and consensus-based state validation. Scalability and Interoperability Tier solutions address the scalability and interoperability issues with a focus on blockchain technology, where they manifest most often, slowing down its large-scale adoption. The paper closes with a discussion on challenges and opportunities for developing decentralized applications by providing a multi-step guideline for decentralizing the design and implementation of traditional systems.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Aras:2021:SHG, author = "Serkan Aras", title = "Stacking hybrid {GARCH} models for forecasting Bitcoin volatility", journal = j-EXPERT-SYST-APPL, volume = "174", number = "??", pages = "114747", month = "????", year = "2021", CODEN = "ESAPEH", DOI = "https://doi.org/10.1016/j.eswa.2021.114747", ISSN = "????", ISSN-L = "0957-4174", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/eswa/eswa174.html#Aras21", acknowledgement = ack-nhfb, dblp-key = "journals/eswa/Aras21", dblp-mdate = "2021-06-01", fjournal = "Expert Systems with Applications", journal-URL = "http://www.sciencedirect.com/science/journal/09574174", } @Article{Ardagna:2021:TDT, author = "Claudio A. Ardagna and Rasool Asal and Ernesto Damiani and Nabil {El Ioini} and Mehdi Elahi and Claus Pahl", title = "From Trustworthy Data to Trustworthy {IoT}: a Data Collection Methodology Based on Blockchain", journal = j-TCPS, volume = "5", number = "1", pages = "11:1--11:26", month = jan, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3418686", ISSN = "2378-962X (print), 2378-9638 (electronic)", ISSN-L = "2378-962X", bibdate = "Sun Mar 28 07:37:45 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tcps.bib", URL = "https://dl.acm.org/doi/10.1145/3418686", abstract = "Internet of Things (IoT) is composed of physical devices, communication networks, and services provided by edge systems and over-the-top applications. IoT connects billions of devices that collect data from the physical environment, which are pre-processed at the edge and then forwarded to processing services at the core of the infrastructure, on top of which cloud-based applications are built and provided to mobile end users. IoT comes with important advantages in terms of applications and added value for its users, making their world smarter and simpler. These advantages, however, are mitigated by the difficulty of guaranteeing IoT trustworthiness, which is still in its infancy. IoT trustworthiness is a must especially in critical domains (e.g., health, transportation) where humans become new components of an IoT system and their life is put at risk by system malfunctioning or breaches. In this article, we put forward the idea that trust in IoT can be boosted if and only if its automation and adaptation processes are based on trustworthy data. We therefore depart from a scenario that considers the quality of a single decision as the main goal of an IoT system and consider the trustworthiness of collected data as a fundamental requirement at the basis of a trustworthy IoT environment. We therefore define a methodology for data collection that filters untrusted data out according to trust rules evaluating the status of the devices collecting data and the collected data themselves. Our approach is based on blockchain and smart contracts and collects data whose trustworthiness and integrity are proven over time. The methodology balances trustworthiness and privacy and is experimentally evaluated in real-world and simulated scenarios using Hyperledger fabric blockchain.", acknowledgement = ack-nhfb, articleno = "11", fjournal = "ACM Transactions on Cyber-Physical Systems", journal-URL = "https://dl.acm.org/loi/tcps", } @Article{Arratia:2021:DGT, author = "Argimiro Arratia and Albert X. L{\'o}pez-Barrantes", title = "Do {Google Trends} forecast bitcoins? {Stylized} facts and statistical evidence", journal = "J. Bank. Financial Technol.", volume = "5", number = "1", pages = "45--57", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s42786-021-00027-4", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jbft/jbft5.html#ArratiaL21", acknowledgement = ack-nhfb, dblp-key = "journals/jbft/ArratiaL21", dblp-mdate = "2021-07-25", } @Article{Bakos:2021:EBD, author = "Yannis Bakos and Hanna Halaburda and Christoph Mueller-Bloch", title = "Economic and business dimensions: When permissioned blockchains deliver more decentralization than permissionless", journal = j-CACM, volume = "64", number = "2", pages = "20--22", month = jan, year = "2021", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3442371", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 26 14:34:25 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3442371", abstract = "Considerations for the governance of distributed systems.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Bandara:2021:TTL, author = "Eranga Bandara and Deepak Tosh and Peter Foytik and Sachin Shetty and Nalin Ranasinghe and Kasun {De Zoysa}", title = "{Tikiri} --- Towards a lightweight blockchain for {IoT}", journal = j-FUT-GEN-COMP-SYS, volume = "119", number = "??", pages = "154--165", month = jun, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.02.006", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21000583", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bedowska-Sojka:2021:BSK, author = "Barbara Bedowska-S{\'o}jka and Agata Kliber and Aleksandra Rutkowska", title = "Is Bitcoin Still a King? {Relationships} between Prices, Volatility and Liquidity of Cryptocurrencies during the Pandemic", journal = j-ENTROPY, volume = "23", number = "11", pages = "1386", month = "????", year = "2021", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e23111386", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy23.html#Bedowska-SojkaK21", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/Bedowska-SojkaK21", dblp-mdate = "2021-12-15", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Bordel:2021:DCE, author = "Borja Bordel and Ram{\'o}n Alcarria and Tom{\'a}s Robles", title = "Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems", journal = j-FUT-GEN-COMP-SYS, volume = "116", number = "??", pages = "426--439", month = mar, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.11.013", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:13 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X20330375", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bouam:2021:CRA, author = "Mellila Bouam and Charles Bouillaguet and Claire Delaplace and Camille No{\^u}s", title = "Computational records with aging hardware: Controlling half the output of {SHA-256}", journal = j-PARALLEL-COMPUTING, volume = "106", number = "??", pages = "??--??", month = sep, year = "2021", CODEN = "PACOEJ", DOI = "https://doi.org/10.1016/j.parco.2021.102804", ISSN = "0167-8191 (print), 1872-7336 (electronic)", ISSN-L = "0167-8191", bibdate = "Fri Feb 18 10:07:17 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167819121000557", acknowledgement = ack-nhfb, articleno = "102804", fjournal = "Parallel Computing", journal-URL = "http://www.sciencedirect.com/science/journal/01678191", keywords = "3XOR; Bitcoin hardware; Brute-force Implementation; Generalized birthday paradox; Hardware ASIC", } @Article{Brinkmann:2021:RBB, author = "Maik Brinkmann", title = "The Realities of Blockchain-Based New Public Governance: an Explorative Analysis of Blockchain Implementations in {Europe}", journal = j-DGOV, volume = "2", number = "3", pages = "29:1--29:14", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3462332", ISSN = "2691-199X (print), 2639-0175 (electronic)", ISSN-L = "2639-0175", bibdate = "Mon Aug 9 13:42:20 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/dgov.bib", URL = "https://dl.acm.org/doi/10.1145/3462332", abstract = "Blockchain technology and New Public Governance (NPG) represent promising concepts for various researchers. As such, both concepts offer the vision of an altered relationship between public administration and its non-public actors by emphasizing a strong position of non-public actors for public service delivery. This research aims to identify the relevance of NPG to leading blockchain implementations in the European public sector. For this purpose, both topics are combined in an explorative analysis. The analysis leverages an adapted analysis framework designed for this research effort to structure the expectations around NPG. Qualitative interviews with multiple key stakeholders of blockchain implementations projects were conducted to understand the actual impact of blockchain on the actor's relationships for public service delivery. This article presents the findings to this question and concludes that the use of blockchain has the changed actor relationships only in parts. Consequently, the author finally draws attention to the importance of blockchain governance and blockchain regulation for further developing the relationships of public administrations and their non-public counterparts.", acknowledgement = ack-nhfb, articleno = "29", fjournal = "Digital Government: Research and Practice (DGOV)", journal-URL = "https://dl.acm.org/loi/dgov", } @Article{BrundoUriarte:2021:DSL, author = "Rafael {Brundo Uriarte} and Huan Zhou and Kyriakos Kritikos and Zeshun Shi and Zhiming Zhao and Rocco {De Nicola}", title = "Distributed service-level agreement management with smart contracts and blockchain", journal = j-CCPE, volume = "33", number = "14", pages = "e5800:1--e5800:??", day = "25", month = jul, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5800", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:49:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "28 April 2020", } @Article{Cai:2021:CRS, author = "Liang Cai and Yi Sun and Zibin Zheng and Jiang Xiao and Weiwei Qiu", title = "{China} Region special section: Big trends: Blockchain in {China}", journal = j-CACM, volume = "64", number = "11", pages = "88--93", month = nov, year = "2021", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3481627", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Dec 10 11:47:59 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3481627", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Callens:2021:FIE, author = "Evariest Callens", title = "Financial instruments entail liabilities: Ether, bitcoin, and litecoin do not", journal = "Comput. Law Secur. Rev.", volume = "40", number = "??", pages = "105494", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.clsr.2020.105494", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/clsr/clsr40.html#Callens21", acknowledgement = ack-nhfb, dblp-key = "journals/clsr/Callens21", dblp-mdate = "2021-05-17", } @Article{Campanile:2021:PRS, author = "L. Campanile and M. Iacono and A. H. Levis and F. Marulli and M. Mastroianni", title = "Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work", journal = j-IEEE-SEC-PRIV, volume = "19", number = "1", pages = "34--43", month = jan # "\slash " # feb, year = "2021", DOI = "https://doi.org/10.1109/MSEC.2020.3012059", ISSN = "1540-7993 (print), 1558-4046 (electronic)", ISSN-L = "1540-7993", bibdate = "Fri Feb 5 14:25:50 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Security \& Privacy", journal-URL = "https://publications.computer.org/security-and-privacy/", } @Article{Cavalli:2021:CBM, author = "Stefano Cavalli and Michele Amoretti", title = "{CNN}-based multivariate data analysis for bitcoin trend prediction", journal = "Appl. Soft Comput.", volume = "101", number = "??", pages = "107065", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2020.107065", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc101.html#CavalliA21", acknowledgement = ack-nhfb, dblp-key = "journals/asc/CavalliA21", dblp-mdate = "2021-03-23", } @Article{Chaudhari:2021:TMA, author = "Deepesh Chaudhari and Rachit Agarwal and Sandeep Kumar Shukla", title = "Towards Malicious address identification in Bitcoin", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2112.11721; https://dblp.org/db/journals/corr/corr2112.html#abs-2112-11721", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2112-11721", dblp-mdate = "2022-01-31", } @Article{Chen:2021:BBP, author = "Zeng Chen and Weidong Xu and Bingtao Wang and Hua Yu", title = "A blockchain-based preserving and sharing system for medical data privacy", journal = j-FUT-GEN-COMP-SYS, volume = "124", number = "??", pages = "338--350", month = nov, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.05.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:20 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21001734", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Chen:2021:DPB, author = "Xuan Chen and Shujuan Tian and Kien Nguyen and Hiroo Sekiya", title = "Decentralizing Private Blockchain-{IoT} Network with {OLSR}", journal = j-FUTURE-INTERNET, volume = "13", number = "7", pages = "168", day = "28", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13070168", ISSN = "1999-5903", bibdate = "Fri Jul 23 15:16:13 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/7/168", abstract = "With data transparency and immutability, the blockchain can provide trustless and decentralized services for Internet of Things (IoT) applications. However, most blockchain-IoT networks, especially those with a private blockchain, are built on top of an infrastructure-based wireless network (i.e., using Wi-Fi access points or cellular base stations). Hence, they are still under the risk of Single-Point-of-Failure (SPoF) on the network layer, hindering the decentralization merit, for example, when the access points or base stations get failures. This paper presents an Optimized Link State Routing (OLSR) protocol-based solution for that issue in a private blockchain-IoT application. By decentralizing the underlying network with OLSR, the private blockchain network can avoid SPoF and automatically recover after a failure. Single blockchain connections can be extended to multiple ad hoc hops. Services over blockchain become flexible to fit various IoT scenarios. We show the effectiveness of our solution by constructing a private Ethereum blockchain network running on IoT devices (i.e., Raspberry Pi model 4) with environmental data sensing (i.e., Particular Matter (PM)). The IoT devices use OLSR to form an ad hoc network. The environment data are collected and propagated in transactions to a pre-loaded smart contract periodically. We then evaluate the IoT blockchain network's recovery time when facing a link error. The evaluation results show that OLSR can automatically recover after the failure. We also evaluate the transaction-oriented latency and block-oriented latency, which indicates the blocks have a high transmission quality, while transactions are transferred individually.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Chen:2021:MLB, author = "Fang Chen and Hong Wan and Hua Cai and Guang Cheng", title = "Machine learning in\slash for blockchain: Future and challenges", journal = j-CAN-J-STAT, volume = "49", number = "4", pages = "1364--1382", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1002/cjs.11623", ISSN = "0319-5724 (print), 1708-945X (electronic)", ISSN-L = "0319-5724", bibdate = "Mon Feb 21 13:44:29 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/canjstat.bib", acknowledgement = ack-nhfb, ajournal = "Can. J. Stat.", fjournal = "The Canadian Journal of Statistics = La revue canadienne de statistique", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1708-945X/", onlinedate = "05 June 2021", } @Article{Chen:2021:MRC, author = "Jiachi Chen and Xin Xia and Xiaohu Yang", title = "Maintenance-related concerns for post-deployed {Ethereum} smart contract development: issues, techniques, and future challenges", journal = j-EMPIR-SOFTWARE-ENG, volume = "26", number = "6", pages = "??--??", month = nov, year = "2021", CODEN = "ESENFW", DOI = "https://doi.org/10.1007/s10664-021-10018-0", ISSN = "1382-3256 (print), 1573-7616 (electronic)", ISSN-L = "1382-3256", bibdate = "Fri Feb 25 18:03:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/empir-software-eng.bib", URL = "https://link.springer.com/article/10.1007/s10664-021-10018-0", acknowledgement = ack-nhfb, fjournal = "Empirical Software Engineering", journal-URL = "http://link.springer.com/journal/10664", } @Article{Chen:2021:PSD, author = "Liang Chen and Jiaying Peng and Yang Liu and Jintang Li and Fenfang Xie and Zibin Zheng", title = "Phishing Scams Detection in {Ethereum} Transaction Network", journal = j-TOIT, volume = "21", number = "1", pages = "10:1--10:16", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3398071", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3398071", abstract = "Blockchain has attracted an increasing amount of researches, and there are lots of refreshing implementations in different fields. Cryptocurrency as its representative implementation, suffers the economic loss due to phishing scams. In our work, \ldots{}", acknowledgement = ack-nhfb, articleno = "10", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Chen:2021:SSC, author = "Zhihao Chen and Haizhen Zhuo and Quanqing Xu and Xiaodong Qi and Chengyu Zhu and Zhao Zhang and Cheqing Jin and Aoying Zhou and Ying Yan and Hui Zhang", title = "{SChain}: a scalable consortium blockchain exploiting intra- and inter-block concurrency", journal = j-PROC-VLDB-ENDOWMENT, volume = "14", number = "12", pages = "2799--2802", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.14778/3476311.3476348", ISSN = "2150-8097", bibdate = "Fri Oct 29 16:41:16 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/10.14778/3476311.3476348", abstract = "We demonstrate SChain, a consortium blockchain that scales transaction processing to support large-scale enterprise applications. The unique advantage of SChain stems from the exploitation of both intra- and inter-block concurrency. The intra-block \ldots{}", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Cheng:2021:AGS, author = "Lichen Cheng and Jiqiang Liu and Yi Jin and Yidong Li and Wei Wang", title = "Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain", journal = j-TOIT, volume = "21", number = "1", pages = "11:1--11:19", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3406092", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3406092", abstract = "In blockchain networks, reaching effective supervision while maintaining anonymity to the public has been an ongoing challenge. In existing solutions, certification authorities need to record all pairs of identities and pseudonyms, which is demanding \ldots{}", acknowledgement = ack-nhfb, articleno = "11", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Choo:2021:BES, author = "Kim-Kwang Raymond Choo and Keke Gai and Luca Chiaraviglio", title = "Blockchain-enabled secure communications in smart cities", journal = j-J-PAR-DIST-COMP, volume = "152", number = "??", pages = "125--127", month = jun, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.02.021", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000423", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Choo:2021:ISI, author = "Kkwang Raymond Choo and Uttam Ghosh and Deepak Tosh and Reza M. Parizi and Ali Dehghantanha", title = "Introduction to the Special Issue on {Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems}", journal = j-TOIT, volume = "21", number = "2", pages = "38e:1--38e:3", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3464768", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3464768", acknowledgement = ack-nhfb, articleno = "38e", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Chow:2021:EAP, author = "Sherman S. M. Chow and Kim-Kwang Raymond Choo and Jinguang Han", title = "Editorial for accountability and privacy issues in blockchain and cryptocurrency", journal = j-FUT-GEN-COMP-SYS, volume = "114", number = "??", pages = "647--648", month = jan, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.08.039", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:10 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X20326637", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Cocco:2021:BBT, author = "Luisanna Cocco and Katiuscia Mannaro and Roberto Tonelli and Lorena Mariani and Matteo B. Lodi and Andrea Melis and Marco Simone and Alessandro Fanti", title = "A Blockchain-Based Traceability System in Agri-Food {SME}: Case Study of a Traditional Bakery", journal = j-IEEE-ACCESS, volume = "9", pages = "62899--62915", year = "2021", DOI = "https://doi.org/10.1109/access.2021.3074874", ISSN = "2169-3536", ISSN-L = "2169-3536", bibdate = "Fri Apr 30 06:52:47 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Access", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639", } @Article{Coutinho:2021:CHI, author = "Felipe Ribas Coutinho and Victor Pires and Claudio Miceli and Daniel S. Menasche", title = "Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "4--7", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466830", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3466826.3466830", abstract = "Blockchains and cryptocurrencies disrupted the conversion of energy into a medium of exchange. Numerous applications for blockchains and cryptocurrencies are now envisioned for purposes ranging from inventory control to banking applications. Naturally, \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Cui:2021:IVS, author = "Laizhong Cui and Zhe Xiao and Jiahao Wang and Fei Chen and Yi Pan and Hua Dai and Jing Qin", title = "Improving Vaccine Safety Using Blockchain", journal = j-TOIT, volume = "21", number = "2", pages = "38:1--38:24", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3388446", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3388446", abstract = "In recent years, vaccine incidents occurred around the world, which endangers people's lives. In the technical respect, these incidents are partially due to the fact that existing vaccine management systems are distributively managed by different entities \ldots{}", acknowledgement = ack-nhfb, articleno = "38", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Cunha:2021:BCB, author = "Paulo Rupino Cunha and Paulo Melo and Helder Sebasti{\~a}o", title = "From Bitcoin to Central Bank Digital Currencies: Making Sense of the Digital Money Revolution", journal = j-FUTURE-INTERNET, volume = "13", number = "7", pages = "165", day = "27", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13070165", ISSN = "1999-5903", bibdate = "Fri Jul 23 15:16:13 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/7/165", abstract = "We analyze the path from cryptocurrencies to official Central Bank Digital Currencies (CBDCs), to shed some light on the ultimate dematerialization of money. To that end, we made an extensive search that resulted in a review of more than 100 academic and grey literature references, including official positions from central banks. We present and discuss the characteristics of the different CBDC variants being considered-namely, wholesale, retail, and, for the latter, the account-based, and token-based-as well as ongoing pilots, scenarios of interoperability, and open issues. Our contribution enables decision-makers and society at large to understand the potential advantages and risks of introducing CBDCs, and how these vary according to many technical and economic design choices. The practical implication is that a debate becomes possible about the trade-offs that the stakeholders are willing to accept.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Dabbagh:2021:SEP, author = "Mohammad Dabbagh and Kim-Kwang Raymond Choo and Amin Beheshti and Mohammad Tahir and Nader Sohrabi Safa", title = "A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities", journal = j-COMPUT-SECUR, volume = "100", number = "??", pages = "Article 102078", month = jan, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102078", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:08 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820303515", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Dalal:2021:IRA, author = "Siddhartha Dalal and Zihe Wang and Siddhanth Sabharwal", title = "Identifying Ransomware Actors in the Bitcoin Network", journal = "CoRR", volume = "abs/2108.13807", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2108.13807; https://dblp.org/db/journals/corr/corr2108.html#abs-2108-13807", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2108-13807", dblp-mdate = "2021-09-03", } @Article{Deng:2021:IDC, author = "Shuiguang Deng and Guanjie Cheng and Hailiang Zhao and Honghao Gao and Jianwei Yin", title = "Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce", journal = j-TOIT, volume = "21", number = "1", pages = "9:1--9:19", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3397160", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3397160", abstract = "Blockchain is regarded as one of the most promising technologies to upgrade e-commerce. This article analyzes the challenges that current e-commerce is facing and introduces a new scenario of e-commerce enabled by blockchain. A framework is proposed for \ldots{}", acknowledgement = ack-nhfb, articleno = "9", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Deng:2021:OBI, author = "Yulin Deng and Hongfeng Xu and Jie Wu", title = "Optimization of blockchain investment portfolio under artificial bee colony algorithm", journal = j-J-COMPUT-APPL-MATH, volume = "385", number = "??", pages = "Article 113199", day = "15", month = mar, year = "2021", CODEN = "JCAMDI", DOI = "https://doi.org/10.1016/j.cam.2020.113199", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Sat Mar 27 09:45:46 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0377042720304908", acknowledgement = ack-nhfb, fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Dey:2021:SDT, author = "Prasanjit Dey and Swades Kumar Chaulya and Sanjay Kumar", title = "Secure decision tree twin support vector machine training and classification process for encrypted {IoT} data via blockchain platform", journal = j-CCPE, volume = "33", number = "16", pages = "e6264:1--e6264:??", day = "25", month = aug, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6264", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:49:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "13 March 2021", } @Article{Dorri:2021:TIR, author = "Ali Dorri and Fengji Luo and Samuel Karumba and Salil Kanhere and Raja Jurdak and Zhao Yang Dong", title = "Temporary immutability: a removable blockchain solution for prosumer-side energy trading", journal = j-J-NETW-COMPUT-APPL, volume = "180", number = "??", pages = "??--??", day = "15", month = apr, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103018", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:43 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S108480452100045X", acknowledgement = ack-nhfb, articleno = "103018", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Dotan:2021:SBN, author = "Maya Dotan and Yvonne-Anne Pignolet and Stefan Schmid and Saar Tochner and Aviv Zohar", title = "Survey on Blockchain Networking: Context, State-of-the-Art, Challenges", journal = j-COMP-SURV, volume = "54", number = "5", pages = "107:1--107:34", month = jun, year = "2021", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3453161", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sat Jul 10 07:58:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3453161", abstract = "Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their \ldots{}", acknowledgement = ack-nhfb, articleno = "107", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Du:2021:BEE, author = "Yao Du", title = "Blockchain-Enabled Edge Intelligence for {IoT}: Background, Emerging Trends and Open Issues", journal = j-FUTURE-INTERNET, volume = "13", number = "2", pages = "48", day = "17", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13020048", ISSN = "1999-5903", bibdate = "Fri Feb 26 10:54:58 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/2/48", abstract = "Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated by the recent advancement of multi-access edge computing (MEC) and artificial intelligence (AI), blockchain-enabled edge intelligence has become an emerging technology for the Internet of Things (IoT). We review how blockchain-enabled edge intelligence works in the IoT domain, identify the emerging trends, and suggest open issues for further research. To be specific: (1) we first offer some basic knowledge of DLT, MEC, and AI; (2) a comprehensive review of current peer-reviewed literature is given to identify emerging trends in this research area; and (3) we discuss some open issues and research gaps for future investigations. We expect that blockchain-enabled edge intelligence will become an important enabler of future IoT, providing trust and intelligence to satisfy the sophisticated needs of industries and society.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue Feature Papers for Future Internet-Internet of Things Section.", } @Article{Erdin:2021:SPB, author = "Enes Erdin and Mumin Cebe and Kemal Akkaya and Eyuphan Bulut and Selcuk Uluagac", title = "A scalable private {Bitcoin} payment channel network with privacy guarantees", journal = j-J-NETW-COMPUT-APPL, volume = "180", number = "??", pages = "??--??", day = "15", month = apr, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103021", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:43 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521000485", acknowledgement = ack-nhfb, articleno = "103021", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Fan:2021:DBC, author = "Yuqi Fan and Huanyu Wu and Hye-Young Paik", title = "{DR--BFT}: a consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system", journal = j-FUT-GEN-COMP-SYS, volume = "124", number = "??", pages = "33--48", month = nov, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.04.020", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:20 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21001412", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Farahani:2021:CID, author = "Bahar Farahani and Farshad Firouzi and Markus Luecking", title = "The convergence of {IoT} and distributed ledger technologies {(DLT)}: Opportunities, challenges, and solutions", journal = j-J-NETW-COMPUT-APPL, volume = "177", number = "??", pages = "??--??", day = "1", month = mar, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102936", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:42 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303945", acknowledgement = ack-nhfb, articleno = "102936", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Feng:2021:BET, author = "Jun Feng and Laurence T. Yang and Yuxiang Zhu and Nicholaus J. Gati and Yijun Mo", title = "Blockchain-enabled Tensor-based Conditional Deep Convolutional {GAN} for Cyber-physical-Social Systems", journal = j-TOIT, volume = "21", number = "2", pages = "41:1--41:17", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3404890", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3404890", abstract = "Deep learning techniques have shown significant success in cyber-physical-social systems (CPSS). As an instance of deep learning models, generative adversarial nets (GAN) model enables powerful and flexible image augmentation, image generation, and \ldots{}", acknowledgement = ack-nhfb, articleno = "41", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Ferdous:2021:SCA, author = "Md Sadek Ferdous and Mohammad Jabed Morshed Chowdhury and Mohammad A. Hoque", title = "A survey of consensus algorithms in public blockchain systems for crypto-currencies", journal = j-J-NETW-COMPUT-APPL, volume = "182", number = "??", pages = "??--??", day = "15", month = may, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103035", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:43 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521000618", acknowledgement = ack-nhfb, articleno = "103035", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Fischer:2021:CCS, author = "Jan Alexander Fischer and Andres Palechor and Daniele Dell'Aglio and Abraham Bernstein and Claudio J. Tessone", title = "The Complex Community Structure of the Bitcoin Address Correspondence Network", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2105.09078; https://dblp.org/db/journals/corr/corr2105.html#abs-2105-09078", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2105-09078", dblp-mdate = "2021-05-31", } @Article{Garcia-Medina:2021:WDB, author = "Andr{\'e}s Garc{\'\i}a-Medina and Toan Luu Duc Huynh", title = "What Drives Bitcoin? {An} Approach from Continuous Local Transfer Entropy and Deep Learning Classification Models", journal = j-ENTROPY, volume = "23", number = "12", pages = "1582", month = "????", year = "2021", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e23121582", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy23.html#Garcia-MedinaH21; https://www.wikidata.org/entity/Q111518067", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/Garcia-MedinaH21", dblp-mdate = "2022-08-16", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Garriga:2021:BCC, author = "Martin Garriga and Stefano {Dalla Palma} and Maxmiliano Arias and Alan {De Renzis} and Remo Pareschi and Damian Andrew Tamburri", title = "Blockchain and cryptocurrencies: a classification and comparison of architecture drivers", journal = j-CCPE, volume = "33", number = "8", pages = "e5992:1--e5992:??", day = "25", month = apr, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5992", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:23 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "02 October 2020", } @Article{Gebraselase:2021:ATH, author = "Befekadu Gezaheng Gebraselase and Bjarne E. Helvik and Yuming Jiang", title = "An Analysis of Transaction Handling in Bitcoin", journal = "CoRR", volume = "abs/2106.10083", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2106.10083; https://dblp.org/db/journals/corr/corr2106.html#abs-2106-10083", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2106-10083", dblp-mdate = "2023-02-06", } @Article{Gimenez-Aguilar:2021:ACB, author = "Mar Gimenez-Aguilar and Jose Maria de Fuentes and Lorena Gonzalez-Manzano and David Arroyo", title = "Achieving cybersecurity in blockchain-based systems: a survey", journal = j-FUT-GEN-COMP-SYS, volume = "124", number = "??", pages = "91--118", month = nov, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.05.007", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:20 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21001576", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Gonzalez-Barahona:2021:FDM, author = "Jes{\'u}s M. Gonz{\'a}lez-Barahona", title = "Factors determining maximum energy consumption of Bitcoin miners", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2107.10634; https://dblp.org/db/journals/corr/corr2107.html#abs-2107-10634", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2107-10634", dblp-mdate = "2021-07-29", } @Article{Goodell:2021:DCA, author = "Geoffrey Goodell and Hazem Danny Al-Nakib and Paolo Tasca", title = "A Digital Currency Architecture for Privacy and Owner-Custodianship", journal = j-FUTURE-INTERNET, volume = "13", number = "5", pages = "130", day = "14", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13050130", ISSN = "1999-5903", bibdate = "Fri May 28 20:44:52 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/5/130", abstract = "In recent years, electronic retail payment mechanisms, especially e-commerce and card payments at the point of sale, have increasingly replaced cash in many developed countries. As a result, societies are losing a critical public retail payment option, and retail consumers are losing important rights associated with using cash. To address this concern, we propose an approach to digital currency that would allow people without banking relationships to transact electronically and privately, including both e-commerce purchases and point-of-sale purchases that are required to be cashless. Our proposal introduces a government-backed, privately-operated digital currency infrastructure to ensure that every transaction is registered by a bank or money services business, and it relies upon non-custodial wallets backed by privacy-enhancing technology, such as blind signatures or zero-knowledge proofs, to ensure that transaction counterparties are not revealed. Our approach to digital currency can also facilitate more efficient and transparent clearing, settlement, and management of systemic risk. We argue that our system can restore and preserve the salient features of cash, including privacy, owner-custodianship, fungibility, and accessibility, while also preserving fractional reserve banking and the existing two-tiered banking system. We also show that it is possible to introduce regulation of digital currency transactions involving non-custodial wallets that unconditionally protect the privacy of end-users.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Goyat:2021:SLS, author = "Rekha Goyat and Gulshan Kumar and Mamoun Alazab and Rahul Saha and Reji Thomas and Mritunjay Kumar Rai", title = "A secure localization scheme based on trust assessment for {WSNs} using blockchain technology", journal = j-FUT-GEN-COMP-SYS, volume = "125", number = "??", pages = "221--231", month = dec, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.06.039", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:21 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X2100234X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Guan:2021:AEP, author = "Zhitao Guan and Xin Lu and Wenti Yang and Longfei Wu and Naiyu Wang and Zijian Zhang", title = "Achieving efficient and Privacy-preserving energy trading based on blockchain and {ABE} in smart grid", journal = j-J-PAR-DIST-COMP, volume = "147", number = "??", pages = "34--45", month = jan, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.08.012", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520303609", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Guan:2021:ASS, author = "Zhitao Guan and Naiyu Wang and Xunfeng Fan and Xueyan Liu and Longfei Wu and Shaohua Wan", title = "Achieving Secure Search over Encrypted Data for e-Commerce: a Blockchain Approach", journal = j-TOIT, volume = "21", number = "1", pages = "12:1--12:17", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3408309", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3408309", abstract = "The advances of Internet technology has resulted in the rapid and pervasive development of e-commerce, which has not only changed the production and operation mode of many enterprises, but also affected the economic development mode of the whole society. This trend has incurred a strong need to store and process large amounts of sensitive data. The traditional data storage and search solutions cannot meet such requirements. To tackle this problem, in this article, we proposed Consortium Blockchain-based Distributed Secure Search (CBDSS) Scheme over encrypted data in e-Commerce environment. By integrating the blockchain and searchable encryption model, sensitive data can be effectively protected. The consortium blockchain can ensure that only authorized nodes can join the system. To fairly assign nodes for the search tasks, we developed an endorsement strategy in which two agent roles are set up to divide and match the search tasks with the virtual resources according to the load capacity of each node. The security analysis and experiments are conducted to evaluate the performance of our proposed scheme. The evaluation results have proved the reliability and security of our scheme over existing methods.", acknowledgement = ack-nhfb, articleno = "12", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Gundlach:2021:PCT, author = "Rowel G{\"u}ndlach and Martijn Gijsbers and David T. Koops and Jacques Resing", title = "Predicting confirmation times of Bitcoin transactions", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "16--19", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466833", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dblp.org/db/journals/sigmetrics/sigmetrics48.html#GundlachGKR21; https://dl.acm.org/doi/10.1145/3466826.3466833", abstract = "We study the distribution of confirmation times of Bitcoin transactions, conditional on the size of the current memory pool. We argue that the time until a Bitcoin transaction is confirmed resembles the time to ruin in a corresponding Cramer--Lundberg \ldots{}", acknowledgement = ack-nhfb, dblp-key = "journals/sigmetrics/GundlachGKR21", dblp-mdate = "2021-06-11", fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Guo:2021:BAV, author = "Yi-Ming Guo and Zhen-Ling Huang and Ji Guo and Xing-Rong Guo and Hua Li and Meng-Yu Liu and Safa Ezzeddine and Mpeoane Judith Nkeli", title = "A bibliometric analysis and visualization of blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "116", number = "??", pages = "316--332", month = mar, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.10.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:13 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X20330004", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Gyamerah:2021:TSH, author = "Samuel Asante Gyamerah", title = "Two-Stage Hybrid Machine Learning Model for High-Frequency Intraday Bitcoin Price Prediction Based on Technical Indicators, Variational Mode Decomposition, and Support Vector Regression", journal = "Complex.", volume = "2021", number = "??", pages = "1767708:1--1767708:15", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1155/2021/1767708", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/complexity/complexity2021.html#Gyamerah21", acknowledgement = ack-nhfb, dblp-key = "journals/complexity/Gyamerah21", dblp-mdate = "2022-04-09", } @Article{Hang:2021:TQV, author = "Jianqin Hang and Xu Zhang", title = "Time- and Quantile-Varying Causality between Investor Attention and Bitcoin Returns: a Rolling-Window Causality-in-Quantiles Approach", journal = "Complex.", volume = "2021", number = "??", pages = "5543995:1--5543995:12", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1155/2021/5543995", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/complexity/complexity2021.html#HangZ21", acknowledgement = ack-nhfb, dblp-key = "journals/complexity/HangZ21", dblp-mdate = "2022-02-14", } @Article{Hasan:2021:CCT, author = "Haya R. Hasan and Khaled Salah and Raja Jayaraman and Ibrar Yaqoob and Mohammed Omar and Samer Ellahham", title = "{COVID-19} Contact Tracing Using Blockchain", journal = j-IEEE-ACCESS, volume = "9", pages = "62956--62971", year = "2021", DOI = "https://doi.org/10.1109/access.2021.3074753", ISSN = "2169-3536", ISSN-L = "2169-3536", bibdate = "Fri Apr 30 06:58:57 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Access", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639", } @Article{He:2021:UEB, author = "Ningyu He and Weihang Su and Zhou Yu and Xinyu Liu and Fengyi Zhao and Haoyu Wang and Xiapu Luo and Gareth Tyson and Lei Wu and Yao Guo", title = "Understanding the Evolution of Blockchain Ecosystems: a Longitudinal Measurement Study of Bitcoin, {Ethereum}, and {EOSIO}", journal = "CoRR", volume = "abs/2110.07534", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2110.07534; https://dblp.org/db/journals/corr/corr2110.html#abs-2110-07534", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2110-07534", dblp-mdate = "2022-06-29", } @Article{Hewa:2021:SBB, author = "Tharaka Hewa and Mika Ylianttila and Madhusanka Liyanage", title = "Survey on blockchain based smart contracts: {Applications}, opportunities and challenges", journal = j-J-NETW-COMPUT-APPL, volume = "177", number = "??", pages = "??--??", day = "1", month = mar, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102857", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:42 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303234", acknowledgement = ack-nhfb, articleno = "102857", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Huang:2021:ABT, author = "Jun Huang and Debiao He and Mohammad S. Obaidat and Pandi Vijayakumar and Min Luo and Kim-Kwang Raymond Choo", title = "The Application of the Blockchain Technology in Voting Systems: a Review", journal = j-COMP-SURV, volume = "54", number = "3", pages = "60:1--60:28", month = jun, year = "2021", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3439725", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Mon Jun 7 07:26:56 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", URL = "https://dl.acm.org/doi/10.1145/3439725", abstract = "Voting is a formal expression of opinion or choice, either positive or negative, made by an individual or a group of individuals. However, conventional voting systems tend to be centralized, which are known to suffer from security and efficiency limitations. Hence, there has been a trend of moving to decentralized voting systems, such as those based on blockchain. The latter is a decentralized digital ledger in a peer-to-peer network, where a copy of the append-only ledger of digitally signed and encrypted transactions is maintained by each participant. Therefore, in this article, we perform a comprehensive review of blockchain-based voting systems and classify them based on a number of features (e.g., the types of blockchain used, the consensus approaches used, and the scale of participants). By systematically analyzing and comparing the different blockchain-based voting systems, we also identify a number of limitations and research opportunities. Hopefully, this survey will provide an in-depth insight into the potential utility of blockchain in voting systems and device future research agenda.", acknowledgement = ack-nhfb, articleno = "60", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Huang:2021:BBE, author = "Haiping Huang and Xiang Sun and Fu Xiao and Peng Zhu and Wenming Wang", title = "Blockchain-based {eHealth} system for auditable {EHRs} manipulation in cloud environments", journal = j-J-PAR-DIST-COMP, volume = "148", number = "??", pages = "46--57", month = feb, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.10.002", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520303853", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Ibrahim:2021:PMM, author = "Ahmed F. Ibrahim and Rasha Kashef and Liam Corrigan", title = "Predicting market movement direction for bitcoin: a comparison of time series modeling methods", journal = j-COMPUT-ELECTR-ENG, volume = "89", number = "??", pages = "106905", month = "????", year = "2021", CODEN = "CPEEBQ", DOI = "https://doi.org/10.1016/j.compeleceng.2020.106905", ISSN = "????", ISSN-L = "0045-7906", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cee/cee89.html#IbrahimKC21", acknowledgement = ack-nhfb, dblp-key = "journals/cee/IbrahimKC21", dblp-mdate = "2021-02-18", fjournal = "Computers and Electrical Engineering", } @Article{Inzirillo:2021:DRP, author = "Hugo Inzirillo and Benjamin Mat", title = "Dimensionality reduction for prediction: Application to Bitcoin and {Ethereum}", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2112.15036; https://dblp.org/db/journals/corr/corr2112.html#abs-2112-15036", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2112-15036", dblp-mdate = "2022-01-05", } @Article{Jan:2021:SBC, author = "Mian Ahmad Jan and Jinjin Cai and Xiang-Chuan Gao and Fazlullah Khan and Spyridon Mastorakis and Muhammad Usman and Mamoun Alazab and Paul Watters", title = "Security and blockchain convergence with {Internet of Multimedia Things}: {Current} trends, research challenges and future directions", journal = j-J-NETW-COMPUT-APPL, volume = "175", number = "??", pages = "??--??", day = "1", month = feb, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102918", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:41 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303775", acknowledgement = ack-nhfb, articleno = "102918", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Jayabal:2021:PAD, author = "Chandra Priya Jayabal and Ponsy R. K. Sathia Bhama", title = "Performance analysis on {Diversity Mining-based Proof of Work} in bifolded consortium blockchain for {Internet of Things} consensus", journal = j-CCPE, volume = "33", number = "16", pages = "e6285:1--e6285:??", day = "25", month = aug, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6285", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:49:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "30 March 2021", } @Article{Jung:2021:BIM, author = "Hyunjun Jung and Dongwon Jeong", title = "Blockchain Implementation Method for Interoperability between {CBDCs}", journal = j-FUTURE-INTERNET, volume = "13", number = "5", pages = "133", day = "18", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13050133", ISSN = "1999-5903", bibdate = "Fri May 28 20:44:52 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/5/133", abstract = "Central Bank Digital Currency (CBDC) is a digital currency issued by a central bank. Motivated by the financial crisis and prospect of a cashless society, countries are researching CBDC. Recently, global consideration has been given to paying basic income to avoid consumer sentiment shrinkage and recession due to epidemics. CBDC is coming into the spotlight as the way to manage the public finance policy of nations comprehensively. CBDC is studied by many countries. The bank of the Bahamas released Sand Dollar. Each country's central bank should consider the situation in which CBDCs are exchanged. The transaction of the CDDB is open data. Transaction registers CBDC exchange information of the central bank in the blockchain. Open data on currency exchange between countries will provide information on the flow of money between countries. This paper proposes a blockchain system and management method based on the ISO/IEC 11179 metadata registry for exchange between CBDCs that records transactions between registered CBDCs. Each country's CBDC will have a different implementation and time of publication. We implement the blockchain system and experiment with the operation method, measuring the block generation time of blockchains using the proposed method.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Kaur:2021:BBF, author = "Jasleen Kaur and Rinkle Rani and Nidhi Kalra", title = "Blockchain-based framework for secured storage, sharing, and querying of electronic healthcare records", journal = j-CCPE, volume = "33", number = "20", pages = "e6369:1--e6369:??", day = "25", month = oct, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6369", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:00 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "20 May 2021", } @Article{Khan:2021:EAT, author = "Kashif Mehboob Khan and Junaid Arshad and Muhammad Mubashir Khan", title = "Empirical analysis of transaction malleability within blockchain-based e-Voting", journal = j-COMPUT-SECUR, volume = "100", number = "??", pages = "Article 102081", month = jan, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102081", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:08 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820303540", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kim:2021:SFF, author = "H.-Y. Kim and L. Xu and W. Shi and T. Suh", title = "A Secure and Flexible {FPGA}-Based Blockchain System for the {IIoT}", journal = j-COMPUTER, volume = "54", number = "2", pages = "50--59", year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.3022066", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Mar 10 07:47:57 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Kim:2021:TER, author = "H. M. Kim and M. Laskowski and M. Zargham and H. Turesson and M. Barlin and D. Kabanov", title = "Token Economics in Real Life: Cryptocurrency and Incentives Design for {Insolar}'s Blockchain Network", journal = j-COMPUTER, volume = "54", number = "1", pages = "70--80", year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.2996572", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Mar 10 07:47:57 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Koens:2021:BAD, author = "Tommy Koens and Pol {Van Aubel} and Erik Poll", title = "Blockchain adoption drivers: The rationality of irrational choices", journal = j-CCPE, volume = "33", number = "8", pages = "e5843:1--e5843:??", day = "25", month = apr, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5843", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue May 18 08:31:23 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "23 May 2020", } @Article{Koo:2021:PBP, author = "Eunho Koo and Geonwoo Kim", title = "Prediction of Bitcoin price based on manipulating distribution strategy", journal = "Appl. Soft Comput.", volume = "110", number = "??", pages = "107738", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2021.107738", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc110.html#KooK21", acknowledgement = ack-nhfb, dblp-key = "journals/asc/KooK21", dblp-mdate = "2021-09-22", } @Article{Krol:2021:PPU, author = "Micha{\l} Kr{\'o}l and Alberto Sonnino and Mustafa Al-Bassam and Argyrios G. Tasiopoulos and Etienne Rivi{\`e}re and Ioannis Psaras", title = "Proof-of-Prestige: a Useful Work Reward System for Unverifiable Tasks", journal = j-TOIT, volume = "21", number = "2", pages = "44:1--44:27", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3419483", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3419483", abstract = "As cryptographic tokens and altcoins are increasingly being built to serve as utility tokens, the notion of useful work consensus protocols is becoming ever more important. With useful work consensus protocols, users get rewards after they have carried \ldots{}", acknowledgement = ack-nhfb, articleno = "44", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Kshetri:2021:EBB, author = "Nir Kshetri", title = "The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries", journal = j-COMPUTER, volume = "54", number = "8", pages = "98--103", month = aug, year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2021.3082835", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Aug 5 06:37:19 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Kudva:2021:SBB, author = "Sowmya Kudva and Shahriar Badsha and Shamik Sengupta and Hung La and Ibrahim Khalil and Mohammed Atiquzzaman", title = "A scalable blockchain based trust management in {VANET} routing protocol", journal = j-J-PAR-DIST-COMP, volume = "152", number = "??", pages = "144--156", month = jun, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.02.024", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000459", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Kumar:2021:IFI, author = "Gulshan Kumar and Rahul Saha and Chhagan Lal and Mauro Conti", title = "{Internet-of-Forensic (IoF)}: a blockchain based digital forensics framework for {IoT} applications", journal = j-FUT-GEN-COMP-SYS, volume = "120", number = "??", pages = "13--25", month = jul, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.02.016", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:15 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21000686", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Kumar:2021:SDD, author = "Randhir Kumar and Rakesh Tripathi and Ningrinla Marchang and Gautam Srivastava and Thippa Reddy Gadekallu and Neal N. Xiong", title = "A secured distributed detection system based on {IPFS} and blockchain for industrial image and video data security", journal = j-J-PAR-DIST-COMP, volume = "152", number = "??", pages = "128--143", month = jun, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.02.022", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000435", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Lajeunesse:2021:COM, author = "David Lajeunesse and Hugo D. Scolnik", title = "A Cooperative Optimal Mining Model for Bitcoin", journal = "CoRR", volume = "abs/2107.09707", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2107.09707; https://dblp.org/db/journals/corr/corr2107.html#abs-2107-09707", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2107-09707", dblp-mdate = "2021-07-29", } @Article{Lazrag:2021:ESR, author = "Hilmi Lazrag and Abdellah Chehri and Rachid Saadane and Moulay Driss Rahmani", title = "Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks", journal = j-CCPE, volume = "33", number = "22", pages = "e6144:1--e6144:??", day = "25", month = nov, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6144", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:02 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "08 December 2020", } @Article{Lee:2021:BBM, author = "Tian-Fu Lee and Hong-Ze Li and Yi-Pei Hsieh", title = "A blockchain-based medical data preservation scheme for telecare medical information systems", journal = j-INT-J-INFO-SEC, volume = "20", number = "4", pages = "589--601", month = aug, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-020-00521-8", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Wed Jul 28 09:12:45 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "http://link.springer.com/article/10.1007/s10207-020-00521-8", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Li:2021:BED, author = "Xi Li and Zehua Wang and Victor C. M. Leung and Hong Ji and Yiming Liu and Heli Zhang", title = "Blockchain-empowered Data-driven Networks: a Survey and Outlook", journal = j-COMP-SURV, volume = "54", number = "3", pages = "58:1--58:38", month = jun, year = "2021", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3446373", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Mon Jun 7 07:26:56 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3446373", abstract = "The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and variety of data. These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network management. Blockchain, which is a technology for building distributed ledgers that provide an immutable log of transactions recorded in a distributed network, has become prominent recently as the underlying technology of cryptocurrencies and is revolutionizing data storage and processing in computer network systems. For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy network control, and decentralized routing and resource managements. However, many important challenges and open issues remain to be addressed before blockchain can be deployed widely to enable future DDNs. In this article, we present a survey on the existing research works on the application of blockchain technologies in computer networks and identify challenges and potential solutions in the applications of blockchains in future DDNs. We identify application scenarios in which future blockchain-empowered DDNs could improve the efficiency and security, and generally the effectiveness of network services.", acknowledgement = ack-nhfb, articleno = "58", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Li:2021:DES, author = "Kejun Li and Yunan Liu and Hong Wan and Yining Huang", title = "A discrete-event simulation model for the Bitcoin blockchain network with strategic miners and mining pool managers", journal = j-COMP-OP-RES, volume = "134", number = "??", pages = "105365", month = "????", year = "2021", CODEN = "CMORAP", DOI = "https://doi.org/10.1016/j.cor.2021.105365", ISSN = "????", ISSN-L = "0305-0548", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/cor/cor134.html#LiLWH21", acknowledgement = ack-nhfb, dblp-key = "journals/cor/LiLWH21", dblp-mdate = "2021-07-23", fjournal = "Computers and Operations Research", journal-URL = "http://www.sciencedirect.com/science/journal/03050548", } @Article{Li:2021:FGA, author = "Guangsong Li and Wei Chen and Bin Zhang and Siqi Lu", title = "A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks", journal = j-J-PAR-DIST-COMP, volume = "157", number = "??", pages = "157--167", month = nov, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.06.007", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Thu Feb 10 06:39:21 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521001362", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Li:2021:LBB, author = "Meng Li and Chhagan Lal and Mauro Conti and Donghui Hu", title = "{LEChain}: a blockchain-based lawful evidence management scheme for digital forensics", journal = j-FUT-GEN-COMP-SYS, volume = "115", number = "??", pages = "406--420", month = feb, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.09.038", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:11 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X1933167X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Li:2021:LPP, author = "Kunchang Li and Yifan Yang and Shuhao Wang and Runhua Shi and Jianbin Li", title = "A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid", journal = j-COMPUT-SECUR, volume = "103", number = "??", pages = "Article 102189", month = apr, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102189", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:10 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821000134", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Li:2021:SES, author = "Li Li and Jiayong Liu and Peng Jia", title = "{SecTEP}: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain", journal = j-COMPUT-SECUR, volume = "103", number = "??", pages = "Article 102188", month = apr, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102188", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:10 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821000122", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Li:2021:SML, author = "W. Li and C. Feng and L. Zhang and H. Xu and B. Cao and M. A. Imran", title = "A Scalable Multi-Layer {PBFT} Consensus for Blockchain", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "32", number = "5", pages = "1146--1160", year = "2021", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2020.3042392", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Fri Mar 19 06:51:50 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Li:2021:TBB, author = "Wenjuan Li and Yu Wang and Man Ho Au", title = "Toward a blockchain-based framework for challenge-based collaborative intrusion detection", journal = j-INT-J-INFO-SEC, volume = "20", number = "2", pages = "127--139", month = apr, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-020-00488-6", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Tue Mar 23 08:25:39 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "https://link.springer.com/article/10.1007/s10207-020-00488-6", acknowledgement = ack-nhfb, fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", online-date = "Published: 11 February 2020 Pages: 127 - 139", } @Article{Li:2021:WSC, author = "Xiaoyun Li and Zibin Zheng and Hong-Ning Dai", title = "When services computing meets blockchain: Challenges and opportunities", journal = j-J-PAR-DIST-COMP, volume = "150", number = "??", pages = "1--14", month = apr, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.12.003", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520304196", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Liang:2021:FBS, author = "Haoran Liang and Jun Wu and Xi Zheng and Mengshi Zhang and Jianhua Li and Alireza Jolfaei", title = "Fog-based Secure Service Discovery for {Internet of Multimedia Things}: a Cross-blockchain Approach", journal = j-TOMM, volume = "16", number = "3s", pages = "96:1--96:23", month = jan, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3415151", ISSN = "1551-6857 (print), 1551-6865 (electronic)", ISSN-L = "1551-6857", bibdate = "Fri Jan 22 06:57:30 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tomccap.bib", URL = "https://dl.acm.org/doi/10.1145/3415151", abstract = "The Internet of Multimedia Things (IoMT) has become the backbone of innumerable multimedia applications in various fields. The wide application of IoMT not only makes our life convenient but also brings challenges to service discovery. Service discovery \ldots{}", acknowledgement = ack-nhfb, articleno = "96", fjournal = "ACM Transactions on Multimedia Computing, Communications, and Applications", journal-URL = "https://dl.acm.org/loi/tomm", } @Article{Lin:2021:BBD, author = "Chao Lin and Debiao He and Sherali Zeadally and Xinyi Huang and Zhe Liu", title = "Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities", journal = j-TOIT, volume = "21", number = "2", pages = "40:1--40:21", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3397202", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3397202", abstract = "The sensing-as-a-service (SaaS) model has been explored to address the challenge of intractability of managing a large number of sensors faced by future smart cities. However, how to effectively share sensor data without compromising confidentiality, \ldots{}", acknowledgement = ack-nhfb, articleno = "40", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Lin:2021:ETB, author = "Jhan-Jia Lin", title = "The Effect of Thickness-Based Dynamic Matching Mechanism on a Hyperledger Fabric-Based {TimeBank} System", journal = j-FUTURE-INTERNET, volume = "13", number = "3", pages = "65", day = "06", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13030065", ISSN = "1999-5903", bibdate = "Fri Mar 26 12:47:18 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/3/65", abstract = "In a community with an aging population, helping each other is a must society function. Lacking mutual trust makes the need for a fair and transparent service exchange platform on top of the public service administration's list. We present an efficient blockchain-based TimeBank realization with a newly proposed dynamic service matching algorithm (DSMA) in this work. The Hyperledger Fabric (or Fabric in short), one of the well-known Consortium Blockchains, is chosen as our system realization platform. It provides the identity certification mechanism and has an extendable network structure. The performance of a DSMA is measured by the waiting time for a service to get a match, called the service-matching waiting time (SMWT). In our DSMA, the decision as to whether a service is to get a match or wait for a later chance depends dynamically on the total number of contemporarily available services (i.e., the thickness of the service market). To better the proposed TimeBank system's service quality, a Dynamic Tuning Strategy (DTS) is designed to thicken the market size. Experimental results show that a thicker market makes on-chain nodes have more links, and in turn, they find a match easier (i.e., consume a shorter SMWT).", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Lisi:2021:RRT, author = "Andrea Lisi and Andrea {De Salve} and Paolo Mori and Laura Ricci and Samuel Fabrizi", title = "Rewarding reviews with tokens: an {Ethereum}-based approach", journal = j-FUT-GEN-COMP-SYS, volume = "120", number = "??", pages = "36--54", month = jul, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.02.003", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:15 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21000480", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Liu:2021:BAB, author = "Han Liu and Dezhi Han and Dun Li", title = "Behavior analysis and blockchain based trust management in {VANETs}", journal = j-J-PAR-DIST-COMP, volume = "151", number = "??", pages = "61--69", month = may, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.02.011", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000320", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Liu:2021:BTSa, author = "Fengrui Liu and Yang Li and Baitong Li and Jiaxin Li and Huiyang Xie", title = "Bitcoin transaction strategy construction based on deep reinforcement learning", journal = "Appl. Soft Comput.", volume = "113", number = "Part", pages = "107952", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2021.107952", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc113.html#LiuLLLX21", acknowledgement = ack-nhfb, dblp-key = "journals/asc/LiuLLLX21", dblp-mdate = "2022-01-08", } @Article{Liu:2021:BTSb, author = "Fengrui Liu and Yang Li and Baitong Li and Jiaxin Li and Huiyang Xie", title = "Bitcoin Transaction Strategy Construction Based on Deep Reinforcement Learning", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2109.14789; https://dblp.org/db/journals/corr/corr2109.html#abs-2109-14789", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2109-14789", dblp-mdate = "2022-01-05", } @Article{Liu:2021:DBB, author = "Yulin Liu and Luyao Zhang and Yinhong Zhao", title = "Deciphering Bitcoin Blockchain Data by Cohort Analysis", journal = "CoRR", volume = "abs/2103.00173", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2103.00173; https://dblp.org/db/journals/corr/corr2103.html#abs-2103-00173", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2103-00173", dblp-mdate = "2022-04-09", } @Article{Loukil:2021:DPB, author = "Faiza Loukil and Chirine Ghedira-Guegan and Khouloud Boukadi and A{\"\i}cha-Nabila Benharkat and Elhadj Benkhelifa", title = "Data Privacy Based on {IoT} Device Behavior Control Using Blockchain", journal = j-TOIT, volume = "21", number = "1", pages = "23:1--23:20", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3434776", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3434776", abstract = "The Internet of Things (IoT) is expected to improve the individuals' quality of life. However, ensuring security and privacy in the IoT context is a non-trivial task due to the low capability of these connected devices. Generally, the IoT device \ldots{}", acknowledgement = ack-nhfb, articleno = "23", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Lu:2021:IMD, author = "Qinghua Lu and An Binh Tran and Ingo Weber and Hugo O'Connor and Paul Rimba and Xiwei Xu and Mark Staples and Liming Zhu and Ross Jeffery", title = "Integrated model-driven engineering of blockchain applications for business processes and asset management", journal = j-SPE, volume = "51", number = "5", pages = "1059--1079", month = may, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2931", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Mon May 17 14:47:48 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "09 November 2020", } @Article{Luo:2021:NMH, author = "Ye Luo and Zehai Su and Wei Zheng and Zhaobin Chen and Fuqin Wang and Zhemin Zhang and Jinjun Chen", title = "A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems", journal = j-TOIT, volume = "21", number = "2", pages = "42:1--42:21", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3408310", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3408310", abstract = "There has been an increasing interest of integrating blockchain into cyber-physical systems (CPS). The design of password hashing schemes (PHSs) is in the core of blockchain security. However, no existing PHS seems to meet both the requirements of \ldots{}", acknowledgement = ack-nhfb, articleno = "42", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Majeed:2021:BIB, author = "Umer Majeed and Latif U. Khan and Ibrar Yaqoob and S. M. Ahsan Kazmi and Khaled Salah and Choong Seon Hong", title = "Blockchain for {IoT}-based smart cities: {Recent} advances, requirements, and future challenges", journal = j-J-NETW-COMPUT-APPL, volume = "181", number = "??", pages = "??--??", day = "1", month = may, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103007", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:43 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521000345", acknowledgement = ack-nhfb, articleno = "103007", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Manzoor:2021:PRE, author = "Ahsan Manzoor and An Braeken and Salil S. Kanhere and Mika Ylianttila and Madhsanka Liyanage", title = "Proxy re-encryption enabled secure and anonymous {IoT} data sharing platform based on blockchain", journal = j-J-NETW-COMPUT-APPL, volume = "176", number = "??", pages = "??--??", day = "15", month = feb, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102917", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:41 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303763", acknowledgement = ack-nhfb, articleno = "102917", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Melo:2021:FSF, author = "Wilson S. Melo and Luiz V. G. Tarelho and Bruno A. Rodrigues and Alysson N. Bessani and Luiz F. R. C. Carmo", title = "Field surveillance of fuel dispensers using {IoT}-based metering and blockchains", journal = j-J-NETW-COMPUT-APPL, volume = "175", number = "??", pages = "??--??", day = "1", month = feb, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102914", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:41 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303738", acknowledgement = ack-nhfb, articleno = "102914", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Mendes:2021:NRS, author = "G. S. Mendes and D. Chen and B. M. C. Silva and C. Serrao and J. Casal", title = "A Novel Reputation System for Mobile App Stores Using Blockchain", journal = j-COMPUTER, volume = "54", number = "2", pages = "39--49", year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.3016205", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Mar 10 07:47:57 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Meng:2021:CBC, author = "T. Meng and Y. Zhao and K. Wolter and C.-Z. Xu", title = "On Consortium Blockchain Consistency: a Queueing Network Model Approach", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "32", number = "6", pages = "1369--1382", year = "2021", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2021.3049915", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Fri Mar 19 06:51:50 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Misra:2021:BEP, author = "S. Misra and A. Mukherjee and A. Roy and N. Saurabh and Y. Rahulamathavan and M. Rajarajan", title = "Blockchain at the Edge: Performance of Resource-Constrained {IoT} Networks", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "32", number = "1", pages = "174--183", year = "2021", CODEN = "ITDSEO", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Fri Aug 28 12:15:02 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Mohammed:2021:BES, author = "Sabah Mohammed and Jinan Fiaidhi and Carlos Ramos and Tai-Hoon Kim and Wai Chi Fang and Tarek Abdelzaher", title = "Blockchain in {eCommerce}: a Special Issue of the {{\booktitle{ACM Transactions on Internet of Things}}}", journal = j-TOIT, volume = "21", number = "1", pages = "4:11--4:55", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3445788", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3445788", abstract = "As blockchain technology is becoming a driving force in the global economy, it is also gaining critical acclaim in the e-commerce industry. Both the blockchain and e-commerce are inseparable as they involve transactions. Blockchain protect transactions \ldots{}", acknowledgement = ack-nhfb, articleno = "4", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Muzumdar:2021:TIS, author = "Ajit Muzumdar and Chirag Modi and Madhu G. M. and C. Vyjayanthi", title = "A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts", journal = j-J-NETW-COMPUT-APPL, volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103074", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:44 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521000977", acknowledgement = ack-nhfb, articleno = "103074", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Nerurkar:2021:DBB, author = "Pranav Nerurkar and Dhiren Patel and Yann Busnel and Romaric Ludinard and Saru Kumari and Muhammad Khurram Khan", title = "Dissecting bitcoin blockchain: {Empirical} analysis of bitcoin network (2009--2020)", journal = j-J-NETW-COMPUT-APPL, volume = "177", number = "??", pages = "??--??", day = "1", month = mar, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102940", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:42 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303982", acknowledgement = ack-nhfb, articleno = "102940", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Nerurkar:2021:SLM, author = "Pranav Nerurkar and Sunil Bhirud and Dhiren R. Patel and Romaric Ludinard and Yann Busnel and Saru Kumari", title = "Supervised learning model for identifying illegal activities in Bitcoin", journal = "Appl. Intell.", volume = "51", number = "6", pages = "3824--3843", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s10489-020-02048-w", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/apin/apin51.html#NerurkarBPLBK21", acknowledgement = ack-nhfb, dblp-key = "journals/apin/NerurkarBPLBK21", dblp-mdate = "2022-01-03", } @Article{Nguyen:2021:BBI, author = "Truc D. T. Nguyen and My T. Thai", title = "A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels", journal = j-TOIT, volume = "21", number = "2", pages = "39:1--39:22", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3389249", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3389249", abstract = "Although the iterative double auction has been widely used in many different applications, one of the major problems in its current implementations is that they rely on a trusted third party to handle the auction process. This imposes the risk of single \ldots{}", acknowledgement = ack-nhfb, articleno = "39", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Nguyen:2021:SBE, author = "Gia Nhu Nguyen and Nin Ho Le Viet and Mohamed Elhoseny and K. Shankar and B. B. Gupta and Ahmed A. Abd El-Latif", title = "Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with {ResNet} model", journal = j-J-PAR-DIST-COMP, volume = "153", number = "??", pages = "150--160", month = jul, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.03.011", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:06 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000642", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Oliveira:2021:ATC, author = "Vinicius C. Oliveira and Julia {Almeida Valadares} and Jose Eduardo A. Sousa and Alex {Borges Vieira} and Heder {Soares Bernardino} and Saulo {Moraes Villela} and Glauber {Dias Goncalves}", title = "Analyzing Transaction Confirmation in {Ethereum} Using Machine Learning Techniques", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "12--15", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466832", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3466826.3466832", abstract = "Ethereum has emerged as one of the most important cryptocurrencies in terms of the number of transactions. Given the recent growth of Ethereum, the cryptocurrency community and researchers are interested in understanding the Ethereum transactions \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Oliveira:2021:GDI, author = "Catarina Oliveira and Jo{\~a}o Torres and Maria In{\^e}s Silva and David Apar{\'\i}cio and Jo{\~a}o Tiago Ascens{\~a}o and Pedro Bizarro", title = "{GuiltyWalker}: Distance to illicit nodes in the Bitcoin network", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2102.05373; https://dblp.org/db/journals/corr/corr2102.html#abs-2102-05373", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2102-05373", dblp-mdate = "2021-02-18", } @Article{Piao:2021:DSS, author = "Yangheran Piao and Kai Ye and Xiaohui Cui", title = "A Data Sharing Scheme for {GDPR}-Compliance Based on Consortium Blockchain", journal = j-FUTURE-INTERNET, volume = "13", number = "8", pages = "217", day = "21", month = aug, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13080217", ISSN = "1999-5903", bibdate = "Thu Aug 26 10:44:38 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/8/217", abstract = "After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished financially for this reason. This study proposes a blockchain-based GDPR compliance data sharing scheme, aiming to promote compliance with regulations and provide a tool for interaction between users and service providers to achieve data security sharing. The zero-knowledge Succinct Non-Interactive Arguments of Knowledge (zk-SNARK) algorithm is adopted for protecting data and ensure that the user's private data can satisfy the individual requirements of the service provider without exposing user data. The proposed scheme ensures mutual authentication through the Proof of Authority consensus based on the Committee Endorsement Mechanism (CEM-PoA), and prevents nodes from doing evil using the reputation incentive mechanism. Theoretical analysis and performance comparison indicate that the scheme meets the confidentiality, availability, and other indicators. It has superiority in efficiency and privacy protection compared with other schemes.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", } @Article{Podili:2021:TTA, author = "Prashanth Podili and Kotaro Kataoka", title = "{TRAQR}: {Trust} aware {End}-to-{End QoS} routing in multi-domain {SDN} using {Blockchain}", journal = j-J-NETW-COMPUT-APPL, volume = "182", number = "??", pages = "??--??", day = "15", month = may, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103055", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:43 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521000795", acknowledgement = ack-nhfb, articleno = "103055", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Qi:2021:PPB, author = "Yuanhang Qi and M. Shamim Hossain and Jiangtian Nie and Xuandi Li", title = "Privacy-preserving blockchain-based federated learning for traffic flow prediction", journal = j-FUT-GEN-COMP-SYS, volume = "117", number = "??", pages = "328--337", month = apr, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.12.003", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:14 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X2033065X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Misc{Raghavan:2021:BGF, author = "Barath Raghavan and Bruce Schneier", title = "Bitcoin's Greatest Feature Is Also Its Existential Threat. {The} cryptocurrency depends on the integrity of the blockchain. {But} {China}'s censors, the {FBI}, or powerful corporations could fragment it into oblivion", howpublished = "Web site", day = "9", month = mar, year = "2021", bibdate = "Sat Apr 17 15:31:18 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/", abstract = "Security researchers have recently discovered a botnet with a novel defense against takedowns. Normally, authorities can disable a botnet by taking over its command-and-control server. With nowhere to go for instructions, the botnet is rendered useless. But over the years, botnet designers have come up with ways to make this counterattack harder. Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Since the blockchain is globally accessible and hard to take down, the botnet's operators appear to be safe.", acknowledgement = ack-nhfb, } @Article{Rathore:2021:TDL, author = "Heena Rathore and Abhay Samant and Murtuza Jadliwala", title = "{TangleCV}: a Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles", journal = j-TCPS, volume = "5", number = "1", pages = "6:1--6:25", month = jan, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3404500", ISSN = "2378-962X (print), 2378-9638 (electronic)", ISSN-L = "2378-962X", bibdate = "Sun Mar 28 07:37:45 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tcps.bib", URL = "https://dl.acm.org/doi/10.1145/3404500", abstract = "Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and \ldots{}", acknowledgement = ack-nhfb, articleno = "6", fjournal = "ACM Transactions on Cyber-Physical Systems", journal-URL = "https://dl.acm.org/loi/tcps", } @Article{Ren:2021:DBS, author = "Wei Ren and Xutao Wan and Pengcheng Gan", title = "A double-blockchain solution for agricultural sampled data security in {Internet of Things} network", journal = j-FUT-GEN-COMP-SYS, volume = "117", number = "??", pages = "453--461", month = apr, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.12.007", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:14 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X20330697", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ren:2021:MCS, author = "Yongjun Ren and Yan Leng and Jian Qi and Pradip Kumar Sharma and Jin Wang and Zafer Almakhadmeh and Amr Tolba", title = "Multiple cloud storage mechanism based on blockchain in smart homes", journal = j-FUT-GEN-COMP-SYS, volume = "115", number = "??", pages = "304--313", month = feb, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2020.09.019", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 30 13:50:11 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X19319041", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Roy:2021:BBC, author = "Deepsubhra Guha Roy and Satish Narayana Srirama", title = "A Blockchain-based Cyber Attack Detection Scheme for Decentralized {Internet of Things} using Software-Defined Network", journal = j-SPE, volume = "51", number = "7", pages = "1540--1556", month = jul, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2972", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jul 23 09:04:36 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "07 May 2021", } @Article{Saad:2021:CMC, author = "Muhammad Saad and Joongheon Kim and DaeHun Nyang and David Mohaisen", title = "{Contra-*}: {Mechanisms} for countering spam attacks on {blockchain}'s memory pools", journal = j-J-NETW-COMPUT-APPL, volume = "179", number = "??", pages = "??--??", day = "1", month = apr, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102971", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:42 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520304227", acknowledgement = ack-nhfb, articleno = "102971", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Salcedo:2021:EIL, author = "Eduardo Salcedo and Manjul Gupta", title = "The effects of individual-level espoused national cultural values on the willingness to use Bitcoin-like blockchain currencies", journal = "Int. J. Inf. Manag.", volume = "60", number = "??", pages = "102388", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.ijinfomgt.2021.102388", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijinfoman/ijinfoman60.html#SalcedoG21", acknowledgement = ack-nhfb, dblp-key = "journals/ijinfoman/SalcedoG21", dblp-mdate = "2021-08-26", } @Article{Sarfaraz:2021:TSB, author = "Aaliya Sarfaraz and Ripon K. Chakrabortty and Daryl L. Essam", title = "A tree structure-based improved blockchain framework for a secure online bidding system", journal = j-COMPUT-SECUR, volume = "102", number = "??", pages = "Article 102147", month = mar, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102147", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:09 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S016740482030420X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Sarier:2021:CBB, author = "Neyire Deniz Sarier", title = "Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management", journal = j-COMPUT-SECUR, volume = "105", number = "??", pages = "Article 102243", month = jun, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102243", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Tue May 4 07:59:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821000675", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Saxena:2021:BBS, author = "Shivam Saxena and Bharat Bhushan and Mohd Abdul Ahad", title = "Blockchain based solutions to secure {IoT}: {Background}, integration trends and a way forward", journal = j-J-NETW-COMPUT-APPL, volume = "181", number = "??", pages = "??--??", day = "1", month = may, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103050", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:43 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521000758", acknowledgement = ack-nhfb, articleno = "103050", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Serrano:2021:BRN, author = "Will Serrano", title = "The {Blockchain Random Neural Network} for cybersecure {IoT} and {5G} infrastructure in {Smart Cities}", journal = j-J-NETW-COMPUT-APPL, volume = "175", number = "??", pages = "??--??", day = "1", month = feb, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102909", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:41 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303696", acknowledgement = ack-nhfb, articleno = "102909", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Shayan:2021:BBS, author = "M. Shayan and C. Fung and C. J. M. Yoon and I. Beschastnikh", title = "{Biscotti}: a Blockchain System for Private and Secure Federated Learning", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "32", number = "7", pages = "1513--1525", year = "2021", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2020.3044223", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Fri Mar 19 06:51:50 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Shekhtman:2021:EBB, author = "Louis Shekhtman and Erez Waisbard", title = "{EngraveChain}: a Blockchain-Based Tamper-Proof Distributed Log System", journal = j-FUTURE-INTERNET, volume = "13", number = "6", pages = "143", day = "29", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13060143", ISSN = "1999-5903", bibdate = "Sat Jun 26 11:42:17 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/6/143", abstract = "A reliable log system is a prerequisite for many applications. Financial systems need to have transactions logged in a precise manner, medical systems rely on having trusted medical records and security logs record system access requests in order to trace malicious attempts. Keeping multiple copies helps to achieve availability and reliability against such hackers. Unfortunately, maintaining redundant copies in a distributed manner in a byzantine setting has always been a challenging task, however it has recently become simpler given advances in blockchain technologies. In this work, we present a tamper-resistant log system through the use of a blockchain. We leverage the immutable write action and distributed storage provided by the blockchain as a basis to develop a secure log system, but we also add a privacy preserving layer that is essential for many applications. We detail the security and privacy aspects of our solution, as well as how they relate to performance needs in relevant settings. Finally, we implement our system over Hyperledger Fabric and demonstrate the system's value for several use cases. In addition, we provide a scalability analysis for applying our solution in a large-scale system.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Shen:2021:RDB, author = "Chien-wen Shen and Li-chin Chang and Tzu-chuan Su", title = "Research development of Bitcoin: a network and concept linking analysis", journal = "Libr. Hi Tech", volume = "39", number = "2", pages = "488--505", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1108/LHT-10-2019-0210", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/lht/lht39.html#ShenCS21", acknowledgement = ack-nhfb, dblp-key = "journals/lht/ShenCS21", dblp-mdate = "2021-07-29", } @Article{Shi:2021:WCB, author = "Leyi Shi and Xiaoyu Li and Zhenbo Gao and Pengfei Duan and Na Liu and Honglong Chen", title = "Worm computing: a blockchain-based resource sharing and cybersecurity framework", journal = j-J-NETW-COMPUT-APPL, volume = "185", number = "??", pages = "??--??", day = "1", month = jul, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103081", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:44 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S108480452100103X", acknowledgement = ack-nhfb, articleno = "103081", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Simoes:2021:BPT, author = "Jefferson E. Simoes and Eduardo Ferreira and Daniel S. Menasch{\'e} and Carlos A. V. Campos", title = "Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "8--11", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466831", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3466826.3466831", abstract = "Cryptocurrencies typically aim at preserving the privacy of their users. Different cryptocurrencies preserve privacy at various levels, some of them requiring users to rely on strategies to raise the privacy level to their needs. Among those strategies, \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Singh:2021:CDS, author = "Parminder Singh and Mehedi Masud and M. Shamim Hossain and Avinash Kaur", title = "Cross-domain secure data sharing using blockchain for industrial {IoT}", journal = j-J-PAR-DIST-COMP, volume = "156", number = "??", pages = "176--184", month = oct, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.05.007", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Thu Feb 10 06:39:19 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S074373152100112X", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Song:2021:SCS, author = "A. Qun Song and Yuhao Chen and Yan Zhong and Kun Lan and Simon Fong and B. Rui Tang", title = "A Supply-chain System Framework Based on {Internet of Things} Using Blockchain Technology", journal = j-TOIT, volume = "21", number = "1", pages = "13:1--13:24", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3409798", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3409798", abstract = "Numerous supply-chain combines with internet of things (IoT) applications have been proposed, and many methods and algorithms enhance the convenience of supply chains. However, new businesses still find it challenging to enter a supply chain, because \ldots{}", acknowledgement = ack-nhfb, articleno = "13", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Sookhak:2021:BSC, author = "Mehdi Sookhak and Mohammad Reza Jabbarpour and Nader Sohrabi Safa and F. Richard Yu", title = "Blockchain and smart contract for access control in healthcare: a survey, issues and challenges, and open issues", journal = j-J-NETW-COMPUT-APPL, volume = "178", number = "??", pages = "??--??", day = "15", month = mar, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102950", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:42 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520304045", acknowledgement = ack-nhfb, articleno = "102950", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Sousa:2021:FUP, author = "Jose Eduardo A. Sousa and Vinicius C. Oliveira and Julia {Almeida Valadares} and Alex {Borges Vieira} and Heder S. Bernardino and Saulo {Moraes Villela} and Glauber {Dias Goncalves}", title = "Fighting Under-price {DoS} Attack in {Ethereum} with Machine Learning Techniques", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "24--27", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466835", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3466826.3466835", abstract = "Ethereum is one of the most popular cryptocurrency currently and it has been facing security threats and attacks. As a consequence, Ethereum users may experience long periods to validate transactions. Despite the maintenance on the Ethereum mechanisms, \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Stoepker:2021:RAB, author = "Ivo Stoepker and Rowel G{\"u}ndlach and Stella Kapodistria", title = "Robustness analysis of Bitcoin confirmation times", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "20--23", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466834", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dblp.org/db/journals/sigmetrics/sigmetrics48.html#StoepkerGK21; https://dl.acm.org/doi/10.1145/3466826.3466834", abstract = "Bitcoin payments require a random amount of time to get confirmed (i.e. to be grouped by the miners into a block and to be added to the Bitcoin blockchain). In [8, 11], the authors propose the modelling of the Bitcoin confirmation time by the so-called \ldots{}", acknowledgement = ack-nhfb, dblp-key = "journals/sigmetrics/StoepkerGK21", dblp-mdate = "2021-06-11", fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Sun:2021:RCR, author = "Lijun Sun and Qian Yang and Xiao Chen and Zhenxiang Chen", title = "{RC}-chain: Reputation-based crowdsourcing blockchain for vehicular networks", journal = j-J-NETW-COMPUT-APPL, volume = "176", number = "??", pages = "??--??", day = "15", month = feb, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102956", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:41 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520304082", acknowledgement = ack-nhfb, articleno = "102956", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Sun:2021:RRS, author = "You Sun and Rui Xue and Rui Zhang and Qianqian Su and Sheng Gao", title = "{RTChain}: a Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain", journal = j-TOIT, volume = "21", number = "1", pages = "15:1--15:24", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3430502", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3430502", abstract = "Blockchain technology, whose most successful application is Bitcoin, enables non-repudiation and non-tamperable online transactions without the participation of a trusted central party. As a global ledger, the blockchain achieves the consistency of \ldots{}", acknowledgement = ack-nhfb, articleno = "15", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Tan:2021:BEA, author = "Liang Tan and Na Shi and Keping Yu and Moayad Aloqaily and Yaser Jararweh", title = "A Blockchain-empowered Access Control Framework for Smart Devices in Green {Internet of Things}", journal = j-TOIT, volume = "21", number = "3", pages = "80:1--80:20", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3433542", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Sat Aug 7 15:54:18 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3433542", abstract = "Green Internet of things (GIoT) generally refers to a new generation of Internet of things design concept. It can save energy and reduce emissions, reduce environmental pollution, waste of resources, and harm to human body and environment, in which green smart device (GSD) is a basic unit of GIoT for saving energy. With the access of a large number of heterogeneous bottom-layer GSDs in GIoT, user access and control of GSDs have become more and more complicated. Since there is no unified GSD management system, users need to operate different GIoT applications and access different GIoT cloud platforms when accessing and controlling these heterogeneous GSDs. This fragmented GSD management model not only increases the complexity of user access and control for heterogeneous GSDs, but also reduces the scalability of GSDs applications. To address this issue, this article presents a blockchain-empowered general GSD access control framework, which provides users with a unified GSD management platform. First, based on the World Wide Web Consortium (W3C) decentralized identifiers (DIDs) standard, users and GSD are issued visual identity (VID). Then, we extended the GSD-DIDs protocol to authenticate devices and users. Finally, based on the characteristics of decentralization and non-tampering of blockchain, a unified access control system for GSD was designed, including the registration, granting, and revoking of access rights. We implement and test on the Raspberry Pi device and the FISCO-BCOS alliance chain. The experimental results prove that the framework provides a unified and feasible way for users to achieve decentralized, lightweight, and fine-grained access control of GSDs. The solution reduces the complexity of accessing and controlling GSDs, enhances the scalability of GSD applications, as well as guarantees the credibility and immutability of permission data and identity data during access.", acknowledgement = ack-nhfb, articleno = "80", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Tovanich:2021:VBD, author = "Natkamon Tovanich and Nicolas Heulot and Jean-Daniel Fekete and Petra Isenberg", title = "Visualization of Blockchain Data: a Systematic Review", journal = j-IEEE-TRANS-VIS-COMPUT-GRAPH, volume = "27", number = "7", pages = "3135--3152", month = jul, year = "2021", CODEN = "ITVGEA", DOI = "https://doi.org/10.1109/TVCG.2019.2963018", ISSN = "1077-2626", ISSN-L = "1077-2626", bibdate = "Fri Jun 4 09:45:45 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransviscomputgraph2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Visualization and Computer Graphics", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945", } @Article{Tran:2021:IBI, author = "Nguyen Khoi Tran and M. Ali Babar and Jonathan Boan", title = "Integrating blockchain and {Internet of Things} systems: a systematic review on objectives and designs", journal = j-J-NETW-COMPUT-APPL, volume = "173", number = "??", pages = "??--??", day = "1", month = jan, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102844", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520303118", acknowledgement = ack-nhfb, articleno = "102844", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Treiblmaier:2021:ENW, author = "Horst Treiblmaier", title = "Exploring the Next Wave of Blockchain and Distributed Ledger Technology: The Overlooked Potential of Scenario Analysis", journal = j-FUTURE-INTERNET, volume = "13", number = "7", pages = "183", day = "19", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13070183", ISSN = "1999-5903", bibdate = "Fri Jul 23 15:16:13 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/7/183", abstract = "Blockchain is predicted to disrupt industries, economies, and societies. The properties of distributed ledgers allow the creation of immutable data structures that facilitate shared access in real time and enable a plethora of innovative applications. However, blockchain is not a uniform technology but rather a bundle of evolving components whose implications are notoriously hard to predict. At present, it is not clear how current trends will evolve, with technical evolution, legislation, and public policy being three contingency factors that make ongoing disruptive transformations particularly hard to predict. In light of blockchain's potential disruptive impact, it is surprising that scenario analysis has hitherto been largely ignored in academic research. Therefore, in this paper, we introduce the technique, clarify several misconceptions, and provide examples illustrating how this method can help to overcome the limitations of existing technology impact research. We conclude that if applied correctly, scenario analysis represents the ideal tool to rigorously explore uncertain future developments and to create a comprehensive foundation for future research.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Truong:2021:BBT, author = "Nguyen Truong and Gyu Myoung Lee and Kai Sun and Florian Guitton and YiKe Guo", title = "A blockchain-based trust system for decentralised applications: When trustless needs trust", journal = j-FUT-GEN-COMP-SYS, volume = "124", number = "??", pages = "68--79", month = nov, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.05.025", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:20 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21001758", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Unvan:2021:IBU, author = "Y{\"u}ksel Akay {\"U}nvan", title = "Impacts of {Bitcoin} on {USA}, {Japan}, {China} and {Turkey} stock market indexes: Causality analysis with value at risk method {(VAR)}", journal = j-COMMUN-STAT-THEORY-METH, volume = "50", number = "7", pages = "1599--1614", year = "2021", CODEN = "CSTMDC", DOI = "https://doi.org/10.1080/03610926.2019.1678644", ISSN = "0361-0926 (print), 1532-415X (electronic)", ISSN-L = "0361-0926", bibdate = "Tue May 4 18:03:34 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/communstattheorymeth2020.bib", URL = "http://www.tandfonline.com/doi/full/10.1080/03610926.2019.1678644", acknowledgement = ack-nhfb, fjournal = "Communications in Statistics: Theory and Methods", journal-URL = "http://www.tandfonline.com/loi/lsta20", } @Article{Vacca:2021:SLR, author = "Anna Vacca and Andrea {Di Sorbo} and Corrado A. Visaggio and Gerardo Canfora", title = "A systematic literature review of blockchain and smart contract development: {Techniques}, tools, and open challenges", journal = j-J-SYST-SOFTW, volume = "174", number = "??", pages = "??--??", month = apr, year = "2021", CODEN = "JSSODM", DOI = "https://doi.org/10.1016/j.jss.2020.110891", ISSN = "0164-1212 (print), 1873-1228 (electronic)", ISSN-L = "0164-1212", bibdate = "Mon May 24 20:13:56 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsystsoftw2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0164121220302818", acknowledgement = ack-nhfb, articleno = "110891", fjournal = "Journal of Systems and Software", journal-URL = "http://www.sciencedirect.com/science/journal/01641212", } @Book{vanOorschot:2021:CSI, author = "Paul C. van Oorschot", title = "Computer security and the {Internet}: tools and jewels from malware to {Bitcoin}", publisher = "Springer", address = "Cham, Switzerland", edition = "Second", pages = "xxix + 446", year = "2021", DOI = "https://doi.org/10.1007/978-3-030-83411-1", ISBN = "3-030-83410-7 (hardcover), 3-030-83411-5 (e-book)", ISBN-13 = "978-3-030-83410-4 (hardcover), 978-3-030-83411-1 (e-book)", LCCN = "QA76.9.A25 V66 2021", bibdate = "Mon May 5 07:17:42 MDT 2025", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/internet2020.bib", series = "Information security and cryptography", abstract = "Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years. Computer Security and the Internet is elementary in that it assumes no background in security, but unlike oft high-level texts it does not avoid low-level details. The book reinforces fundamental academic concepts with examples and also relates these concepts to practical challenges and real-world incidents. Its overriding focus is brevity, without sacrificing breadth of core topics or technical detail within them; it designates selected content as optional to help readers prioritize topics. While knowledge of elementary operating-system and networking concepts is helpful, review sections summarize the essential background. Topics and features: Delivers comprehensive, technically sound explanations without burdening readers with mathematical proofs or lengthy source-code examples (NEW) adds chapter on wireless LAN security (Wi-Fi and 802.11) (NEW) adds chapter on Bitcoin and Ethereum, blockchains and cryptocurrencies Integrates inline exercises and supplemental per-chapter references and endnotes, bridging to further topics and serving as a springboard to research literature. Dives selectively into fine points for exemplary topics to concretely illustrate concepts and principles. Provides pointers to key surveys and relevant standards, including from the Internet Engineering Task Force and the U.S. National Institute of Standards and Technology. Ideal for a one- or two-term introductory course for junior\slash senior undergraduate or first-year graduate students, this textbook\slash reference is also suitable for self-study by anyone seeking a solid footing in security, including software developers and computing professionals, technical managers, and government staff. Paul C. van Oorschot is a Professor of Computer Science at Carleton University (Ottawa), Canada Research Chair in Authentication and Computer Security, ACM Fellow, and IEEE Fellow. His earlier industrial career was in telecommunications and software security.", acknowledgement = ack-nhfb, subject = "Computer security; Internet; Security measures", tableofcontents = "1. Security Concepts and Principles \\ 2. Cryptographic Building Blocks \\ 3. User Authentication passwords, Biometrics and Alternatives \\ 4. Authentication Protocols and Key Establishment.-5. Operating System Security and Access Control \\ 6. Software Security exploits and Privilege Escalation \\ 7. Malicious Software \\ 8. Public-Key Certificate Management and Use Cases \\ 9. Web and Browser Security \\ 10. Firewalls and Tunnels \\ 11. Intrusion Detection and Network-Based Attacks \\ 12. Wireless LAN Security: 802.11 and Wi-Fi \\ 13. Bitcoin, Blockchains and Ethereum \\ Epilogue \\ Index", } @Article{Vasiliauskaite:2021:IDP, author = "Vaiva Vasiliauskaite and Fabrizio Lillo and Nino Antulov-Fantulin", title = "Information dynamics of price and liquidity around the 2017 Bitcoin markets crash", journal = "CoRR", volume = "abs/2111.09057", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2111.09057; https://dblp.org/db/journals/corr/corr2111.html#abs-2111-09057", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2111-09057", dblp-mdate = "2021-11-22", } @Article{Victor:2021:TDL, author = "F. Victor and P. Ruppel and A. Kupper", title = "A Taxonomy for Distributed Ledger Analytics", journal = j-COMPUTER, volume = "54", number = "2", pages = "30--38", year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2020.3017466", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Wed Mar 10 07:47:57 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Vishwakarma:2021:SIS, author = "Lokendra Vishwakarma and Debasis Das", title = "{SCAB--IoTA}: Secure communication and authentication for {IoT} applications using blockchain", journal = j-J-PAR-DIST-COMP, volume = "154", number = "??", pages = "94--105", month = aug, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.04.003", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Thu Feb 10 06:39:17 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000800", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Vladyko:2021:TPA, author = "Andrei Vladyko and Anastasia Spirkina and Vasiliy Elagin", title = "Towards Practical Applications in Modeling Blockchain System", journal = j-FUTURE-INTERNET, volume = "13", number = "5", pages = "125", day = "12", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13050125", ISSN = "1999-5903", bibdate = "Fri May 28 20:44:52 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/5/125", abstract = "Like multiservice networks, blockchain technology is currently experiencing significant development because of its decentralization and ability to organize secure, seamless, reliable data exchange and storage. Due to the significant demand for the technology, there is a need to analyze the impact of these technology processes on network characteristics to predict traffic behavior and ensure required quality indicators, as well as on the stability of public communication network elements when blockchain technology operates. Conducting a full-scale experiment is a time-consuming task that cannot always be accomplished, so in this paper, the authors propose considering approaches to modeling these systems and, as an example, propose to use a simulation system to assess the performance of the network and its elements.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Waheed:2021:SPI, author = "Nazar Waheed and Xiangjian He and Muhammad Ikram and Muhammad Usman and Saad Sajid Hashmi and Muhammad Usman", title = "Security and Privacy in {IoT} Using Machine Learning and Blockchain: Threats and Countermeasures", journal = j-COMP-SURV, volume = "53", number = "6", pages = "122:1--122:37", month = feb, year = "2021", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3417987", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Fri Feb 5 10:42:27 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3417987", abstract = "Security and privacy of users have become significant concerns due to the involvement of the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at an explosive pace making the existing security and privacy measures inadequate. Hence, everyone on the Internet is a product for hackers. Consequently, Machine Learning (ML) algorithms are used to produce accurate outputs from large complex databases, where the generated outputs can be used to predict and detect vulnerabilities in IoT-based systems. Furthermore, Blockchain (BC) techniques are becoming popular in modern IoT applications to solve security and privacy issues. Several studies have been conducted on either ML algorithms or BC techniques. However, these studies target either security or privacy issues using ML algorithms or BC techniques, thus posing a need for a combined survey on efforts made in recent years addressing both security and privacy issues using ML algorithms and BC techniques. In this article, we provide a summary of research efforts made in the past few years, from 2008 to 2019, addressing security and privacy issues using ML algorithms and BC techniques in the IoT domain. First, we discuss and categorize various security and privacy threats reported in the past 12 years in the IoT domain. We then classify the literature on security and privacy efforts based on ML algorithms and BC techniques in the IoT domain. Finally, we identify and illuminate several challenges and future research directions using ML algorithms and BC techniques to address security and privacy issues in the IoT domain.", acknowledgement = ack-nhfb, articleno = "122", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Wan:2021:WDP, author = "Zhiyuan Wan and Xin Xia and Ahmed E. Hassan", title = "What Do Programmers Discuss About Blockchain? {A} Case Study on the Use of Balanced {LDA} and the Reference Architecture of a Domain to Capture Online Discussions About Blockchain Platforms Across Stack Exchange Communities", journal = j-IEEE-TRANS-SOFTW-ENG, volume = "47", number = "7", pages = "1331--1349", year = "2021", CODEN = "IESEDJ", DOI = "https://doi.org/10.1109/TSE.2019.2921343", ISSN = "0098-5589 (print), 1939-3520 (electronic)", ISSN-L = "0098-5589", bibdate = "Thu Jul 22 07:47:31 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Software Engineering", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32", } @Article{Wang:2021:ABB, author = "Qin Wang and Shiping Chen and Yang Xiang", title = "Anonymous Blockchain-based System for Consortium", journal = j-TMIS, volume = "12", number = "3", pages = "26:1--26:25", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3459087", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3459087", abstract = "Blockchain records transactions with various protection techniques against tampering. To meet the requirements on cooperation and anonymity of companies and organizations, researchers have developed a few solutions. Ring signature-based schemes allow multiple participants cooperatively to manage while preserving their individuals' privacy. However, the solutions cannot work properly due to the increased computing complexity along with the expanded group size. In this article, we propose a Multi-center Anonymous Blockchain-based (MAB) system, with joint management for the consortium and privacy protection for the participants. To achieve that, we formalize the syntax used by the MAB system and present a general construction based on a modular design. By applying cryptographic primitives to each module, we instantiate our scheme with anonymity and decentralization. Furthermore, we carry out a comprehensive formal analysis of our exemplified scheme. A proof of concept simulation is provided to show the feasibility. The results demonstrate security and efficiency from both theoretical perspectives and practical perspectives.", acknowledgement = ack-nhfb, articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wang:2021:BBP, author = "Hao Wang and Shenglan Ma and Chaonian Guo and Yulei Wu and Hong-Ning Dai and Di Wu", title = "Blockchain-Based Power Energy Trading Management", journal = j-TOIT, volume = "21", number = "2", pages = "43:1--43:16", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3409771", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Jun 23 06:35:35 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3409771", abstract = "Distributed peer-to-peer power energy markets are emerging quickly. Due to central governance and lack of effective information aggregation mechanisms, energy trading cannot be efficiently scheduled and tracked. We devise a new distributed energy \ldots{}", acknowledgement = ack-nhfb, articleno = "43", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Wang:2021:BEV, author = "Jian Wang and Yongxin Liu and Shuteng Niu and Houbing Song and Weipeng Jing and Jiawei Yuan", title = "Blockchain enabled verification for cellular-connected unmanned aircraft system networking", journal = j-FUT-GEN-COMP-SYS, volume = "123", number = "??", pages = "233--244", month = oct, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.05.002", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:18 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21001461", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2021:BSJ, author = "Yu Wang and Liangbin Zhao", title = "Blockchain for scholarly journal evaluation: Potential and prospects", journal = j-LEARN-PUBL, volume = "34", number = "4", pages = "682--687", month = oct, year = "2021", CODEN = "LEPUFJ", DOI = "https://doi.org/10.1002/leap.1408", ISSN = "0953-1513 (print), 1741-4857 (electronic)", ISSN-L = "0953-1513", bibdate = "Mon Feb 21 14:54:27 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/learnpubl.bib", acknowledgement = ack-nhfb, ajournal = "Learn. Publ.", fjournal = "Learned Publishing", journal-URL = "https://onlinelibrary.wiley.com/journal/17414857", onlinedate = "15 June 2021", } @Article{Wang:2021:HPP, author = "Baocheng Wang and Zetao Li", title = "{Healthchain}: a Privacy Protection System for Medical Data Based on Blockchain", journal = j-FUTURE-INTERNET, volume = "13", number = "10", pages = "247", day = "24", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13100247", ISSN = "1999-5903", bibdate = "Fri Oct 22 11:19:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/10/247", abstract = "Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the general trends. While bringing convenience to people, the explosive growth of medical data will further promote the value of mining medical data. Obviously, finding out how to safely store such a large amount of data is a problem that urgently needs to be solved. Additionally, the particularity of medical data makes it necessarily subject to great privacy protection needs. This reinforces the importance of designing a safe solution to ensure data privacy. Many existing schemes are based on single-server architecture, which have some natural defects (such as single-point faults). Although blockchain can help solve such problems, there are still some deficiencies in privacy protection. To solve these problems, this paper designs a medical data privacy protection system, which integrates blockchain, group signature, and asymmetric encryption to realize reliable medical data sharing between medical institutions and protect the data privacy of patients. This paper proves theoretically that it meets our security and privacy requirements, and proves its practicability through system implementation.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", } @Article{Wang:2021:ICR, author = "Xu Wang and Yanjiao Chen and Qian Zhang", title = "Incentivizing cooperative relay in {UTXO}-based blockchain network", journal = j-COMP-NET-AMSTERDAM, volume = "185", number = "??", pages = "Article 107631", day = "11", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2020.107631", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Sat Mar 27 13:48:27 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128620312573", acknowledgement = ack-nhfb, fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Wang:2021:RBB, author = "Huaqun Wang and Debiao He and Jia Yu and Neal N. Xiong and Bin Wu", title = "{RDIC}: a blockchain-based remote data integrity checking scheme for {IoT} in {5G} networks", journal = j-J-PAR-DIST-COMP, volume = "152", number = "??", pages = "1--10", month = jun, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.02.012", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000332", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Wang:2021:SDD, author = "Liang Wang and Jiayan Liu and Wenyuan Liu", title = "Staged data delivery protocol: a blockchain-based two-stage protocol for non-repudiation data delivery", journal = j-CCPE, volume = "33", number = "13", pages = "e6240:1--e6240:??", day = "10", month = jul, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6240", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:49:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "01 March 2021", } @Article{Weber:2021:KAD, author = "Ingo Weber", title = "{Keynote}: Analysing Data from Blockchains", journal = j-SIGMETRICS, volume = "48", number = "4", pages = "3--3", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466826.3466829", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu May 20 08:57:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3466826.3466829", abstract = "Blockchain is a novel distributed ledger technology. Through its features and smart contract capabilities, a wide range of application areas opened up for blockchain-based innovation [5]. In order to analyse how concrete blockchain systems as well as \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Wu:2021:SPP, author = "Hongjiao Wu and Ashutosh Dhar Dwivedi and Gautam Srivastava", title = "Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology", journal = j-TOMM, volume = "17", number = "2s", pages = "60:1--60:17", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3408321", ISSN = "1551-6857 (print), 1551-6865 (electronic)", ISSN-L = "1551-6857", bibdate = "Tue Jun 22 08:33:16 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tomccap.bib", URL = "https://dl.acm.org/doi/10.1145/3408321", abstract = "The essence of ``blockchain'' is a shared database in which information stored is un-falsifiable, traceable, open, and transparent. Therefore, to improve the security of private information in medical systems, this article \ldots{} (More)", acknowledgement = ack-nhfb, articleno = "60", fjournal = "ACM Transactions on Multimedia Computing, Communications, and Applications", journal-URL = "https://dl.acm.org/loi/tomm", } @Article{Xiao:2021:NDS, author = "Shuai Xiao and Han Wang and Jindan Zhang", title = "New digital signature algorithm based on {ECC} and its application in bitcoin and {IoT}", journal = "Int. J. High Perform. Syst. Archit.", volume = "10", number = "1", pages = "20--31", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1504/IJHPSA.2021.115503", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijhpsa/ijhpsa10.html#XiaoWZ21", acknowledgement = ack-nhfb, dblp-key = "journals/ijhpsa/XiaoWZ21", dblp-mdate = "2021-07-01", } @Article{Xie:2021:AAW, author = "Xueshuo Xie and Jiming Wang and Junyi Ye and Yaozheng Fang and Ye Lu and Tao Li and Guiling Wang", title = "{AWAP}: Adaptive weighted attribute propagation enhanced community detection model for bitcoin de-anonymization", journal = "Appl. Soft Comput.", volume = "109", number = "??", pages = "107507", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2021.107507", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc109.html#XieWYFLLW21", acknowledgement = ack-nhfb, dblp-key = "journals/asc/XieWYFLLW21", dblp-mdate = "2021-11-16", } @Article{Xu:2021:BBR, author = "Zisang Xu and Wei Liang and Kuan-Ching Li and Jianbo Xu and Hai Jin", title = "A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for {Internet of Vehicles}", journal = j-J-PAR-DIST-COMP, volume = "149", number = "??", pages = "29--39", month = mar, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2020.11.003", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731520304044", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Xu:2021:CPB, author = "Xiaolong Xu and Dawei Zhu and Xiaoxian Yang and Shuo Wang and Lianyong Qi and Wanchun Dou", title = "Concurrent Practical {Byzantine} Fault Tolerance for Integration of Blockchain and Supply Chain", journal = j-TOIT, volume = "21", number = "1", pages = "7:1--7:17", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3395331", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3395331", abstract = "Currently, the integration of the supply chain and blockchain is promising, as blockchain successfully eliminates the bullwhip effect in the supply chain. Generally, concurrent Practical Byzantine Fault Tolerance (PBFT) consensus method, named C-PBFT, \ldots{}", acknowledgement = ack-nhfb, articleno = "7", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Xu:2021:EPE, author = "Ronghua Xu and Deeraj Nagothu and Yu Chen", title = "{EconLedger}: a Proof-of-{ENF} Consensus Based Lightweight Distributed Ledger for {IoVT} Networks", journal = j-FUTURE-INTERNET, volume = "13", number = "10", pages = "248", day = "24", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13100248", ISSN = "1999-5903", bibdate = "Fri Oct 22 11:19:02 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/10/248", abstract = "The rapid advancement in artificial intelligence (AI) and wide deployment of Internet of Video Things (IoVT) enable situation awareness (SAW). The robustness and security of IoVT systems are essential for a sustainable urban environment. While blockchain technology has shown great potential in enabling trust-free and decentralized security mechanisms, directly embedding cryptocurrency oriented blockchain schemes into resource-constrained Internet of Video Things (IoVT) networks at the edge is not feasible. By leveraging Electrical Network Frequency (ENF) signals extracted from multimedia recordings as region-of-recording proofs, this paper proposes EconLedger, an ENF-based consensus mechanism that enables secure and lightweight distributed ledgers for small-scale IoVT edge networks. The proposed consensus mechanism relies on a novel Proof-of-ENF (PoENF) algorithm where a validator is qualified to generate a new block if and only if a proper ENF-containing multimedia signal proof is produced within the current round. The decentralized database (DDB) is adopted in order to guarantee efficiency and resilience of raw ENF proofs on the off-chain storage. A proof-of-concept prototype is developed and tested in a physical IoVT network environment. The experimental results validated the feasibility of the proposed EconLedger to provide a trust-free and partially decentralized security infrastructure for IoVT edge networks.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/1999-5903/", } @Article{Xu:2021:SSB, author = "Cheng Xu and Ce Zhang and Jianliang Xu and Jian Pei", title = "{SlimChain}: scaling blockchain transactions through off-chain storage and parallel processing", journal = j-PROC-VLDB-ENDOWMENT, volume = "14", number = "11", pages = "2314--2326", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.14778/3476249.3476283", ISSN = "2150-8097", bibdate = "Fri Oct 29 18:05:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/10.14778/3476249.3476283", abstract = "Blockchain technology has emerged as the cornerstone of many decentralized applications operating among otherwise untrusted peers. However, it is well known that existing blockchain systems do not scale well. Transactions are often executed and \ldots{}", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Yakubu:2021:BBS, author = "Bello Musa Yakubu and Majid I. Khan and Nadeem Javaid and Abid Khan", title = "Blockchain-based secure multi-resource trading model for smart marketplace", journal = j-COMPUTING, volume = "103", number = "3", pages = "379--400", month = mar, year = "2021", CODEN = "CMPTA2", DOI = "https://doi.org/10.1007/s00607-020-00886-7", ISSN = "0010-485X (print), 1436-5057 (electronic)", ISSN-L = "0010-485X", bibdate = "Wed Mar 31 15:46:38 MDT 2021", bibsource = "http://link.springer.com/journal/607/103/3; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computing.bib", acknowledgement = ack-nhfb, fjournal = "Computing", journal-URL = "http://link.springer.com/journal/607", } @Article{Yan:2021:SCD, author = "Zheng Yan and Li Peng and Wei Feng and Laurence T. Yang", title = "Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking", journal = j-TOIT, volume = "21", number = "1", pages = "17:1--17:28", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3419102", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Feb 24 21:53:14 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3419102", abstract = "Pervasive Social Networking (PSN) supports online and instant social activities with the support of heterogeneous networks. Since reciprocal activities among both familiar/unfamiliar strangers and acquaintances are quite common in PSN, it is essential \ldots{}", acknowledgement = ack-nhfb, articleno = "17", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Yang:2021:AAB, author = "Zhi-Peng Yang", title = "An Accelerating Approach for Blockchain Information Transmission Based on {NDN}", journal = j-FUTURE-INTERNET, volume = "13", number = "2", pages = "47", day = "14", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13020047", ISSN = "1999-5903", bibdate = "Fri Feb 26 10:54:58 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/2/47", abstract = "Blockchain is becoming more and more popular in various fields. Since the information transmission mode of the blockchain is data broadcasting, the traditional TCP/IP network cannot support the blockchain system well, but the Named-Data Networking (NDN) could be a good choice because of its multi-path forwarding and intra-network caching functions. In this article, we propose a new blockchain information transmission acceleration strategy (AITS) combining with graph theory and probability theory based on the NDN architecture. We select some more important nodes in the network as ``secondary nodes'', and give them more bandwidth and cache space to assist the NDN network in data transmission. In order to select the correct node as the secondary node, we present a method to calculate the number of secondary nodes, and give the function to calculate the importance of each node. The simulation results show that in complex networks, the proposed method has superior performance in accelerating information transmission and reducing data overhead.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", remark = "Special Issue The Next Blockchain Wave Current Challenges and Future Prospects.", } @Article{Yang:2021:BBA, author = "Guang Yang and Chunlei Li and Kjell E. Marstein", title = "A blockchain-based architecture for securing electronic health record systems", journal = j-CCPE, volume = "33", number = "14", pages = "e5479:1--e5479:??", day = "25", month = jul, year = "2021", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.5479", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:49:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "04 August 2019", } @Article{Yang:2021:SBS, author = "Dana Yang and Seohee Yoo and Inshil Doh and Kijoon Chae", title = "Selective blockchain system for secure and efficient {D2D} communication", journal = j-J-NETW-COMPUT-APPL, volume = "173", number = "??", pages = "??--??", day = "1", month = jan, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2020.102817", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Mon May 24 15:12:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804520302885", acknowledgement = ack-nhfb, articleno = "102817", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Young:2021:ETM, author = "Edward Henry Young and Christos Chrysoulas and Nikolaos Pitropakis and Pavlos Papadopoulos and William J. Buchanan", title = "Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2021", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2110.01970; https://dblp.org/db/journals/corr/corr2110.html#abs-2110-01970", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2110-01970", dblp-mdate = "2021-10-08", } @Article{Yu:2021:BBC, author = "Haiyang Yu and Shuai Ma and Qi Hu and Zhen Yang", title = "Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks", journal = j-COMPUTER, volume = "54", number = "8", pages = "33--45", month = aug, year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2021.3080332", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Aug 5 06:37:19 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Yu:2021:IDM, author = "Dejian Yu and Libo Sheng", title = "Influence difference main path analysis: Evidence from {DNA} and blockchain domain citation networks", journal = j-J-INFORMETRICS, volume = "15", number = "4", pages = "Article 101186", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.joi.2021.101186", ISSN = "1751-1577 (print), 1875-5879 (electronic)", ISSN-L = "1751-1577", bibdate = "Thu Mar 10 06:27:37 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinformetrics.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1751157721000572", acknowledgement = ack-nhfb, fjournal = "Journal of Informetrics", journal-URL = "http://www.sciencedirect.com/science/journal/17511577/", } @Article{Yu:2021:TMP, author = "Dejian Yu and Tianxing Pan", title = "Tracing the main path of interdisciplinary research considering citation preference: a case from blockchain domain", journal = j-J-INFORMETRICS, volume = "15", number = "2", pages = "Article 101136", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.joi.2021.101136", ISSN = "1751-1577 (print), 1875-5879 (electronic)", ISSN-L = "1751-1577", bibdate = "Thu Mar 10 06:27:36 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinformetrics.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1751157721000079", acknowledgement = ack-nhfb, fjournal = "Journal of Informetrics", journal-URL = "http://www.sciencedirect.com/science/journal/17511577/", } @Article{Zhang:2021:DCM, author = "Jing Zhang and Qi-zhi He", title = "Dynamic Cross-Market Volatility Spillover Based on {MSV} Model: Evidence from Bitcoin, Gold, Crude Oil, and Stock Markets", journal = "Complex.", volume = "2021", number = "??", pages = "9912418:1--9912418:8", month = "????", year = "2021", CODEN = "????", DOI = "https://doi.org/10.1155/2021/9912418", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/complexity/complexity2021.html#ZhangH21", acknowledgement = ack-nhfb, dblp-key = "journals/complexity/ZhangH21", dblp-mdate = "2022-01-18", } @Article{Zhang:2021:RAT, author = "Lejun Zhang and Yanfei Zou and Weizheng Wang and Zilong Jin and Yansen Su and Huiling Chen", title = "Resource allocation and trust computing for blockchain-enabled edge computing system", journal = j-COMPUT-SECUR, volume = "105", number = "??", pages = "Article 102249", month = jun, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102249", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Tue May 4 07:59:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821000730", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zhang:2021:RRI, author = "Zhebin Zhang and Dajie Dong and Yuhang Ma and Yilong Ying and Dawei Jiang and Ke Chen and Lidan Shou and Gang Chen", title = "{Refiner}: a reliable incentive-driven federated learning system powered by blockchain", journal = j-PROC-VLDB-ENDOWMENT, volume = "14", number = "12", pages = "2659--2662", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.14778/3476311.3476313", ISSN = "2150-8097", bibdate = "Fri Oct 29 16:41:16 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/10.14778/3476311.3476313", abstract = "Modern mobile applications often produce decentralized data, i.e., a huge amount of privacy-sensitive data distributed over a large number of mobile devices. Techniques for learning models from decentralized data must properly handle two natures of such \ldots{}", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Zhang:2021:TID, author = "Cheng Zhang and Zhifei Ni and Yang Xu and Entao Luo and Linweiya Chen and Yaoxue Zhang", title = "A trustworthy industrial data management scheme based on redactable blockchain", journal = j-J-PAR-DIST-COMP, volume = "152", number = "??", pages = "167--176", month = jun, year = "2021", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2021.02.026", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed May 26 16:11:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731521000472", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Zhou:2021:BBD, author = "Zhili Zhou and Meimin Wang and Ching-Nung Yang and Zhangjie Fu and Xingming Sun and Q. M. Jonathan Wu", title = "Blockchain-based decentralized reputation system in E-commerce environment", journal = j-FUT-GEN-COMP-SYS, volume = "124", number = "??", pages = "155--167", month = nov, year = "2021", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.05.035", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:20 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21001850", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zulfiqar:2021:EEB, author = "Maryam Zulfiqar and Filza Tariq and Muhammad Umar Janjua and Adnan Noor Mian and Adnan Qayyum and Junaid Qadir and Falak Sher and Muhammad Hassan", title = "{EthReview}: an {Ethereum}-based Product Review System for Mitigating Rating Frauds", journal = j-COMPUT-SECUR, volume = "100", number = "??", pages = "Article 102094", month = jan, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2020.102094", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Wed Mar 10 08:25:08 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404820303679", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Abdo:2022:ERG, author = "Jacques Bou Abdo and Shuvalaxmi Dass and Basheer Qolomany and Liaquat Hossain", title = "Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks", journal = "CoRR", volume = "abs/2206.09011", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2206.09011", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2206.html#abs-2206-09011", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2206-09011", dblp-mdate = "2023-03-21", } @Article{Abubaker:2022:TDT, author = "Zain Abubaker and Asad Ullah Khan and Ahmad Almogren and Shahid Abbas and Atia Javaid and Ayman Radwan and Nadeem Javaid", title = "Trustful data trading through monetizing {IoT} data using {BlockChain} based review system", journal = j-CCPE, volume = "34", number = "5", pages = "e6739:1--e6739:??", day = "28", month = feb, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6739", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:08 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "30 November 2021", } @Article{Akcora:2022:BND, author = "Cuneyt Gurcan Akcora and Yulia R. Gel and Murat Kantarcioglu", title = "Blockchain networks: Data structures of Bitcoin, {Monero}, {Zcash}, {Ethereum}, {Ripple}, and {Iota}", journal = "WIREs Data Mining Knowl. Discov.", volume = "12", number = "1", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1002/widm.1436", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/widm/widm12.html#AkcoraGK22", acknowledgement = ack-nhfb, dblp-key = "journals/widm/AkcoraGK22", dblp-mdate = "2022-02-08", } @Article{Auer:2022:TBI, author = "Sophia Auer and Sophia Nagler and Somnath Mazumdar and Raghava Rao Mukkamala", title = "Towards blockchain-{IoT} based shared mobility: Car-sharing and leasing as a case study", journal = j-J-NETW-COMPUT-APPL, volume = "200", number = "??", pages = "??--??", month = apr, year = "2022", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103316", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Fri Feb 18 11:00:30 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521003015", acknowledgement = ack-nhfb, articleno = "103316", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Azouvi:2022:PSP, author = "Sarah Azouvi and Marko Vukolic", title = "{Pikachu}: Securing {PoS} Blockchains from Long-Range Attacks by Checkpointing into Bitcoin {PoW} using {Taproot}", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2208.05408", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2208.html#abs-2208-05408", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2208-05408", dblp-mdate = "2022-08-16", } @Article{Baniata:2022:DDO, author = "Hamza Baniata and Ahmad Anaqreh and Attila Kertesz", title = "{DONS}: Dynamic Optimized Neighbor Selection for smart blockchain networks", journal = j-FUT-GEN-COMP-SYS, volume = "130", number = "??", pages = "75--90", month = may, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.12.010", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:30 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X2100491X", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bartoletti:2022:VLR, author = "Massimo Bartoletti and Stefano Lande and Maurizio Murgia and Roberto Zunino", title = "Verifying liquidity of recursive Bitcoin contracts", journal = "Log. Methods Comput. Sci.", volume = "18", number = "1", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.46298/lmcs-18(1:22)2022", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/lmcs/lmcs18.html#BartolettiLMZ22", acknowledgement = ack-nhfb, dblp-key = "journals/lmcs/BartolettiLMZ22", dblp-mdate = "2023-01-24", } @Article{Belchior:2022:HFT, author = "Rafael Belchior and Andr{\'e} Vasconcelos and Miguel Correia and Thomas Hardjono", title = "{Hermes}: Fault-tolerant middleware for blockchain interoperability", journal = j-FUT-GEN-COMP-SYS, volume = "129", number = "??", pages = "236--251", month = apr, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.11.004", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:29 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21004337", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Belchior:2022:SBI, author = "Rafael Belchior and Andr{\'e} Vasconcelos and S{\'e}rgio Guerreiro and Miguel Correia", title = "A Survey on Blockchain Interoperability: Past, Present, and Future Trends", journal = j-COMP-SURV, volume = "54", number = "8", pages = "168:1--168:41", month = nov, year = "2022", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3471140", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Tue Oct 5 08:39:24 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3471140", abstract = "Blockchain interoperability is emerging as one of the crucial features of blockchain technology, but the knowledge necessary for achieving it is fragmented. This fact makes it challenging for academics and the industry to achieve interoperability among \ldots{}", acknowledgement = ack-nhfb, articleno = "168", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Benedetti:2022:PLB, author = "Marco Benedetti and Francesco {De Sclavis} and Marco Favorito and Giuseppe Galano and Sara Giammusso and Antonio Muci and Matteo Nardelli", title = "A {PoW}-less Bitcoin with Certified {Byzantine} Consensus", journal = "CoRR", volume = "abs/2207.06870", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2207.06870", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2207.html#abs-2207-06870", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2207-06870", dblp-mdate = "2022-07-19", } @Article{Benkoczi:2022:QBM, author = "Robert Benkoczi and Daya Ram Gaur and Naya Nagy and Marius Nagy and Shahadat Hossain", title = "Quantum Bitcoin Mining", journal = j-ENTROPY, volume = "24", number = "3", pages = "323", month = "????", year = "2022", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e24030323", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy24.html#BenkocziGNNH22", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/BenkocziGNNH22", dblp-mdate = "2022-10-02", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Bolonhez:2022:CBQ, author = "Eduardo Bolonhez and Thuener Silva and Bruno Fanzeres", title = "A core-based quota allocation model for the Bitcoin-refunded Blockchain network", journal = j-EXPERT-SYST-APPL, volume = "209", number = "??", pages = "118201", month = "????", year = "2022", CODEN = "ESAPEH", DOI = "https://doi.org/10.1016/j.eswa.2022.118201", ISSN = "????", ISSN-L = "0957-4174", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/eswa/eswa209.html#BolonhezSF22", acknowledgement = ack-nhfb, dblp-key = "journals/eswa/BolonhezSF22", dblp-mdate = "2022-10-18", fjournal = "Expert Systems with Applications", journal-URL = "http://www.sciencedirect.com/science/journal/09574174", } @Article{Chen:2022:BBR, author = "Lanxiang Chen and Qingxiao Fu and Yi Mu and Lingfang Zeng and Fatemeh Rezaeibagha and Min-Shiang Hwang", title = "Blockchain-based random auditor committee for integrity verification", journal = j-FUT-GEN-COMP-SYS, volume = "131", number = "??", pages = "183--193", month = jun, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.01.019", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Mar 9 17:27:32 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000267", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Cortesi:2022:NAB, author = "Eugenio Cortesi and Francesco Bruschi and Stefano Secci and Sami Taktak", title = "A new approach for {Bitcoin} pool-hopping detection", journal = j-COMP-NET-AMSTERDAM, volume = "205", number = "??", pages = "??--??", day = "14", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108758", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Wed Feb 9 17:45:00 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621006009", acknowledgement = ack-nhfb, articleno = "108758", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Dargahi:2022:IBC, author = "Tooska Dargahi and Hossein Ahmadvand and Mansour Naser Alraja and Chia-Mu Yu", title = "Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge", journal = j-JDIQ, volume = "14", number = "1", pages = "5:1--5:10", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3460003", ISSN = "1936-1955", ISSN-L = "1936-1955", bibdate = "Thu Feb 3 06:14:38 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jdiq.bib", URL = "https://dl.acm.org/doi/10.1145/3460003", abstract = "Connected and Autonomous Vehicles (CAVs) are introduced to improve individuals' quality of life by offering a wide range of services. They collect a huge amount of data and exchange them with each other and the infrastructure. The collected data usually includes sensitive information about the users and the surrounding environment. Therefore, data security and privacy are among the main challenges in this industry. Blockchain, an emerging distributed ledger, has been considered by the research community as a potential solution for enhancing data security, integrity, and transparency in Intelligent Transportation Systems (ITS). However, despite the emphasis of governments on the transparency of personal data protection practices, CAV stakeholders have not been successful in communicating appropriate information with the end users regarding the procedure of collecting, storing, and processing their personal data, as well as the data ownership. This article provides a vision of the opportunities and challenges of adopting blockchain in ITS from the ``data transparency'' and ``privacy'' perspective. The main aim is to answer the following questions: (1) Considering the amount of personal data collected by the CAVs, such as location, how would the integration of blockchain technology affect transparency, fairness, and lawfulness of personal data processing concerning the data subjects (as this is one of the main principles in the existing data protection regulations)? (2) How can the trade-off between transparency and privacy be addressed in blockchain-based ITS use cases?", acknowledgement = ack-nhfb, articleno = "5", fjournal = "Journal of Data and Information Quality (JDIQ)", journal-URL = "https://dl.acm.org/loi/jdiq", } @Article{Deepa:2022:SBB, author = "N. Deepa and Quoc-Viet Pham and Dinh C. Nguyen and Sweta Bhattacharya and B. Prabadevi and Thippa Reddy Gadekallu and Praveen Kumar Reddy Maddikunta and Fang Fang and Pubudu N. Pathirana", title = "A survey on blockchain for big data: Approaches, opportunities, and future directions", journal = j-FUT-GEN-COMP-SYS, volume = "131", number = "??", pages = "209--226", month = jun, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.01.017", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Mar 9 17:27:32 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000243", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ebrahimpour:2022:CBT, author = "Ghader Ebrahimpour and Mohammad Sayad Haghighi and Mamoun Alazab", title = "Can Blockchain be Trusted in {Industry 4.0}? {Study} of a Novel Misleading Attack on Bitcoin", journal = "IEEE Trans. Ind. Informatics", volume = "18", number = "11", pages = "8307--8315", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1109/TII.2022.3142036", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/tii/tii18.html#EbrahimpourHA22", acknowledgement = ack-nhfb, dblp-key = "journals/tii/EbrahimpourHA22", dblp-mdate = "2022-10-18", } @Article{Erfanian:2022:PBB, author = "Sahar Erfanian and Yewang Zhou and Amar Razzaq and Azhar Abbas and Asif Ali Safeer and Teng Li", title = "Predicting Bitcoin ({BTC}) Price in the Context of Economic Theories: a Machine Learning Approach", journal = j-ENTROPY, volume = "24", number = "10", pages = "1487", month = "????", year = "2022", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e24101487", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy24.html#ErfanianZRASL22", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/ErfanianZRASL22", dblp-mdate = "2022-12-07", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Fan:2022:DAV, author = "Huiling Fan", title = "The digital asset value and currency supervision under deep learning and blockchain technology", journal = j-J-COMPUT-APPL-MATH, volume = "407", number = "??", pages = "??--??", month = jun, year = "2022", CODEN = "JCAMDI", DOI = "https://doi.org/10.1016/j.cam.2021.114061", ISSN = "0377-0427 (print), 1879-1778 (electronic)", ISSN-L = "0377-0427", bibdate = "Wed Feb 9 08:44:26 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S037704272100621X", acknowledgement = ack-nhfb, articleno = "114061", fjournal = "Journal of Computational and Applied Mathematics", journal-URL = "http://www.sciencedirect.com/science/journal/03770427", } @Article{Gao:2022:FBB, author = "Liang Gao and Li Li and Yingwen Chen and ChengZhong Xu and Ming Xu", title = "{FGFL}: a blockchain-based fair incentive governor for Federated Learning", journal = j-J-PAR-DIST-COMP, volume = "163", number = "??", pages = "283--299", month = may, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.01.019", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Tue Mar 15 06:00:21 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522000259", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Gebraselase:2022:BPN, author = "Befekadu Gezaheng Gebraselase and Bjarne E. Helvik and Yuming Jiang", title = "Bitcoin {P2P} Network Measurements: a testbed study of the effect of peer selection on transaction propagation and confirmation times", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2205.00745", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2205.html#abs-2205-00745", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2205-00745", dblp-mdate = "2023-02-06", } @Article{Ghosh:2022:BCF, author = "Bikramaditya Ghosh and Elie Bouri", title = "Is Bitcoin's Carbon Footprint Persistent? {Multifractal} Evidence and Policy Implications", journal = j-ENTROPY, volume = "24", number = "5", pages = "647", month = "????", year = "2022", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e24050647", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy24.html#GhoshB22", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/GhoshB22", dblp-mdate = "2022-06-13", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Gong:2022:ATP, author = "Bei Gong and Chi Cui and Mingsheng Hu and Chong Guo and Xiaochong Li and Yuheng Ren", title = "Anonymous Traceability protocol based on Group Signature for Blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "127", number = "??", pages = "160--167", month = feb, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.09.020", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:25 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21003666", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Hatemi-J:2022:BDB, author = "Abdulnasser Hatemi-J and Mohamed A. Hajji and Elie Bouri and Rangan Gupta", title = "The Benefits of Diversification Between Bitcoin, Bonds, Equities and the {US} Dollar: a Matter of Portfolio Construction", journal = "Asia Pac. J. Oper. Res.", volume = "39", number = "4", pages = "2040024:1--2040024:11", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1142/S0217595920400242", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/apjor/apjor39.html#Hatemi-JHBG22", acknowledgement = ack-nhfb, dblp-key = "journals/apjor/Hatemi-JHBG22", dblp-mdate = "2022-12-06", } @Article{He:2022:BBA, author = "Songlin He and Eric Ficke and Mir Mehedi Ahsan Pritom and Huashan Chen and Qiang Tang and Qian Chen and Marcus Pendleton and Laurent Njilla and Shouhuai Xu", title = "Blockchain-based automated and robust cyber security management", journal = j-J-PAR-DIST-COMP, volume = "163", number = "??", pages = "62--82", month = may, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.01.002", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Tue Mar 15 06:00:21 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522000089", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Huang:2022:ERA, author = "Huawei Huang and Zhengyu Yue and Xiaowen Peng and Liuding He and Wuhui Chen and Hong-Ning Dai and Zibin Zheng and Song Guo", title = "Elastic Resource Allocation Against Imbalanced Transaction Assignments in Sharding-Based Permissioned Blockchains", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "33", number = "10", pages = "2372--2385", month = oct, year = "2022", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2022.3141737", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Thu Mar 10 07:11:55 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Hyland-Wood:2022:GEB, author = "David Hyland-Wood and Sandra Johnson", title = "Guest editorial: Blockchain consensus protocols", journal = j-COMP-NET-AMSTERDAM, volume = "207", number = "??", pages = "??--??", day = "22", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.108861", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Wed Mar 16 07:35:04 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128622000718", acknowledgement = ack-nhfb, articleno = "108861", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Jiang:2022:RDD, author = "Nianqi Jiang and Fenhua Bai and Lin Huang and Zhengyuan An and Tao Shen", title = "Reputation-Driven Dynamic Node Consensus and Reliability Sharding Model in {IoT} Blockchain", journal = j-ALGORITHMS-BASEL, volume = "15", number = "2", month = feb, year = "2022", CODEN = "ALGOCH", DOI = "https://doi.org/10.3390/a15020028", ISSN = "1999-4893 (electronic)", ISSN-L = "1999-4893", bibdate = "Fri Feb 25 07:00:22 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/algorithms.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.mdpi.com/1999-4893/15/2/28", acknowledgement = ack-nhfb, articleno = "28", fjournal = "Algorithms (Basel)", journal-URL = "https://www.mdpi.com/journal/algorithms", pagecount = "??", } @Article{Khan:2022:GCA, author = "Muhammad Milhan Afzal Khan and Hafiz Muhammad Azeem Sarwar and Muhammad Awais", title = "Gas consumption analysis of {Ethereum} blockchain transactions", journal = j-CCPE, volume = "34", number = "4", pages = "e6679:1--e6679:??", day = "15", month = feb, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6679", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "03 November 2021", } @Article{Khanal:2022:UBI, author = "Yurika Pant Khanal and Abeer Alsadoon and Khurram Shahzad and Ahmad B. Al-Khalil and Penatiyana W. C. Prasad and Sabih Ur Rehman and Rafiqul Islam", title = "Utilizing Blockchain for {IoT} Privacy through Enhanced {ECIES} with Secure Hash Function", journal = j-FUTURE-INTERNET, volume = "14", number = "3", pages = "77", day = "28", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14030077", ISSN = "1999-5903", bibdate = "Fri Mar 4 08:59:15 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "https://www.mdpi.com/1999-5903/14/3/77", abstract = "Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT system. This work aims to preserve the privacy of user access policy by protecting the confidentiality and authenticity of the transmitted message while obtaining the necessary consents for data access. We consider a Modified Elliptic Curve Integrated Encryption Scheme (ECIES) to improve the security strength of the transmitted message. A secure hash function is used in conjunction with a key derivation function to modify the encryption procedure, which enhances the efficiency of the encryption and decryption by generating multiple secure keys through one master key. The proposed solution eliminates user-dependent variables by including transaction generation and verification in the calculation of computation time, resulting in increased system reliability. In comparison to previously established work, the security of the transmitted message is improved through a reduction of more than 12\% in the correlation coefficient between the constructed request transaction and encrypted transaction, coupled with a decrease of up to 7\% in computation time.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Kim:2022:TCM, author = "Hyeonoh Kim and Eojin Yi and Daeyong Lee and Kwangwon Ahn", title = "Technological Change and Market Conditions: Evidence from Bitcoin Fork", journal = "Complex.", volume = "2022", number = "??", pages = "2617752:1--2617752:7", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1155/2022/2617752", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/complexity/complexity2022.html#KimYLA22", acknowledgement = ack-nhfb, dblp-key = "journals/complexity/KimYLA22", dblp-mdate = "2023-01-15", } @Article{Kolar:2022:PDC, author = "Martin Kol{\'a}r", title = "{PNPCoin}: Distributed Computing on Bitcoin infrastructure", journal = "CoRR", volume = "abs/2208.12628", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2208.12628", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2208.html#abs-2208-12628", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2208-12628", dblp-mdate = "2022-08-30", } @Article{Kraehenbuehl:2022:EMH, author = "Mike Kraehenbuehl and J{\"o}rg Osterrieder", title = "The Efficient Market Hypothesis for Bitcoin in the context of neural networks", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2208.07254", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2208.html#abs-2208-07254", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2208-07254", dblp-mdate = "2022-08-17", } @Article{Kurbucz:2022:LLM, author = "Marcell T. Kurbucz and P{\'e}ter P{\'o}sfay and Antal Jakov{\'a}c", title = "Linear Laws of {Markov} Chains with an Application for Anomaly Detection in Bitcoin Prices", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2201.09790; https://dblp.org/db/journals/corr/corr2201.html#abs-2201-09790", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2201-09790", dblp-mdate = "2022-02-02", } @Article{Li:2022:PIT, author = "Zecheng Li and Haotian Wu and Lap Hou Lao and Songtao Guo and Yuanyuan Yang and Bin Xiao", title = "{Pistis}: Issuing Trusted and Authorized Certificates With Distributed Ledger and {TEE}", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "33", number = "7", pages = "1636--1649", month = jul, year = "2022", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2021.3121562", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Tue Nov 9 11:11:37 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Li:2022:SDB, author = "Guozhi Li and Yifan Dong and Jirui Li and Xuekun Song", title = "Strategy for dynamic blockchain construction and transmission in novel edge computing networks", journal = j-FUT-GEN-COMP-SYS, volume = "130", number = "??", pages = "19--32", month = may, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.12.005", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:30 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21004866", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Liu:2022:BEF, author = "Lin Liu and Wei-Tek Tsai and Md. Zakirul Alam Bhuiyan and Hao Peng and Mingsheng Liu", title = "Blockchain-enabled fraud discovery through abnormal smart contract detection on {Ethereum}", journal = j-FUT-GEN-COMP-SYS, volume = "128", number = "??", pages = "158--166", month = mar, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.08.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:27 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21003319", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Lohachab:2022:TIB, author = "Ankur Lohachab and Saurabh Garg and Byeong Kang and Muhammad Bilal Amin and Junmin Lee and Shiping Chen and Xiwei Xu", title = "Towards Interconnected Blockchains: a Comprehensive Review of the Role of Interoperability among Disparate Blockchains", journal = j-COMP-SURV, volume = "54", number = "7", pages = "135:1--135:39", month = sep, year = "2022", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3460287", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sat Sep 18 07:43:03 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3460287", abstract = "Unprecedented attention towards blockchain technology is serving as a game-changer in fostering the development of blockchain-enabled distinctive frameworks. However, fragmentation unleashed by its underlying concepts hinders different stakeholders from effectively utilizing blockchain-supported services, resulting in the obstruction of its wide-scale adoption. To explore synergies among the isolated frameworks requires comprehensively studying inter-blockchain communication approaches. These approaches broadly come under the umbrella of Blockchain Interoperability (BI) notion, as it can facilitate a novel paradigm of an integrated blockchain ecosystem that connects state-of-the-art disparate blockchains. Currently, there is a lack of studies that comprehensively review BI, which works as a stumbling block in its development. Therefore, this article aims to articulate potential of BI by reviewing it from diverse perspectives. Beginning with a glance of blockchain architecture fundamentals, this article discusses its associated platforms, taxonomy, and consensus mechanisms. Subsequently, it argues about BI's requirement by exemplifying its potential opportunities and application areas. Concerning BI, an architecture seems to be a missing link. Hence, this article introduces a layered architecture for the effective development of protocols and methods for interoperable blockchains. Furthermore, this article proposes an in-depth BI research taxonomy and provides an insight into the state-of-the-art projects. Finally, it determines possible open challenges and future research in the domain.", acknowledgement = ack-nhfb, articleno = "135", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Luo:2022:NCC, author = "Xiangyang Luo and Pei Zhang and Mingliang Zhang and Hao Li and Qingfeng Cheng", title = "A Novel Covert Communication Method Based on Bitcoin Transaction", journal = "IEEE Trans. Ind. Informatics", volume = "18", number = "4", pages = "2830--2839", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1109/TII.2021.3100480", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/tii/tii18.html#LuoZZLC22", acknowledgement = ack-nhfb, dblp-key = "journals/tii/LuoZZLC22", dblp-mdate = "2022-01-21", } @Article{Ma:2022:BEF, author = "Xuyang Ma and Du Xu and Katinka Wolter", title = "Blockchain-enabled feedback-based combinatorial double auction for cloud markets", journal = j-FUT-GEN-COMP-SYS, volume = "127", number = "??", pages = "225--239", month = feb, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.09.009", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:25 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21003551", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Mehta:2022:EBM, author = "Shikha Mehta and Mukta Goyal and Dinesh Saini", title = "Efficient Bitcoin Mining Using Genetic Algorithm-Based Proof of Work", journal = "Int. J. Fuzzy Syst. Appl.", volume = "11", number = "2", pages = "1--17", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.4018/ijfsa.296593", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ijfsa/ijfsa11.html#MehtaMGS22", acknowledgement = ack-nhfb, dblp-key = "journals/ijfsa/MehtaMGS22", dblp-mdate = "2022-08-08", } @Article{Metin:2022:MMF, author = "Serdar Metin and Can {\"O}zturan", title = "Max--min fairness based faucet design for blockchains", journal = j-FUT-GEN-COMP-SYS, volume = "131", number = "??", pages = "18--27", month = jun, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.01.008", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Mar 9 17:27:32 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000164", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Monem:2022:ICS, author = "Maruf Monem and Md. Golam Rabiul Alam and Mohammad Abdullah-Al-Wadud and Shamsul Huda and Mohammad Mehedi Hassan and Giancarlo Fortino", title = "An {Industry-4.0}-Complaint Sustainable Bitcoin Model Through Optimized Transaction Selection and Sustainable Block Integration", journal = "IEEE Trans. Ind. Informatics", volume = "18", number = "12", pages = "9162--9172", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1109/TII.2022.3159673", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/tii/tii18.html#MonemAAHHF22", acknowledgement = ack-nhfb, dblp-key = "journals/tii/MonemAAHHF22", dblp-mdate = "2022-10-18", } @Article{Mu:2022:IPS, author = "Rui Mu and Bei Gong and Zhenhu Ning and Jiangjiang Zhang and Yang Cao and Zheng Li and Wei Wang and Xiaoping Wang", title = "An identity privacy scheme for blockchain-based on edge computing", journal = j-CCPE, volume = "34", number = "1", pages = "e6545:1--e6545:??", day = "10", month = jan, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6545", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:04 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "02 August 2021", } @Article{Mukta:2022:SDM, author = "Rahma Mukta and Hye-young Paik and Qinghua Lu and Salil S. Kanhere", title = "A survey of data minimisation techniques in blockchain-based healthcare", journal = j-COMP-NET-AMSTERDAM, volume = "205", number = "??", pages = "??--??", day = "14", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.108766", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Wed Feb 9 17:45:00 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128622000044", acknowledgement = ack-nhfb, articleno = "108766", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Nainani:2022:FRL, author = "Jatin Nainani and Nirman Taterh and Md Ausaf Rashid and Ankit Khivasara", title = "Feature-Rich Long-term Bitcoin Trading Assistant", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2209.12664", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2209.html#abs-2209-12664", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2209-12664", dblp-mdate = "2022-10-06", } @Article{Naresh:2022:PSS, author = "Vankamamidi S. Naresh and V. V. L. Divakar Allavarpu and Sivaranjani Reddi and Pilla Sita Rama Murty and N. V. S. Lakshmipathi Raju and R. N. V. Jagan Mohan", title = "A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad-hoc networks", journal = j-CCPE, volume = "34", number = "3", pages = "e6553:1--e6553:??", day = "1", month = feb, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6553", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "09 August 2021", } @Article{Nasir:2022:SBS, author = "Muhammad Hassan Nasir and Junaid Arshad and Muhammad Mubashir Khan and Mahawish Fatima and Khaled Salah and Raja Jayaraman", title = "Scalable blockchains --- A systematic review", journal = j-FUT-GEN-COMP-SYS, volume = "126", number = "??", pages = "136--162", month = jan, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.07.035", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:24 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21002971", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Natgunanathan:2022:BBA, author = "Iynkaran Natgunanathan and Purathani Praitheeshan and Longxiang Gao and Yong Xiang and Lei Pan", title = "Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks", journal = j-TOMM, volume = "18", number = "3", pages = "86:1--86:23", month = aug, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3492803", ISSN = "1551-6857 (print), 1551-6865 (electronic)", ISSN-L = "1551-6857", bibdate = "Thu Mar 24 08:21:55 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tomccap.bib", URL = "https://dl.acm.org/doi/10.1145/3492803", abstract = "Copyright protection in multimedia protection distribution is a challenging problem. To protect multimedia data, many watermarking methods have been proposed in the literature. However, most of them cannot be used effectively in a multimedia distribution \ldots{}", acknowledgement = ack-nhfb, articleno = "86", fjournal = "ACM Transactions on Multimedia Computing, Communications, and Applications", journal-URL = "https://dl.acm.org/loi/tomm", } @Article{OHare:2022:MTM, author = "John Joseph O'Hare and Allen Fairchild and Umran Ali", title = "Money and Trust in Metaverses, Bitcoin and Stablecoins in global social {XR}", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2207.09460", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2207.html#abs-2207-09460", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2207-09460", dblp-mdate = "2022-07-25", } @Article{Parvini:2022:FBR, author = "Navid Parvini and Mahsa Abdollahi and Sattar Seifollahi and Davood Ahmadian", title = "Forecasting Bitcoin returns with long short-term memory networks and wavelet decomposition: a comparison of several market determinants", journal = "Appl. Soft Comput.", volume = "121", number = "??", pages = "108707", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2022.108707", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc121.html#ParviniASA22", acknowledgement = ack-nhfb, dblp-key = "journals/asc/ParviniASA22", dblp-mdate = "2022-06-13", } @Article{Perry:2022:BWM, author = "Tekla S. Perry", title = "A Bitcoin Wallet for the Masses: Square simplified credit-card transactions. Now it wants to build cryptocurrency hardware", journal = j-IEEE-SPECTRUM, volume = "59", number = "1", pages = "42--43", month = jan, year = "2022", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.2022.9676357", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Thu Jan 20 07:40:10 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", } @Article{Pon:2022:BBC, author = "Partheeban Pon and {Kavitha V}", title = "Blockchain based cloud service security architecture with distributed machine learning for smart device traffic record transaction", journal = j-CCPE, volume = "34", number = "3", pages = "e683:1--e683:??", day = "1", month = feb, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6583", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Tue Feb 22 09:50:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "30 August 2021", } @Article{Qiu:2022:AMP, author = "Hao Qiu and Tong Li", title = "Auction method to prevent bid-rigging strategies in mobile blockchain edge computing resource allocation", journal = j-FUT-GEN-COMP-SYS, volume = "128", number = "??", pages = "1--15", month = mar, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.09.031", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:27 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21003770", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Rajabi:2022:MBL, author = "Shahab Rajabi and Pardis Roozkhosh and Nasser Motahari Farimani", title = "{MLP}-based Learnable Window Size for Bitcoin price prediction", journal = "Appl. Soft Comput.", volume = "129", number = "??", pages = "109584", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.asoc.2022.109584", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/asc/asc129.html#RajabiRF22", acknowledgement = ack-nhfb, dblp-key = "journals/asc/RajabiRF22", dblp-mdate = "2022-12-06", } @Article{Sapuric:2022:RBB, author = "Svetlana Sapuric and Angelika I. Kokkinaki and Ifigenia Georgiou", title = "The relationship between Bitcoin returns, volatility and volume: asymmetric {GARCH} modeling", journal = "J. Enterp. Inf. Manag.", volume = "35", number = "6", pages = "1506--1521", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1108/JEIM-10-2018-0228", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jeim/jeim35.html#SapuricKG22", acknowledgement = ack-nhfb, dblp-key = "journals/jeim/SapuricKG22", dblp-mdate = "2023-01-15", } @Article{Semret:2022:DBM, author = "Nemo Semret", title = "Dynamics of Bitcoin mining", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://arxiv.org/abs/2201.06072; https://dblp.org/db/journals/corr/corr2201.html#abs-2201-06072", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2201-06072", dblp-mdate = "2022-01-21", } @Article{Shi:2022:FVF, author = "Cheng Shi and Kazuki Yoneyama", title = "Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts", journal = "IEICE Trans. Fundam. Electron. Commun. Comput. Sci.", volume = "105-A", number = "3", pages = "242--267", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1587/transfun.2021cip0005", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/ieiceta/ieiceta105.html#ShiY22", acknowledgement = ack-nhfb, dblp-key = "journals/ieiceta/ShiY22", dblp-mdate = "2022-05-12", } @Article{Shojaeenasab:2022:MDB, author = "Ardeshir Shojaeenasab and Amir Pasha Motamed and Behnam Bahrak", title = "Mixing detection on Bitcoin transactions using statistical patterns", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2204.02019", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2204.html#abs-2204-02019", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2204-02019", dblp-mdate = "2022-04-06", } @Article{Singh:2022:FPP, author = "Saurabh Singh and Shailendra Rathore and Osama Alfarraj and Amr Tolba and Byungun Yoon", title = "A framework for privacy-preservation of {IoT} healthcare data using Federated Learning and blockchain technology", journal = j-FUT-GEN-COMP-SYS, volume = "129", number = "??", pages = "380--388", month = apr, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.11.028", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:29 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21004726", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Sun:2022:CLT, author = "Xiaowen Sun and Tan Yang and Bo Hu", title = "Correction to: {LSTM-TC}: Bitcoin coin mixing detection method with a high recall", journal = "Appl. Intell.", volume = "52", number = "8", pages = "9597", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s10489-022-03249-1", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See \cite{Sun:2022:LTB}.", URL = "https://dblp.org/db/journals/apin/apin52.html#SunYH22a", acknowledgement = ack-nhfb, dblp-key = "journals/apin/SunYH22a", dblp-mdate = "2022-06-13", } @Article{Sun:2022:LTB, author = "Xiaowen Sun and Tan Yang and Bo Hu", title = "{LSTM-TC}: Bitcoin coin mixing detection method with a high recall", journal = "Appl. Intell.", volume = "52", number = "1", pages = "780--793", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s10489-021-02453-9", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See correction \cite{Sun:2022:CLT}.", URL = "https://dblp.org/db/journals/apin/apin52.html#SunYH22", acknowledgement = ack-nhfb, dblp-key = "journals/apin/SunYH22", dblp-mdate = "2022-02-08", } @Article{Tao:2022:CNA, author = "Bishenghui Tao and Hong-Ning Dai and Jiajing Wu and Ivan Wang Hei Ho and Zibin Zheng and Chak-Fong Cheang", title = "Complex Network Analysis of the Bitcoin Transaction Network", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2203.09026", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2203.html#abs-2203-09026", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2203-09026", dblp-mdate = "2022-04-20", } @Article{Tedeschi:2022:OTF, author = "Enrico Tedeschi and Tor-Arne S. Nordmo and Dag Johansen and H{\aa}vard D. Johansen", title = "On Optimizing Transaction Fees in Bitcoin using {AI}: Investigation on Miners Inclusion Pattern", journal = j-TOIT, volume = "22", number = "3", pages = "77:1--77:??", month = aug, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3528669", ISSN = "1533-5399 (print), 1557-6051 (electronic)", ISSN-L = "1533-5399", bibdate = "Wed Nov 16 08:12:04 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/toit.bib", URL = "https://dl.acm.org/doi/10.1145/3528669", abstract = "The transaction-rate bottleneck built into popular proof-of-work (PoW)-based cryptocurrencies, like Bitcoin and Ethereum, leads to fee markets where transactions are included according to a first-price auction for block space. Many attempts have been made \ldots{}", acknowledgement = ack-nhfb, articleno = "77", fjournal = "ACM Transactions on Internet Technology (TOIT)", journal-URL = "https://dl.acm.org/loi/toit", } @Article{Thai:2022:DIN, author = "Quang Tung Thai and Namseok Ko and Sung Hyuk Byun and Sun-Me Kim", title = "Design and implementation of {NDN}-based {Ethereum} blockchain", journal = j-J-NETW-COMPUT-APPL, volume = "200", number = "??", pages = "??--??", month = apr, year = "2022", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103329", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Fri Feb 18 11:00:30 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521003143", acknowledgement = ack-nhfb, articleno = "103329", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Tong:2022:CSP, author = "Wei Tong and Xuewen Dong and Yulong Shen and Yuanyu Zhang and Xiaohong Jiang and Wensheng Tian", title = "{CHChain}: Secure and parallel crowdsourcing driven by hybrid blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "131", number = "??", pages = "279--291", month = jun, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.01.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Mar 9 17:27:32 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000309", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2022:DLB, author = "Panpan Wang and Xiaoxing Liu and Sixu Wu", title = "Dynamic Linkage between Bitcoin and Traditional Financial Assets: a Comparative Analysis of Different Time Frequencies", journal = j-ENTROPY, volume = "24", number = "11", pages = "1565", month = "????", year = "2022", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e24111565", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy24.html#WangLW22", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/WangLW22", dblp-mdate = "2022-11-15", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } @Article{Wu:2022:VEV, author = "Haotian Wu and Zhe Peng and Songtao Guo and Yuanyuan Yang and Bin Xiao", title = "{VQL}: Efficient and Verifiable Cloud Query Services for Blockchain Systems", journal = j-IEEE-TRANS-PAR-DIST-SYS, volume = "33", number = "6", pages = "1393--1406", month = jun, year = "2022", CODEN = "ITDSEO", DOI = "https://doi.org/10.1109/TPDS.2021.3113873", ISSN = "1045-9219 (print), 1558-2183 (electronic)", ISSN-L = "1045-9219", bibdate = "Tue Nov 9 11:11:37 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Parallel and Distributed Systems", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=71", } @Article{Xiong:2022:BBP, author = "Ting Xiong and Ran Zhang and Jiang Liu and Tao Huang and Yunjie Liu and F. Richard Yu", title = "A blockchain-based and privacy-preserved authentication scheme for inter-constellation collaboration in {Space-Ground Integrated Networks}", journal = j-COMP-NET-AMSTERDAM, volume = "206", number = "??", pages = "??--??", day = "7", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.108793", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Mon Mar 7 06:52:32 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862200024X", acknowledgement = ack-nhfb, articleno = "108793", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Xiong:2022:RPB, author = "Huanliang Xiong and Muxi Chen and Canghai Wu and Yingding Zhao and Wenlong Yi", title = "Research on Progress of Blockchain Consensus Algorithm: a Review on Recent Progress of Blockchain Consensus Algorithms", journal = j-FUTURE-INTERNET, volume = "14", number = "2", pages = "47", day = "30", month = jan, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14020047", ISSN = "1999-5903", bibdate = "Fri Feb 25 07:09:39 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/2/47", abstract = "Blockchain technology can solve the problem of trust in the open network in a decentralized way. It has broad application prospects and has attracted extensive attention from academia and industry. The blockchain consensus algorithm ensures that the nodes in the chain reach consensus in the complex network environment, and the node status ultimately remains the same. The consensus algorithm is one of the core technologies of blockchain and plays a pivotal role in the research of blockchain technology. This article gives the basic concepts of the blockchain, summarizes the key technologies of the blockchain, especially focuses on the research of the blockchain consensus algorithm, expounds the general principles of the consensus process, and classifies the mainstream consensus algorithms. Then, focusing on the improvement of consensus algorithm performance, it reviews the research progress of consensus algorithms in detail, analyzes and compares the characteristics, suitable scenarios, and possible shortcomings of different consensus algorithms, and based on this, studies the future development trend of consensus algorithms for reference.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Xu:2022:ZTM, author = "Shiwei Xu and Xiaowen Cai and Yizhi Zhao and Zhengwei Ren and Le Du and Qin Wang and Jianying Zhou", title = "{zkrpChain}: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs", journal = j-FUT-GEN-COMP-SYS, volume = "128", number = "??", pages = "490--504", month = mar, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.09.034", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:27 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21003800", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Yang:2022:UCA, author = "Zixiu Yang and Dean Fantazzini", title = "Using Crypto-Asset Pricing Methods to Build Technical Oscillators for Short-Term Bitcoin Trading", journal = "Inf.", volume = "13", number = "12", pages = "560", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/info13120560", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/information/information13.html#YangF22", acknowledgement = ack-nhfb, dblp-key = "journals/information/YangF22", dblp-mdate = "2023-01-15", } @Article{Zhang:2022:IFM, author = "Guoming Zhang and Xuyun Zhang and Muhammad Bilal and Wanchun Dou and Xiaolong Xu and Joel J. P. C. Rodrigues", title = "Identifying fraud in medical insurance based on blockchain and deep learning", journal = j-FUT-GEN-COMP-SYS, volume = "130", number = "??", pages = "140--154", month = may, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2021.12.006", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Wed Feb 9 09:07:30 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X21004878", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zhang:2022:SBP, author = "Lihao Zhang and Taotao Wang and Soung Chang Liew", title = "Speeding up block propagation in {Bitcoin} network: Uncoded and coded designs", journal = j-COMP-NET-AMSTERDAM, volume = "206", number = "??", pages = "??--??", day = "7", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.108791", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Mon Mar 7 06:52:32 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128622000238", acknowledgement = ack-nhfb, articleno = "108791", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Zola:2022:ABA, author = "Francesco Zola and Lander Segurola-Gil and Jan L. Bruse and Mikel Galar and Raul Orduna Urrutia", title = "Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification", journal = "Appl. Intell.", volume = "52", number = "15", pages = "17289--17314", month = "????", year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s10489-022-03378-7", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/apin/apin52.html#ZolaSBGU22", acknowledgement = ack-nhfb, dblp-key = "journals/apin/ZolaSBGU22", dblp-mdate = "2023-01-05", } @Article{Zou:2022:IBC, author = "Jinglin Zou and Debiao He and Sherali Zeadally and Neeraj Kumar and Huaqun Wang and Kkwang Raymond Choo", title = "Integrated Blockchain and Cloud Computing Systems: a Systematic Survey, Solutions, and Challenges", journal = j-COMP-SURV, volume = "54", number = "8", pages = "160:1--160:36", month = nov, year = "2022", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3456628", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Tue Oct 5 08:39:24 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3456628", abstract = "Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with conventional service architectures, cloud computing introduces new security challenges in secure service management and control, \ldots{}", acknowledgement = ack-nhfb, articleno = "160", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Alexander:2023:HAL, author = "Carol Alexander and Jun Deng and Bin Zou", title = "Hedging with automatic liquidation and leverage selection on bitcoin futures", journal = j-EUR-J-OPER-RES, volume = "306", number = "1", pages = "478--493", month = "????", year = "2023", CODEN = "EJORDT", DOI = "https://doi.org/10.1016/j.ejor.2022.07.037", ISSN = "????", ISSN-L = "0377-2217", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/eor/eor306.html#AlexanderDZ23", acknowledgement = ack-nhfb, dblp-key = "journals/eor/AlexanderDZ23", dblp-mdate = "2023-01-31", fjournal = "European Journal of Operational Research", journal-URL = "http://www.sciencedirect.com/science/journal/03772217", } @Article{Alsaif:2023:MLB, author = "Suleiman Ali Alsaif", title = "Machine Learning-Based Ransomware Classification of Bitcoin Transactions", journal = "Appl. Comput. Intell. Soft Comput.", volume = "2023", number = "??", pages = "6274260:1--6274260:10", month = "????", year = "2023", CODEN = "????", DOI = "https://doi.org/10.1155/2023/6274260", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/acisc/acisc2023.html#Alsaif23", acknowledgement = ack-nhfb, dblp-key = "journals/acisc/Alsaif23", dblp-mdate = "2023-03-25", } @Article{Jung:2023:PBT, author = "Hae Sun Jung and Seon Hong Lee and Haein Lee and Jang Hyun Kim", title = "Predicting Bitcoin Trends Through Machine Learning Using Sentiment Analysis with Technical Indicators", journal = j-COMPUT-SYST-SCI-ENG, volume = "46", number = "2", pages = "2231--2246", month = "????", year = "2023", CODEN = "CSSEEI", DOI = "https://doi.org/10.32604/csse.2023.034466", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/csse/csse46.html#JungLLK23", acknowledgement = ack-nhfb, dblp-key = "journals/csse/JungLLK23", dblp-mdate = "2023-02-17", fjournal = "Computer Systems Science and Engineering", journal-URL = "http://www.crlpublishing.co.uk/csse", } @Article{Messias:2023:DBE, author = "Johnnatan Messias and Vabuk Pahari and Balakrishnan Chandrasekaran and Krishna P. Gummadi and Patrick Loiseau", title = "Dissecting Bitcoin and {Ethereum} Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2023", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2302.06962", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2302.html#abs-2302-06962", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2302-06962", dblp-mdate = "2023-02-20", } @Article{Sun:2023:BVS, author = "Yujing Sun and Hao Xiong and Siu Ming Yiu and Kwok-Yan Lam", title = "{BitAnalysis}: a Visualization System for Bitcoin Wallet Investigation", journal = "IEEE Trans. Big Data", volume = "9", number = "2", pages = "621--636", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1109/TBDATA.2022.3188660", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/tbd/tbd9.html#SunXYL23", acknowledgement = ack-nhfb, dblp-key = "journals/tbd/SunXYL23", dblp-mdate = "2023-03-22", } @Article{Ulla:2023:REC, author = "Mohammed Mujeer Ulla and Deepak S. Sakkari", title = "Research on Elliptic Curve Crypto System with Bitcoin Curves --- {SECP256k1}, {NIST256p}, {NIST521p} and {LLL}", journal = "J. Cyber Secur. Mobil.", volume = "12", number = "1", pages = "103--128", month = "????", year = "2023", CODEN = "????", DOI = "https://doi.org/10.13052/jcsm2245-1439.1215", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/jcsm/jcsm12.html#UllaS23", acknowledgement = ack-nhfb, dblp-key = "journals/jcsm/UllaS23", dblp-mdate = "2023-03-25", } @Article{Wang:2023:EUT, author = "Kai Wang and Maike Tong and Changhao Wu and Jun Pang and Chen Chen and Xiapu Luo and Weili Han", title = "Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering", journal = "CoRR", volume = "??", number = "??", pages = "??--??", month = "????", year = "2023", CODEN = "????", DOI = "https://doi.org/10.48550/arXiv.2303.01012", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/corr/corr2303.html#abs-2303-01012", acknowledgement = ack-nhfb, dblp-key = "journals/corr/abs-2303-01012", dblp-mdate = "2023-03-06", } @Article{Zitis:2023:IDC, author = "Pavlos I. Zitis and Shinji Kakinaka and Ken Umeno and Michael P. Hanias and Stavros G. Stavrinides and Stelios M. Potirakis", title = "Investigating Dynamical Complexity and Fractal Characteristics of Bitcoin\slash {US} Dollar and Euro\slash {US} Dollar Exchange Rates around the {COVID-19} Outbreak", journal = j-ENTROPY, volume = "25", number = "2", pages = "214", month = feb, year = "2023", CODEN = "ENTRFG", DOI = "https://doi.org/10.3390/e25020214", ISSN = "????", bibdate = "Wed Mar 29 10:31:23 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://dblp.org/db/journals/entropy/entropy25.html#ZitisKUHSP23", acknowledgement = ack-nhfb, dblp-key = "journals/entropy/ZitisKUHSP23", dblp-mdate = "2023-03-21", fjournal = "Entropy", journal-URL = "https://www.mdpi.com/journal/entropy/", } %%% ==================================================================== %%% Publications from Ledger, ``a peer-reviewed scholarly journal that %%% publishes full-length original research articles on the subjects of %%% cryptocurrency and blockchain technology, as well as any relevant %%% intersections with mathematics, computer science, engineering, law, %%% and economics.'' Entries are sorted in publication order, with %%% ``bibsort --byvolume'': @Article{Wilmer:2016:NE, author = "Christopher E. Wilmer and Peter R. Rizun", title = "Note from the {Editor}", journal = "Ledger", volume = "1", number = "??", pages = "??--??", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.82", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/82/62", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Noether:2016:RCT, author = "Shen Noether and Adam Mackenzie and {the Monero Research Lab}", title = "Ring Confidential Transactions", journal = "Ledger", volume = "1", number = "??", pages = "1--18", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.34", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/34", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Muftic:2016:BCC, author = "Sead Muftic", title = "{BIX} Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger", journal = "Ledger", volume = "1", number = "??", pages = "19--37", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.27", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/27", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Rizun:2016:STS, author = "Peter R. Rizun", title = "Subchains: A Technique to Scale {Bitcoin} and Improve the User Experience", journal = "Ledger", volume = "1", number = "??", pages = "38--52", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.40", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/40", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Houy:2016:BMG, author = "Nicolas Houy", title = "The {Bitcoin} Mining Game", journal = "Ledger", volume = "1", number = "??", pages = "53--68", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.13", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/13", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Popov:2016:PAN, author = "Serguei Popov", title = "A Probabilistic Analysis of the {Nxt} Forging Algorithm", journal = "Ledger", volume = "1", number = "??", pages = "69--83", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.46", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/46", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Kraft:2016:GCT, author = "Daniel Kraft", title = "Game Channels for Trustless Off-Chain Interactions in Decentralized Virtual Worlds", journal = "Ledger", volume = "1", number = "??", pages = "84--98", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.15", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/15", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Piasecki:2016:GSC, author = "Piotr J. Piasecki", title = "Gaming Self-Contained Provably Fair Smart Contract Casinos", journal = "Ledger", volume = "1", number = "??", pages = "99--110", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.29", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/29", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Ortisi:2016:BMV, author = "Matteo Ortisi", title = "{Bitcoin} Market Volatility Analysis Using Grand Canonical Minority Game", journal = "Ledger", volume = "1", number = "??", pages = "111--118", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.61", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/61", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Abramowicz:2016:APB, author = "Michael Abramowicz", title = "{Autonocoin}: A Proof-of-Belief Cryptocurrency", journal = "Ledger", volume = "1", number = "??", pages = "119--133", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.37", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/37", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Reijers:2016:GBT, author = "Wessel Reijers and Fiachra O'Brolch{\'a}in and Paul Haynes", title = "Governance in Blockchain Technologies \& Social Contract Theories", journal = "Ledger", volume = "1", number = "??", pages = "134--151", month = "????", year = "2016", DOI = "https://doi.org/10.5195/ledger.2016.62", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/62", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Wilmer:2017:NE, author = "Christopher E. Wilmer", title = "Note from the {Editor}", journal = "Ledger", volume = "2", number = "??", pages = "??--??", month = "????", year = "2017", DOI = "https://doi.org/10.5915/LEDGER.2018.115", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/115/89", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Biryukov:2017:EAP, author = "Alex Biryukov and Dmitry Khovratovich", title = "{Equihash}: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem", journal = "Ledger", volume = "2", number = "??", pages = "1--30", month = "????", year = "2017", DOI = "https://doi.org/10.5195/ledger.2017.48", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/48", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Dimitri:2017:BMC, author = "Nicola Dimitri", title = "{Bitcoin} Mining as a Contest", journal = "Ledger", volume = "2", number = "??", pages = "31--37", month = "????", year = "2017", DOI = "https://doi.org/10.5195/ledger.2017.96", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/96", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Stefansson:2017:SSU, author = "Gunnar Stefansson and Jamie Lentin", title = "From {Smileys} to {Smileycoins}: Using a Cryptocurrency in Education", journal = "Ledger", volume = "2", number = "??", pages = "38--54", month = "????", year = "2017", DOI = "https://doi.org/10.5195/ledger.2017.103", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/103", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Berg:2017:WDA, author = "Chris Berg", title = "What Diplomacy in the {Ancient Near East} Can Tell Us About Blockchain Technology", journal = "Ledger", volume = "2", number = "??", pages = "55--64", month = "????", year = "2017", DOI = "https://doi.org/10.5195/ledger.2017.104", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/104", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Lehner:2017:FSS, author = "Edward Lehner and Dylan Hunzeker and John R. Ziegler", title = "Funding Science with Science: Cryptocurrency and Independent Academic Research Funding", journal = "Ledger", volume = "2", number = "??", pages = "65--76", month = "????", year = "2017", DOI = "https://doi.org/10.5195/ledger.2017.108", ISSN = "2379-5980", bibdate = "Fri Jan 19 06:12:08 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/108", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Wilmer:2018:NE, author = "Christopher E. Wilmer and Peter Rizun", title = "Note from The {Editor}", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.162", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/162", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Sward:2018:DIB, author = "Andrew Sward and Ivy Vecna and Forrest Stonedahl", title = "Data Insertion in {Bitcoin}'s Blockchain", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.101", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/101", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Burnie:2018:DCA, author = "Andrew Burnie and James Burnie and Andrew Henderson", title = "Developing a Cryptocurrency Assessment Framework: Function over Form", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.121", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See erratum \cite{Anonymous:2018:EDC}.", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/121", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Muehlemann:2018:SPD, author = "Anton Muehlemann", title = "Sentiment Protocol: A Decentralized Protocol Leveraging Crowdsourced Wisdom", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.113", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/113", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Aggarwal:2018:QAB, author = "Divesh Aggarwal and Gavin Brennen and Troy Lee and Miklos Santha and Marco Tomamichel", title = "Quantum Attacks on {Bitcoin}, and How to Protect Against Them", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.127", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/127", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Smith:2018:BAD, author = "Reginald D. Smith", title = "{Bitcoin} Average Dormancy: A Measure of Turnover and Trading Activity", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.99", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/99", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Berengueres:2018:VCM, author = "Jose Berengueres", title = "Valuation of Cryptocurrency Mining Operations", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.123", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/123", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Anonymous:2018:EDC, author = "Anonymous", title = "Erratum: Developing a Cryptocurrency Assessment Framework: Function over Form", journal = "Ledger", volume = "3", number = "??", pages = "??--??", month = "????", year = "2018", DOI = "https://doi.org/10.5195/ledger.2018.151", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", note = "See \cite{Burnie:2018:DCA}.", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/151", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Tasca:2019:TBT, author = "Paolo Tasca and Claudio J. Tessone", title = "A Taxonomy of Blockchain Technologies: Principles of Identification and Classification", journal = "Ledger", volume = "4", number = "??", pages = "??--??", month = "????", year = "2019", DOI = "https://doi.org/10.5195/ledger.2019.140", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/140", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Bystrom:2019:BRT, author = "Hans Bystr{\"o}m", title = "Blockchains, Real-time Accounting, and the Future of Credit Risk Modeling", journal = "Ledger", volume = "4", number = "??", pages = "??--??", month = "????", year = "2019", DOI = "https://doi.org/10.5195/ledger.2019.100", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/100", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Mainelli:2019:ESC, author = "Michael R. Mainelli and Matthew Leitch and Dionysios Demetis", title = "Economic Simulation of Cryptocurrencies and Their Control Mechanisms", journal = "Ledger", volume = "4", number = "??", pages = "??--??", month = "????", year = "2019", DOI = "https://doi.org/10.5195/ledger.2019.130", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/130", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Dimitri:2019:TFB, author = "Nicola Dimitri", title = "Transaction Fees, Block Size Limit, and Auctions in {Bitcoin}", journal = "Ledger", volume = "4", number = "??", pages = "??--??", month = "????", year = "2019", DOI = "https://doi.org/10.5195/ledger.2019.145", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/145", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Bennet:2019:EEM, author = "Adam J. Bennet and Shakib Daryanoosh", title = "Energy-Efficient Mining on a Quantum-Enabled Blockchain Using Light", journal = "Ledger", volume = "4", number = "??", pages = "??--??", month = "????", year = "2019", DOI = "https://doi.org/10.5195/ledger.2019.143", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/143", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Johnson:2019:BVU, author = "Jackie Johnson", title = "{Bitcoin} and {Venezuela}'s Unofficial Exchange Rate", journal = "Ledger", volume = "4", number = "??", pages = "??--??", month = "????", year = "2019", DOI = "https://doi.org/10.5195/ledger.2019.170", ISSN = "2379-5980", bibdate = "Fri Nov 29 10:38:25 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/170", acknowledgement = ack-nhfb, fjournal = "Ledger", journal-URL = "http://www.ledgerjournal.org/ojs/index.php/ledger", } @Article{Putz:2019:SAL, author = "Benedikt Putz and Florian Menges and G{\"u}nther Pernul", title = "A secure and auditable logging infrastructure based on a permissioned blockchain", journal = j-COMPUT-SECUR, volume = "87", number = "??", pages = "Article 101602", month = nov, year = "2019", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.101602", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 15:25:37 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313907", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wang:2019:AEI, author = "Ziyu Wang and Jianwei Liu and Qianhong Wu and Yanting Zhang and Hui Yu and Ziyu Zhou", title = "An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect {Ethereum} network", journal = j-COMPUT-SECUR, volume = "87", number = "??", pages = "Article 101581", month = nov, year = "2019", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.101581", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 15:25:37 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314172", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Yu:2019:PQQ, author = "Bin Yu and Joseph Liu and Surya Nepal and Jiangshan Yu and Paul Rimba", title = "Proof-of-{QoS}: {QoS} based blockchain consensus protocol", journal = j-COMPUT-SECUR, volume = "87", number = "??", pages = "Article 101580", month = nov, year = "2019", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.101580", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 15:25:37 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313774", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Zou:2019:BBP, author = "Renpeng Zou and Xixiang Lv and Baocang Wang", title = "Blockchain-based photo forensics with permissible transformations", journal = j-COMPUT-SECUR, volume = "87", number = "??", pages = "Article 101567", month = nov, year = "2019", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2019.101567", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 15:25:37 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313981", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Aditya:2021:SBR, author = "U. S. P. Srinivas Aditya and Roshan Singh and Pranav Kumar Singh and Anshuman Kalla", title = "A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions", journal = j-J-NETW-COMPUT-APPL, volume = "196", number = "??", pages = "??--??", day = "15", month = dec, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103245", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Thu Jan 20 08:06:58 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521002435", acknowledgement = ack-nhfb, articleno = "103245", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Akbar:2021:DHD, author = "Nur Arifin Akbar and Amgad Muneer and Narmine ElHakim and Suliman Mohamed Fati", title = "Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses", journal = j-FUTURE-INTERNET, volume = "13", number = "11", pages = "285", day = "12", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13110285", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:13 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/11/285", abstract = "Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes, namely, mining (the process of adding a new block or transaction to the global public ledger created by the previous block) and validation (the process of validating the new block added). Several consensus protocols have been introduced to validate blockchain transactions, Proof-of-Work (PoW) and Proof-of-Stake (PoS), which are crucial to cryptocurrencies, such as Bitcoin. However, these consensus protocols are vulnerable to double-spending attacks. Amongst these attacks, the 51\% attack is the most prominent because it involves forking a blockchain to conduct double spending. Many attempts have been made to solve this issue, and examples include delayed proof-of-work (PoW) and several Byzantine fault tolerance mechanisms. These attempts, however, suffer from delay issues and unsorted block sequences. This study proposes a hybrid algorithm that combines PoS and PoW mechanisms to provide a fair mining reward to the miner/validator by conducting forking to combine PoW and PoS consensuses. As demonstrated by the experimental results, the proposed algorithm can reduce the possibility of intruders performing double mining because it requires achieving 100\% dominance in the network, which is impossible.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Alam:2021:BBI, author = "Shadab Alam and Mohammed Shuaib and Wazir Zada Khan and Sahil Garg and Georges Kaddoum and M. Shamim Hossain and Yousaf Bin Zikria", title = "Blockchain-based Initiatives: Current state and challenges", journal = j-COMP-NET-AMSTERDAM, volume = "198", number = "??", pages = "??--??", day = "24", month = oct, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108395", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:04 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862100373X", acknowledgement = ack-nhfb, articleno = "108395", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Ali:2021:IBF, author = "Mansoor Ali and Hadis Karimipour and Muhammad Tariq", title = "Integration of blockchain and federated learning for {Internet of Things}: Recent advances and future challenges", journal = j-COMPUT-SECUR, volume = "108", number = "??", pages = "Article 102355", month = sep, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102355", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 14:55:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821001796", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Al-Marridi:2021:RLA, author = "Abeer Z. Al-Marridi and Amr Mohamed and Aiman Erbad", title = "Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems", journal = j-COMP-NET-AMSTERDAM, volume = "197", number = "??", pages = "??--??", day = "9", month = oct, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108279", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:04 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621003005", acknowledgement = ack-nhfb, articleno = "108279", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Bansal:2021:NGS, author = "Gaurang Bansal and Vinay Chamola and Georges Kaddoum and Md. Jalil Piran and Mubarak Alrashoud", title = "Next generation stock exchange: Recurrent neural learning model for distributed ledger transactions", journal = j-COMP-NET-AMSTERDAM, volume = "193", number = "??", pages = "??--??", day = "5", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.107998", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:02 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621001183", acknowledgement = ack-nhfb, articleno = "107998", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Brotsis:2021:SBP, author = "Sotirios Brotsis and Konstantinos Limniotis and Gueltoum Bendiab and Nicholas Kolokotronis and Stavros Shiaeles", title = "On the suitability of blockchain platforms for {IoT} applications: Architectures, security, privacy, and performance", journal = j-COMP-NET-AMSTERDAM, volume = "191", number = "??", pages = "??--??", day = "22", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108005", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:01 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621001225", acknowledgement = ack-nhfb, articleno = "108005", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Cocco:2021:BSS, author = "Luisanna Cocco and Roberto Tonelli and Michele Marchesi", title = "Blockchain and Self Sovereign Identity to Support Quality in the Food Supply Chain", journal = j-FUTURE-INTERNET, volume = "13", number = "12", pages = "301", day = "26", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13120301", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:14 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/12/301", abstract = "This work presents how a digital identity management system can support food supply chains in guaranteeing the quality of the products marketed and the compliance of the several supply-chain's nodes to standards and technical regulations. Specific goal of this work is to present a system that provides full visibility of process/food certifications, which nowadays are issued by accredited and approved certification bodies (issuers) and delivered and stored in paper version by the several participants (holders) of the supply chain. The system is designed and implemented by combining the latest most innovative and disruptive technologies in the market-Self Sovereign Identity system, Blockchain, and Inter Planetary File System. The crucial aspects that it aims to hit are the storage and access of food/process certifications, and the proper eligibility verification of these certifications exploiting the concepts of the Self Sovereign Identity-based models. The proposed system, realized by using standards that are WWW Consortium-compatible and the Ethereum Blockchain, ensures eligibility, transparency, and traceability of the certifications along a food supply chain, and could be an innovation model/idea that the companies that adopt the Open Innovation paradigm might want to pursue.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Dorsala:2021:BBS, author = "Mallikarjun Reddy Dorsala and V. N. Sastry and Sudhakar Chapram", title = "Blockchain-based solutions for cloud computing: a survey", journal = j-J-NETW-COMPUT-APPL, volume = "196", number = "??", pages = "??--??", day = "15", month = dec, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103246", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Thu Jan 20 08:06:58 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521002447", acknowledgement = ack-nhfb, articleno = "103246", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Fotohi:2021:SCB, author = "Reza Fotohi and Fereidoon Shams Aliee", title = "Securing communication between things using blockchain technology based on authentication and {SHA-256} to improving scalability in large-scale {IoT}", journal = j-COMP-NET-AMSTERDAM, volume = "197", number = "??", pages = "??--??", day = "9", month = oct, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108331", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:04 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621003303", acknowledgement = ack-nhfb, articleno = "108331", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Gangwani:2021:SEI, author = "Pranav Gangwani and Alexander Perez-Pons and Tushar Bhardwaj and Himanshu Upadhyay and Santosh Joshi and Leonel Lagos", title = "Securing Environmental {IoT} Data Using Masked Authentication Messaging Protocol in a {DAG}-Based Blockchain: {IOTA} Tangle", journal = j-FUTURE-INTERNET, volume = "13", number = "12", pages = "312", day = "06", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13120312", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:14 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/12/312", abstract = "The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are considerable concerns associated with privacy and security that can negatively affect the adoption of technology within this domain. In this paper, we propose the advancement of electronic environmental monitoring through the capability provided by the blockchain. The blockchain's use of a distributed ledger as its underlying infrastructure is an attractive approach to counter these privacy and security issues, although its performance and ability to manage sensor data must be assessed. We focus on a new distributed ledger technology for the IoT, called IOTA, that is based on a directed acyclic graph. IOTA overcomes the current limitations of the blockchain and offers a data communication protocol called masked authenticated messaging for secure data sharing among Internet of Things (IoT) devices. We show how the application layer employing the data communication protocol, MAM, can support the secure transmission, storage, and retrieval of encrypted environmental sensor data by using an immutable distributed ledger such as that shown in IOTA. Finally, we evaluate, compare, and analyze the performance of the MAM protocol against a non-protocol approach.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Halgamuge:2021:OFB, author = "Malka N. Halgamuge", title = "Optimization framework for Best Approver Selection Method {(BASM)} and Best Tip Selection Method {(BTSM)} for {IOTA} tangle network: Blockchain-enabled next generation Industrial {IoT}", journal = j-COMP-NET-AMSTERDAM, volume = "199", number = "??", pages = "??--??", day = "9", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108418", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:05 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621003868", acknowledgement = ack-nhfb, articleno = "108418", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Hassija:2021:MDO, author = "Vikas Hassija and Vikas Saxena and Vinay Chamola", title = "A mobile data offloading framework based on a combination of blockchain and virtual voting", journal = j-SPE, volume = "51", number = "12", pages = "2428--2445", month = dec, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2786", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:09 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "20 January 2020", } @Article{Hei:2021:MMA, author = "Yiming Hei and Jianwei Liu and Hanwen Feng and Dawei Li and Yizhong Liu and Qianhong Wu", title = "Making {MA-ABE} fully accountable: a blockchain-based approach for secure digital right management", journal = j-COMP-NET-AMSTERDAM, volume = "191", number = "??", pages = "??--??", day = "22", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108029", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:01 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621001389", acknowledgement = ack-nhfb, articleno = "108029", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Hu:2021:BBT, author = "Donghui Hu and Yifan Li and Lixuan Pan and Meng Li and Shuli Zheng", title = "A blockchain-based trading system for big data", journal = j-COMP-NET-AMSTERDAM, volume = "191", number = "??", pages = "??--??", day = "22", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.107994", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:01 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862100116X", acknowledgement = ack-nhfb, articleno = "107994", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Irshad:2021:SBO, author = "Azeem Irshad and Shehzad Ashraf Chaudhry and Anwar Ghani and Muhammad Bilal", title = "A secure blockchain-oriented data delivery and collection scheme for 5G-enabled {IoD} environment", journal = j-COMP-NET-AMSTERDAM, volume = "195", number = "??", pages = "??--??", day = "4", month = aug, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108219", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:03 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621002668", acknowledgement = ack-nhfb, articleno = "108219", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Jiang:2021:EBT, author = "Nan Jiang and Xing Liu and Ming Xu", title = "Evaluating blockchain technology and related policies in {China} and the {USA}", journal = j-SCI-PUBLIC-POL, volume = "48", number = "4", pages = "562--575", month = aug, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1093/scipol/scab032", ISSN = "0302-3427 (print), 1471-5430 (electronic)", ISSN-L = "0302-3427", bibdate = "Fri Jan 21 09:14:07 MST 2022", bibsource = "http://spp.oxfordjournals.org/; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/scipublicpol2020.bib", URL = "http://academic.oup.com/spp/article/48/4/562/6291644", acknowledgement = ack-nhfb, fjournal = "Science and Public Policy", journal-URL = "http://spp.oxfordjournals.org/content/by/year", } @Article{Kadadha:2021:TSP, author = "Maha Kadadha and Hadi Otrok and Shakti Singh and Rabeb Mizouni and Anis Ouali", title = "Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing", journal = j-J-NETW-COMPUT-APPL, volume = "191", number = "??", pages = "??--??", day = "1", month = oct, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103155", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Thu Jan 20 08:06:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521001697", acknowledgement = ack-nhfb, articleno = "103155", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Kapassa:2021:BAI, author = "Evgenia Kapassa and Marinos Themistocleous and Klitos Christodoulou and Elias Iosif", title = "Blockchain Application in {Internet of Vehicles}: Challenges, Contributions and Current Limitations", journal = j-FUTURE-INTERNET, volume = "13", number = "12", pages = "313", day = "10", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13120313", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:14 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/12/313", abstract = "Blockchain technology is highly coupled with cryptocurrencies; however, it provides several other potential use cases, related to energy and sustainability, Internet of Things (IoT), smart cities, smart mobility and more. Blockchain can offer security for Electric Vehicle (EV) transactions in the Internet of Vehicles (IoV) concept, allowing electricity trading to be performed in a decentralized, transparent and secure way. Additionally, blockchain provides the necessary functionalities for IoV decentralized application development, such as data exchange, personal digital identity, sharing economy and optimized charging pattern. Moreover, blockchain technology has the potential to significantly increase energy efficiency, decrease management costs and guarantee the effective use of the energy recourses. Therefore, its application in the IoV concept provides secure, autonomous and automated energy trading between EVs. While several studies on blockchain technology in smart grids have been conducted, insufficient attention has been given to conducting a detailed review and state-of-the-art analysis of blockchain application in the IoV domain. To this end, this work provides a systematic literature review of blockchain-based applications in the IoV domain. The aim is to investigate the current challenges of IoV and to highlight how blockchain characteristics can contribute to this emerging paradigm. In addition, limitations and future research directions related to the integration of blockchain technology within the IoV are discussed. To this end, this study incorporates the theoretical foundations of several research articles published in scientific publications over the previous five years, as a method of simplifying our assessment and capturing the ever-expanding blockchain area. We present a comprehensive taxonomy of blockchain-enabled applications in the IoV domain, such as privacy and security, data protection and management, vehicle management, charging optimization and P2P energy trading, based on a structured, systematic review and content analysis of the discovered literature, and we identify key trends and emerging areas for research. The contribution of this article is two-fold: (a) we highlight the limitations presented in the relevant literature, particularly the barriers of blockchain technology and how they influence its integration into the IoV and (b) we present a number of research gaps and suggest future exploratory areas.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Khan:2021:BBD, author = "Ammar Ahmed Khan and Muhammad Mubashir Khan and Kashif Mehboob Khan and Junaid Arshad and Farhan Ahmad", title = "A blockchain-based decentralized machine learning framework for collaborative intrusion detection within {UAVs}", journal = j-COMP-NET-AMSTERDAM, volume = "196", number = "??", pages = "??--??", day = "4", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108217", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:03 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621002644", acknowledgement = ack-nhfb, articleno = "108217", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Leiding:2021:MEM, author = "Benjamin Leiding and Priyanka Sharma and Alexander Norta", title = "The Machine-to-Everything {(M2X)} Economy: Business Enactments, Collaborations, and e-Governance", journal = j-FUTURE-INTERNET, volume = "13", number = "12", pages = "319", day = "19", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13120319", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:14 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/12/319", abstract = "Nowadays, business enactments almost exclusively focus on human-to-human business transactions. However, the ubiquitousness of smart devices enables business enactments among autonomously acting machines, thereby providing the foundation for the machine-driven Machine-to-Everything (M2X) Economy. Human-to-human business is governed by enforceable contracts either in the form of oral, or written agreements. Still, a machine-driven ecosystem requires a digital equivalent that is accessible to all stakeholders. Additionally, an electronic contract platform enables fact-tracking, non-repudiation, auditability and tamper-resistant storage of information in a distributed multi-stakeholder setting. A suitable approach for M2X enactments are electronic smart contracts that allow to govern business transactions using a computerized transaction protocol such as a blockchain. In this position paper, we argue in favor of an open, decentralized and distributed smart contract-based M2X Economy that supports the corresponding multi-stakeholder ecosystem and facilitates M2X value exchange, collaborations, and business enactments. Finally, it allows for a distributed e-governance model that fosters open platforms and interoperability. Thus, serving as a foundation for the ubiquitous M2X Economy and its ecosystem.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Lekssays:2021:PBB, author = "Ahmed Lekssays and Luca Landa and Barbara Carminati and Elena Ferrari", title = "{PAutoBotCatcher}: a blockchain-based privacy-preserving botnet detector for {Internet of Things}", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108512", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862100445X", acknowledgement = ack-nhfb, articleno = "108512", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Liu:2021:FDD, author = "Yong Liu and Guangxia Xu", title = "Fixed degree of decentralization {DPoS} consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value", journal = j-COMP-NET-AMSTERDAM, volume = "199", number = "??", pages = "??--??", day = "9", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108432", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:05 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621003947", acknowledgement = ack-nhfb, articleno = "108432", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Liu:2021:PLP, author = "Yuan Liu and Yixiao Lan and Boyang Li and Chunyan Miao and Zhihong Tian", title = "Proof of Learning {(PoLe)}: Empowering neural network training with consensus building on blockchains", journal = j-COMP-NET-AMSTERDAM, volume = "201", number = "??", pages = "??--??", day = "24", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108594", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004965", acknowledgement = ack-nhfb, articleno = "108594", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Loch:2021:NBP, author = "Wilton Jaciel Loch and Guilherme Pi{\^e}gas Koslovski and Maur{\'\i}cio Aronne Pillon and Charles Christian Miers and Marcelo Pasin", title = "A novel blockchain protocol for selecting microservices providers and auditing contracts", journal = j-J-SYST-SOFTW, volume = "180", number = "??", pages = "??--??", month = oct, year = "2021", CODEN = "JSSODM", DOI = "https://doi.org/10.1016/j.jss.2021.111030", ISSN = "0164-1212 (print), 1873-1228 (electronic)", ISSN-L = "0164-1212", bibdate = "Wed Feb 2 07:44:00 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0164121221001278", acknowledgement = ack-nhfb, articleno = "111030", fjournal = "Journal of Systems and Software", journal-URL = "http://www.sciencedirect.com/science/journal/01641212", } @Article{Lu:2021:NMP, author = "Ning Lu and Bin Wang and Yongxin Zhang and Wenbo Shi and Christian Esposito", title = "{NeuCheck}: a more practical {Ethereum} smart contract security analysis tool", journal = j-SPE, volume = "51", number = "10", pages = "2065--2084", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2745", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "28 August 2019", } @Article{Modesti:2021:FMS, author = "Paolo Modesti and Siamak F. Shahandashti and Patrick McCorry and Feng Hao", title = "Formal modelling and security analysis of {Bitcoin}'s payment protocol", journal = j-COMPUT-SECUR, volume = "107", number = "??", pages = "Article 102279", month = aug, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102279", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 14:55:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821001036", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Pal:2021:BBT, author = "Shantanu Pal and Ambrose Hill and Tahiry Rabehaja and Michael Hitchens", title = "A blockchain-based trust management framework with verifiable interactions", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108506", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004436", acknowledgement = ack-nhfb, articleno = "108506", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Paul:2021:BBS, author = "Rourab Paul and Nimisha Ghosh and Suman Sau and Amlan Chakrabarti and Prasant Mohapatra", title = "Blockchain based secure smart city architecture using low resource {IoTs}", journal = j-COMP-NET-AMSTERDAM, volume = "196", number = "??", pages = "??--??", day = "4", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108234", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:03 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621002759", acknowledgement = ack-nhfb, articleno = "108234", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Pillai:2021:BCA, author = "Babu Pillai and Kamanashis Biswas and Zh{\'e} H{\'o}u and Vallipuram Muthukkumarasamy", title = "Burn-to-Claim: an asset transfer protocol for blockchain interoperability", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108495", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004369", acknowledgement = ack-nhfb, articleno = "108495", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Powell:2021:PPS, author = "Warwick Powell and Shoufeng Cao and Thomas Miller and Marcus Foth and Xavier Boyen and Barry Earsman and Santiago del Valle and Charles Turner-Morris", title = "From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108536", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004606", acknowledgement = ack-nhfb, articleno = "108536", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Qu:2021:EFP, author = "Qian Qu and Ronghua Xu and Yu Chen and Erik Blasch and Alexander Aved", title = "Enable Fair Proof-of-Work {(PoW)} Consensus for Blockchains in {IoT} by {Miner Twins (MinT)}", journal = j-FUTURE-INTERNET, volume = "13", number = "11", pages = "291", day = "19", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13110291", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:13 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/11/291", abstract = "Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation intensive hashing puzzle, Blockchain ensures the security of the system by establishing a digital ledger. However, the computation intensive PoW favors members possessing more computing power. In the IoT paradigm, fairness in the highly heterogeneous network edge environments must consider devices with various constraints on computation power. Inspired by the advanced features of Digital Twins (DT), an emerging concept that mirrors the lifespan and operational characteristics of physical objects, we propose a novel Miner Twins (MinT) architecture to enable a fair PoW consensus mechanism for blockchains in IoT environments. MinT adopts an edge-fog-cloud hierarchy. All physical miners of the blockchain are deployed as microservices on distributed edge devices, while fog/cloud servers maintain digital twins that periodically update miners' running status. By timely monitoring of a miner's footprint that is mirrored by twins, a lightweight Singular Spectrum Analysis (SSA)-based detection achieves the identification of individual misbehaved miners that violate fair mining. Moreover, we also design a novel Proof-of-Behavior (PoB) consensus algorithm to detect dishonest miners that collude to control a fair mining network. A preliminary study is conducted on a proof-of-concept prototype implementation, and experimental evaluation shows the feasibility and effectiveness of the proposed MinT scheme under a distributed byzantine network environment.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Regueiro:2021:BBA, author = "Cristina Regueiro and I{\~n}aki Seco and Iv{\'a}n Guti{\'e}rrez-Ag{\"u}ero and Borja Urquizu and Jason Mansell", title = "A Blockchain-Based Audit Trail Mechanism: Design and Implementation", journal = j-ALGORITHMS-BASEL, volume = "14", number = "12", pages = "??--??", month = dec, year = "2021", CODEN = "ALGOCH", DOI = "https://doi.org/10.3390/a14120341", ISSN = "1999-4893 (electronic)", ISSN-L = "1999-4893", bibdate = "Thu Jan 20 09:10:52 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/algorithms.bib", URL = "https://www.mdpi.com/1999-4893/14/12/341", acknowledgement = ack-nhfb, fjournal = "Algorithms (Basel)", journal-URL = "https://www.mdpi.com/journal/algorithms", } @Article{Rivero-Garcia:2021:UBF, author = "Alexandra Rivero-Garc{\'\i}a and Iv{\'a}n Santos-Gonz{\'a}lez and Candelaria Hern{\'a}ndez-Goya and Pino Caballero-Gil", title = "Using blockchain in the follow-up of emergency situations related to events", journal = j-SPE, volume = "51", number = "10", pages = "2000--2014", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2779", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "18 December 2019", } @Article{Rodrigues:2021:ABI, author = "Carlo Kleber da Silva Rodrigues", title = "Analyzing Blockchain integrated architectures for effective handling of {IoT}-ecosystem transactions", journal = j-COMP-NET-AMSTERDAM, volume = "201", number = "??", pages = "??--??", day = "24", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108610", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621005089", acknowledgement = ack-nhfb, articleno = "108610", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Sanka:2021:SRB, author = "Abdurrashid Ibrahim Sanka and Ray C. C. Cheung", title = "A systematic review of blockchain scalability: Issues, solutions, analysis and future research", journal = j-J-NETW-COMPUT-APPL, volume = "195", number = "??", pages = "??--??", day = "1", month = dec, year = "2021", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103232", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Thu Jan 20 08:06:57 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521002307", acknowledgement = ack-nhfb, articleno = "103232", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Sharmila:2021:EIA, author = "A. Helen Sharmila and N. Jaisankar", title = "Edge Intelligent Agent Assisted Hybrid Hierarchical Blockchain for continuous healthcare monitoring and recommendation system in {5G WBAN-IoT}", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108508", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004448", acknowledgement = ack-nhfb, articleno = "108508", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Shi:2021:BBT, author = "Peichang Shi and Huaimin Wang and Shangzhi Yang and Chang Chen and Wentao Yang", title = "Blockchain-based trusted data sharing among trusted stakeholders in {IoT}", journal = j-SPE, volume = "51", number = "10", pages = "2051--2064", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2739", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "01 August 2019", } @Article{Sun:2021:SSA, author = "Haoli Sun and Bingfeng Pi and Jun Sun and Takeshi Miyamae and Masanobu Morinaga", title = "{SASLedger}: a Secured, Accelerated Scalable Storage Solution for Distributed Ledger Systems", journal = j-FUTURE-INTERNET, volume = "13", number = "12", pages = "310", day = "30", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.3390/fi13120310", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:14 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/13/12/310", abstract = "Blockchain technology provides a ``tamper-proof distributed ledger'' for its users. Typically, to ensure the integrity and immutability of the transaction data, each node in a blockchain network retains a full copy of the ledger; however, this characteristic imposes an increasing storage burden upon each node with the accumulation of data. In this paper, an off-chain solution is introduced to relieve the storage burden of blockchain nodes while ensuring the integrity of the off-chain data. In our solution, an off-chain remote DB server stores the fully replicated data while the nodes only store the commitments of the data to verify whether the off-chain data are tampered with. To minimize the influence on performance, the nodes will store data locally at first and transfer it to the remote DB server when otherwise idle. Our solution also supports accessing all historical data for newly joined nodes through a snapshot mechanism. The solution is implemented based on the Hyperledger Fabric (HLF). Experiments show that our solution reduces the block data for blockchain nodes by 93.3\% compared to the original HLF and that our advanced solution enhances the TPS by 9.6\% compared to our primary solution.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Tang:2021:STM, author = "Xinyu Tang and Cheng Guo and Kim-Kwang Raymond Choo and Yining Liu and Long Li", title = "A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108540", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862100462X", acknowledgement = ack-nhfb, articleno = "108540", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Unal:2021:IFM, author = "Devrim Unal and Mohammad Hammoudeh and Muhammad Asif Khan and Abdelrahman Abuarqoub and Gregory Epiphaniou and Ridha Hamila", title = "Integration of federated machine learning and blockchain for the provision of secure big data analytics for {Internet of Things}", journal = j-COMPUT-SECUR, volume = "109", number = "??", pages = "Article 102393", month = oct, year = "2021", CODEN = "CPSEDU", DOI = "https://doi.org/10.1016/j.cose.2021.102393", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Sat Jan 22 14:55:08 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computsecur2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404821002170", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Wen:2021:ACB, author = "Yujuan Wen and Fengyuan Lu and Yufei Liu and Xinli Huang", title = "Attacks and countermeasures on blockchains: a survey from layering perspective", journal = j-COMP-NET-AMSTERDAM, volume = "191", number = "??", pages = "??--??", day = "22", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.107978", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:01 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621001080", acknowledgement = ack-nhfb, articleno = "107978", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Wu:2021:DRL, author = "Yulei Wu and Zehua Wang and Yuxiang Ma and Victor C. M. Leung", title = "Deep reinforcement learning for blockchain in industrial {IoT}: a survey", journal = j-COMP-NET-AMSTERDAM, volume = "191", number = "??", pages = "??--??", day = "22", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108004", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:01 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621001213", acknowledgement = ack-nhfb, articleno = "108004", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Wu:2021:FLB, author = "Kaidong Wu and Yun Ma and Gang Huang and Xuanzhe Liu", title = "A first look at blockchain-based decentralized applications", journal = j-SPE, volume = "51", number = "10", pages = "2033--2050", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2751", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "21 October 2019", } @Article{Xiang:2021:JDB, author = "Fu Xiang and Wang Huaimin and Shi Peichang and Ouyang Xue and Zhang Xunhui", title = "{Jointgraph}: a {DAG}-based efficient consensus algorithm for consortium blockchains", journal = j-SPE, volume = "51", number = "10", pages = "1987--1999", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2748", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "05 September 2019", } @Article{Xu:2021:BBC, author = "Xiaolong Xu and Yi Chen and Xuyun Zhang and Qingxiang Liu and Xihua Liu and Lianyong Qi", title = "A blockchain-based computation offloading method for edge computing in {5G} networks", journal = j-SPE, volume = "51", number = "10", pages = "2015--2032", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2749", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "10 September 2019", } @Article{Zaabar:2021:HSB, author = "Bessem Zaabar and Omar Cheikhrouhou and Faisal Jamil and Meryem Ammi and Mohamed Abid", title = "{HealthBlock}: a secure blockchain-based healthcare data management system", journal = j-COMP-NET-AMSTERDAM, volume = "200", number = "??", pages = "??--??", day = "9", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108500", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:06 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004382", acknowledgement = ack-nhfb, articleno = "108500", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Zheng:2021:GES, author = "Zibin Zheng and Shangguang Wang and Rodrigo N. Calheiros", title = "Guest Editorial: {Special} issue on blockchain and decentralized applications", journal = j-SPE, volume = "51", number = "10", pages = "1985--1986", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.3007", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "14 June 2021", } @Article{Zhou:2021:BBB, author = "Ao Zhou and Qibo Sun and Jinglin Li", title = "{BCEdge}: {Blockchain}-based resource management in {D2D}-assisted mobile edge computing", journal = j-SPE, volume = "51", number = "10", pages = "2085--2102", month = oct, year = "2021", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2758", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "21 October 2019", } @Article{Zhu:2021:BBS, author = "Yan Zhu and Qian Guo and Hongjian Yin and Kaitai Liang and Stephen S. Yau", title = "Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts", journal = j-COMPUTER, volume = "54", number = "12", pages = "72--80", month = dec, year = "2021", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2021.3091379", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Mon Jan 31 16:02:29 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Abubaker:2022:BSP, author = "Zain Abubaker and Nadeem Javaid and Ahmad Almogren and Mariam Akbar and Mansour Zuair and Jalel Ben-Othman", title = "Blockchained service provisioning and malicious node detection via federated learning in scalable {Internet of Sensor Things} networks", journal = j-COMP-NET-AMSTERDAM, volume = "204", number = "??", pages = "??--??", day = "26", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108691", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621005570", acknowledgement = ack-nhfb, articleno = "108691", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Baker:2022:BBF, author = "Thar Baker and Muhammad Asim and Hezekiah Samwini and Nauman Shamim and Mohammed M. Alani and Rajkumar Buyya", title = "A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems", journal = j-COMP-NET-AMSTERDAM, volume = "203", number = "??", pages = "??--??", day = "11", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108676", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862100548X", acknowledgement = ack-nhfb, articleno = "108676", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Cheema:2022:BBS, author = "Muhammad Asaad Cheema and Rafay Iqbal Ansari and Nouman Ashraf and Syed Ali Hassan and Hassaan Khaliq Qureshi and Ali Kashif Bashir and Christos Politis", title = "Blockchain-based secure delivery of medical supplies using drones", journal = j-COMP-NET-AMSTERDAM, volume = "204", number = "??", pages = "??--??", day = "26", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108706", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621005661", acknowledgement = ack-nhfb, articleno = "108706", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Chen:2022:DSC, author = "Jiachi Chen and Xin Xia and David Lo and John Grundy and Xiapu Luo and Ting Chen", title = "Defining Smart Contract Defects on {Ethereum}", journal = j-IEEE-TRANS-SOFTW-ENG, volume = "48", number = "1", month = jan, pages = "327--345", year = "2022", CODEN = "IESEDJ", DOI = "https://doi.org/10.1109/TSE.2020.2989002", ISSN = "0098-5589 (print), 1939-3520 (electronic)", ISSN-L = "0098-5589", bibdate = "Thu Jan 13 08:34:11 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Software Engineering", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32", } @Article{Dhall:2022:BBF, author = "Sakshi Dhall and Ashutosh Dhar Dwivedi and Saibal K. Pal and Gautam Srivastava", title = "Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media\slash Messaging Platforms", journal = j-TALLIP, volume = "21", number = "1", pages = "8:1--8:33", month = jan, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3467019", ISSN = "2375-4699 (print), 2375-4702 (electronic)", ISSN-L = "2375-4699", bibdate = "Mon Jan 31 07:33:24 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tallip.bib", URL = "https://dl.acm.org/doi/10.1145/3467019", abstract = "With social media becoming the most frequently used mode of modern-day communications, the propagation of fake or vicious news through such modes of communication has emerged as a serious problem. The scope of the problem of fake or vicious news may range \ldots{}", acknowledgement = ack-nhfb, articleno = "8", fjournal = "ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)", journal-URL = "https://dl.acm.org/loi/tallip", } @Article{DiSorbo:2022:PGC, author = "Andrea {Di Sorbo} and Sonia Laudanna and Anna Vacca and Corrado A. Visaggio and Gerardo Canfora", title = "Profiling gas consumption in {Solidity} smart contracts", keywords = "Solidity (a programming language for writing smart contracts on different blockchain platforms, including Ethereum)", journal = j-J-SYST-SOFTW, volume = "186", number = "??", pages = "??--??", month = apr, year = "2022", CODEN = "JSSODM", DOI = "https://doi.org/10.1016/j.jss.2021.111193", ISSN = "0164-1212 (print), 1873-1228 (electronic)", ISSN-L = "0164-1212", bibdate = "Wed Feb 2 07:44:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0164121221002697", acknowledgement = ack-nhfb, articleno = "111193", fjournal = "Journal of Systems and Software", journal-URL = "http://www.sciencedirect.com/science/journal/01641212", } @Article{Drusinsky:2022:HEC, author = "Doron Drusinsky", title = "On the High Energy Consumption of {Bitcoin} Mining", journal = j-COMPUTER, volume = "55", number = "1", pages = "88--93", month = jan, year = "2022", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2021.3123781", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Mon Jan 31 16:02:29 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{ElAzzaoui:2022:BBD, author = "Abir {El Azzaoui} and Pradip Kumar Sharma and Jong Hyuk Park", title = "Blockchain-based delegated {Quantum Cloud} architecture for medical big data security", journal = j-J-NETW-COMPUT-APPL, volume = "198", number = "??", pages = "??--??", month = feb, year = "2022", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2021.103304", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Thu Jan 20 08:06:58 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804521002952", acknowledgement = ack-nhfb, articleno = "103304", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Fan:2022:TBB, author = "Yongkai Fan and Xiaodong Lin and Wei Liang and Jinghan Wang and Gang Tan and Xia Lei and Lei Jing", title = "{TraceChain}: a blockchain-based scheme to protect data confidentiality and traceability", journal = j-SPE, volume = "52", number = "1", pages = "115--129", month = jan, year = "2022", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2753", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Jan 21 10:29:09 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "21 October 2019", } @Article{Jatoth:2022:ICB, author = "Chandrashekar Jatoth and Rishabh Jain and Ugo Fiore and Subrahmanyam Chatharasupalli", title = "Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning", journal = j-FUTURE-INTERNET, volume = "14", number = "1", pages = "16", day = "28", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14010016", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:15 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/1/16", abstract = "Although the blockchain technology is gaining a widespread adoption across multiple sectors, its most popular application is in cryptocurrency. The decentralized and anonymous nature of transactions in a cryptocurrency blockchain has attracted a multitude of participants, and now significant amounts of money are being exchanged by the day. This raises the need of analyzing the blockchain to discover information related to the nature of participants in transactions. This study focuses on the identification for risky and non-risky blocks in a blockchain. In this paper, the proposed approach is to use ensemble learning with or without feature selection using correlation-based feature selection. Ensemble learning yielded good results in the experiments, but class-wise analysis reveals that ensemble learning with feature selection improves even further. After training Machine Learning classifiers on the dataset, we observe an improvement in accuracy of 2-3\% and in F-score of 7-8\%.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Kianersi:2022:ERM, author = "Darius Kianersi and Suraj Uppalapati and Anirudh Bansal and Jeremy Straub", title = "Evaluation of a Reputation Management Technique for Autonomous Vehicles", journal = j-FUTURE-INTERNET, volume = "14", number = "2", pages = "31", month = "????", year = "2022", CODEN = "????", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:15 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/2/31", abstract = "Future autonomous vehicles will rely heavily on sharing and communicating information with other vehicles to maximize their efficiency. These interactions, which will likely include details about the positions of surrounding vehicles and obstacles on the road, are essential to their decision-making and the prevention of accidents. However, malicious vehicles-those that intentionally communicate false information-have the capacity to adversely influence other vehicles in the network. This paper presents and evaluates a reputation management system, capable of identifying malicious actors, to mitigate their effects on the vehicle network. The viability of multiple report weighting schemes to calculate reputation is evaluated through a simulation, and a blockchain-based backend for the reputation management system to securely maintain and communicate reputation data is proposed. Storage and computational challenges are considered. This paper shows that weighting schemas, related to the number and reputation of witnesses, positively affect the accuracy of the model and are able to identify malicious vehicles in a network with consistent accuracy and scalability.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Kinkeldey:2022:BEV, author = "Christoph Kinkeldey and Jean-Daniel Fekete and Tanja Blascheck and Petra Isenberg", title = "{BitConduite}: Exploratory Visual Analysis of Entity Activity on the {Bitcoin} Network", journal = j-IEEE-CGA, volume = "42", number = "1", pages = "84--94", month = jan # "\slash " # feb, year = "2022", CODEN = "ICGADZ", DOI = "https://doi.org/10.1109/MCG.2021.3070303", ISSN = "0272-1716 (print), 1558-1756 (electronic)", ISSN-L = "0272-1716", bibdate = "Thu Jan 27 11:20:07 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeecga.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Computer Graphics and Applications", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=38", } @Article{McCalman:2022:AAF, author = "Lachlan McCalman and Daniel Steinberg and Grace Abuhamad and Marc-Etienne Brunet and Robert C. Williamson and Richard Zemel", title = "Assessing {AI} Fairness in Finance", journal = j-COMPUTER, volume = "55", number = "1", pages = "94--97", month = jan, year = "2022", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2021.3123796", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Mon Jan 31 16:02:29 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Min:2022:BNM, author = "Xinping Min and Lanju Kong and Qingzhong Li and Yuan Liu and Baochen Zhang and Yongguang Zhao and Zongshui Xiao and Bin Guo", title = "Blockchain-native mechanism supporting the circulation of complex physical assets", journal = j-COMP-NET-AMSTERDAM, volume = "202", number = "??", pages = "??--??", day = "15", month = jan, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108588", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004928", acknowledgement = ack-nhfb, articleno = "108588", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Przytarski:2022:QPB, author = "Dennis Przytarski and Christoph Stach and Cl{\'e}mentine Gritti and Bernhard Mitschang", title = "Query Processing in Blockchain Systems: Current State and Future Challenges", journal = j-FUTURE-INTERNET, volume = "14", number = "1", pages = "1", day = "21", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14010001", ISSN = "1999-5903", bibdate = "Wed Jan 19 05:45:15 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/1/1", abstract = "When, in 2008, Satoshi Nakamoto envisioned the first distributed database management system that relied on cryptographically secured chain of blocks to store data in an immutable and tamper-resistant manner, his primary use case was the introduction of a digital currency. Owing to this use case, the blockchain system was geared towards efficient storage of data, whereas the processing of complex queries, such as provenance analyses of data history, is out of focus. The increasing use of Internet of Things technologies and the resulting digitization in many domains, however, have led to a plethora of novel use cases for a secure digital ledger. For instance, in the healthcare sector, blockchain systems are used for the secure storage and sharing of electronic health records, while the food industry applies such systems to enable a reliable food-chain traceability, e.g., to prove compliance with cold chains. In these application domains, however, querying the current state is not sufficient-comprehensive history queries are required instead. Due to these altered usage modes involving more complex query types, it is questionable whether today's blockchain systems are prepared for this type of usage and whether such queries can be processed efficiently by them. In our paper, we therefore investigate novel use cases for blockchain systems and elicit their requirements towards a data store in terms of query capabilities. We reflect the state of the art in terms of query support in blockchain systems and assess whether it is capable of meeting the requirements of such more sophisticated use cases. As a result, we identify future research challenges with regard to query processing in blockchain systems.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Ruckel:2022:FIP, author = "Timon R{\"u}ckel and Johannes Sedlmeir and Peter Hofmann", title = "Fairness, integrity, and privacy in a scalable blockchain-based federated learning system", journal = j-COMP-NET-AMSTERDAM, volume = "202", number = "??", pages = "??--??", day = "15", month = jan, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108621", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621005132", acknowledgement = ack-nhfb, articleno = "108621", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Saltini:2022:BRO, author = "Roberto Saltini", title = "{BigFooT}: a robust optimal-latency {BFT} blockchain consensus protocol with dynamic validator membership", journal = j-COMP-NET-AMSTERDAM, volume = "204", number = "??", pages = "??--??", day = "26", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108632", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S138912862100520X", acknowledgement = ack-nhfb, articleno = "108632", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Tovanich:2022:MVA, author = "Natkamon Tovanich and Nicolas Souli{\'e} and Nicolas Heulot and Petra Isenberg", title = "{MiningVis}: Visual Analytics of the Bitcoin Mining Economy", journal = j-IEEE-TRANS-VIS-COMPUT-GRAPH, volume = "28", number = "1", pages = "868--878", month = jan, year = "2022", CODEN = "ITVGEA", DOI = "https://doi.org/10.1109/TVCG.2021.3114821", ISSN = "1077-2626", ISSN-L = "1077-2626", bibdate = "Thu Dec 30 06:47:32 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransviscomputgraph2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Visualization and Computer Graphics", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945", } @Article{Wan:2022:PPB, author = "Yichen Wan and Youyang Qu and Longxiang Gao and Yong Xiang", title = "Privacy-preserving blockchain-enabled federated learning for {B5G}-driven edge computing", journal = j-COMP-NET-AMSTERDAM, volume = "204", number = "??", pages = "??--??", day = "26", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108671", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621005454", acknowledgement = ack-nhfb, articleno = "108671", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Zhang:2022:BBP, author = "Guipeng Zhang and Zhenguo Yang and Wenyin Liu", title = "Blockchain-based privacy preserving e-health system for healthcare data in cloud", journal = j-COMP-NET-AMSTERDAM, volume = "203", number = "??", pages = "??--??", day = "11", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108586", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621004916", acknowledgement = ack-nhfb, articleno = "108586", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Zhang:2022:OPB, author = "Kaiyuan Zhang and Xiaolin Gui and Dewang Ren and Tianjiao Du and Xin He", title = "Optimal pricing-based computation offloading and resource allocation for blockchain-enabled beyond {5G} networks", journal = j-COMP-NET-AMSTERDAM, volume = "203", number = "??", pages = "??--??", day = "11", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2021.108674", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Tue Feb 1 09:19:07 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128621005478", acknowledgement = ack-nhfb, articleno = "108674", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Ch:2020:SPU, author = "Rupa Ch and Gautam Srivastava and Thippa Reddy Gadekallu and Praveen Kumar Reddy Maddikunta and Sweta Bhattacharya", title = "Security and privacy of {UAV} data using blockchain technology", journal = j-J-INFO-SEC-APPL, volume = "55", number = "??", pages = "??--??", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102670", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S221421262030822X", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102670", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Dwivedi:2020:BBS, author = "Sanjeev Kumar Dwivedi and Ruhul Amin and Satyanarayana Vollala", title = "Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism", journal = j-J-INFO-SEC-APPL, volume = "54", number = "??", pages = "??--??", month = oct, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102554", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:31 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620301484", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102554", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Gao:2020:SFI, author = "Juntao Gao and Tong Wu and Xuelian Li", title = "Secure, fair and instant data trading scheme based on bitcoin", journal = j-J-INFO-SEC-APPL, volume = "53", number = "??", pages = "??--??", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102511", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:30 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212619309688", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102511", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Khattak:2020:DPI, author = "Hasan Ali Khattak and Komal Tehreem and Ahmad Almogren and Zoobia Ameer and Ikram Ud Din and Muhammad Adnan", title = "Dynamic pricing in industrial {Internet of Things}: Blockchain application for energy management in smart cities", journal = j-J-INFO-SEC-APPL, volume = "55", number = "??", pages = "??--??", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102615", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620307808", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102615", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Shamshad:2020:SBB, author = "Salman Shamshad and Minahil and Khalid Mahmood and Saru Kumari and Chien-Ming Chen", title = "A secure blockchain-based e-health records storage and sharing scheme", journal = j-J-INFO-SEC-APPL, volume = "55", number = "??", pages = "??--??", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102590", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620307596", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102590", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Tanwar:2020:BBE, author = "Sudeep Tanwar and Karan Parekh and Richard Evans", title = "Blockchain-based electronic healthcare record system for healthcare 4.0 applications", journal = j-J-INFO-SEC-APPL, volume = "50", number = "??", pages = "??--??", month = feb, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2019.102407", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:27 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212619306155", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102407", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Zhang:2020:DAP, author = "Jing Zhang and Rong Tan and Chunhua Su and Wen Si", title = "Design and application of a personal credit information sharing platform based on consortium blockchain", journal = j-J-INFO-SEC-APPL, volume = "55", number = "??", pages = "??--??", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102659", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620308139", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102659", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Zhang:2020:SGD, author = "Lihua Zhang and Jingjing Li and Fangzhou Hu and Yang Huang and Jiayi Bai", title = "Smart grid data access control scheme based on blockchain", journal = j-COMPUT-INTELL, volume = "36", number = "4", pages = "1773--1784", month = nov, year = "2020", CODEN = "COMIE6", DOI = "https://doi.org/10.1111/coin.12385", ISSN = "0824-7935 (print), 1467-8640 (electronic)", ISSN-L = "0824-7935", bibdate = "Fri Apr 1 07:46:59 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computintell.bib", acknowledgement = ack-nhfb, ajournal = "Comput. Intell.", fjournal = "Computational Intelligence", journal-URL = "https://onlinelibrary.wiley.com/journal/14678640", onlinedate = "26 November 2020", } @Article{An:2021:EPP, author = "Haoyang An and Jiageng Chen", title = "{ElearnChain}: a privacy-preserving consortium blockchain system for e-learning educational records", journal = j-J-INFO-SEC-APPL, volume = "63", number = "??", pages = "??--??", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.103013", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621002088", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103013", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Bhavin:2021:BQB, author = "Makwana Bhavin and Sudeep Tanwar and Navneet Sharma and Sudhanshu Tyagi and Neeraj Kumar", title = "Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications", journal = j-J-INFO-SEC-APPL, volume = "56", number = "??", pages = "??--??", month = feb, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102673", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:34 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620308255", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102673", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Bisogni:2021:ENE, author = "Carmen Bisogni and Gerardo Iovane and Riccardo Emanuele Landi and Michele Nappi", title = "{ECB2}: a novel encryption scheme using face biometrics for signing blockchain transactions", journal = j-J-INFO-SEC-APPL, volume = "59", number = "??", pages = "??--??", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102814", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:37 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000545", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102814", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Canakci:2021:SMB, author = "Burcu Canakci and Robbert {Van Renesse}", title = "Scaling Membership of {Byzantine} Consensus", journal = j-TOCS, volume = "38", number = "3--4", pages = "6:1--6:31", month = nov, year = "2021", CODEN = "ACSYEC", DOI = "https://doi.org/10.1145/3473138", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Mon Apr 18 11:45:45 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tocs.bib", URL = "https://dl.acm.org/doi/10.1145/3473138", abstract = "Scaling Byzantine Fault Tolerant (BFT) systems in terms of membership is important for secure applications with large participation such as blockchains. While traditional protocols have low latency, they cannot handle many processors. Conversely, \ldots{}", acknowledgement = ack-nhfb, articleno = "6", fjournal = "ACM Transactions on Computer Systems", journal-URL = "https://dl.acm.org/loi/tocs", } @Article{Cha:2021:BEC, author = "Jeonghun Cha and Sushil Kumar Singh and Tae Woo Kim and Jong Hyuk Park", title = "Blockchain-empowered cloud architecture based on secret sharing for smart city", journal = j-J-INFO-SEC-APPL, volume = "57", number = "??", pages = "??--??", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102686", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:34 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620308383", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102686", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Chan:2021:SSB, author = "Wai Kok Chan and Ji-Jian Chin and Vik Tor Goh", title = "Simple and scalable blockchain with privacy", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102700", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620308474", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102700", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Chen:2021:BEH, author = "Mengji Chen and Taj Malook and Ateeq Ur Rehman and Yar Muhammad and Mohammad Dahman Alshehri and Aamir Akbar and Muhammad Bilal and Muazzam A. Khan", title = "Blockchain-enabled healthcare system for detection of diabetes", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102771", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S221421262100020X", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102771", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Chen:2021:CPQ, author = "Jiahui Chen and Wensheng Gan and Muchuang Hu and Chien-Ming Chen", title = "On the construction of a post-quantum blockchain for smart city", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102780", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000284", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102780", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Chen:2021:ERC, author = "Xusheng Chen and Shixiong Zhao and Ji Qi and Jianyu Jiang and Haoze Song and Cheng Wang and Tsz On Li and T-H. Hubert Chan and Fengwei Zhang and Xiapu Luo and Sen Wang and Gong Zhang and Heming Cuih", title = "Efficient and {DoS-resistant} Consensus for Permissioned Blockchains", journal = j-SIGMETRICS, volume = "49", number = "3", pages = "61--62", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3529113.3529134", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Mon Apr 18 11:23:16 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3529113.3529134", abstract = "Existing permissioned blockchain systems designate a fixed and explicit group of committee nodes to run a consensus protocol that confirms the same sequence of blocks among all nodes. Unfortunately, when such a system runs on a large scale on the \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Chen:2021:SDC, author = "Weimin Chen and Xinran Li and Yuting Sui and Ningyu He and Haoyu Wang and Lei Wu and Xiapu Luo", title = "{SADPonzi}: Detecting and Characterizing {Ponzi} Schemes in {Ethereum} Smart Contracts", journal = j-SIGMETRICS, volume = "49", number = "1", pages = "35--36", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3543516.3460105", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Wed Jun 8 06:42:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3543516.3460105", abstract = "Ponzi schemes are financial scams that lure users under the promise of high profits. With the prosperity of Bitcoin and blockchain technologies, there has been growing anecdotal evidence that this classic fraud has emerged in \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Chiu:2021:MDM, author = "Wei-Yang Chiu and Weizhi Meng and Christian D. Jensen", title = "My data, my control: a secure data sharing and access scheme over blockchain", journal = j-J-INFO-SEC-APPL, volume = "63", number = "??", pages = "??--??", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.103020", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621001885", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103020", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Deebak:2021:PPS, author = "B. D. Deebak and Fadi AL-Turjman", title = "Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102749", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000028", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102749", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Eddine:2021:EEA, author = "Merzougui Salah Eddine and Mohamed Amine Ferrag and Othmane Friha and Leandros Maglaras", title = "{EASBF}: an efficient authentication scheme over blockchain for fog computing-enabled {Internet of Vehicles}", journal = j-J-INFO-SEC-APPL, volume = "59", number = "??", pages = "??--??", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102802", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:37 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000442", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102802", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Gao:2021:ADH, author = "Lan Gao and Yingying Fan and Jinchi Lv and Qi-Man Shao", title = "Asymptotic distributions of high-dimensional distance correlation inference", journal = j-ANN-STAT, volume = "49", number = "4", pages = "1999--2020", month = aug, year = "2021", CODEN = "ASTSC7", DOI = "https://doi.org/10.1214/20-AOS2024", ISSN = "0090-5364 (print), 2168-8966 (electronic)", ISSN-L = "0090-5364", MRclass = "62E20; 62H20; 62G10; 62G20", bibdate = "Wed Apr 6 06:43:52 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/annstat2020.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://projecteuclid.org/journals/annals-of-statistics/volume-49/issue-4/Asymptotic-distributions-of-high-dimensional-distance-correlation-inference/10.1214/20-AOS2024.full", acknowledgement = ack-nhfb, ajournal = "Ann. Stat.", fjournal = "Annals of Statistics", journal-URL = "http://projecteuclid.org/all/euclid.aos/", keywords = "blockchain; central limit theorem; Distance correlation; high dimensionality; nonlinear dependence detection; nonparametric inference; power; rate of convergence; test of independence", remark = "Memorial issue for Charles Stein.", } @Article{Gao:2021:TCC, author = "Bingyu Gao and Haoyu Wang and Pengcheng Xia and Siwei Wu and Yajin Zhou and Xiapu Luo and Gareth Tyson", title = "Tracking Counterfeit Cryptocurrency End-to-end", journal = j-SIGMETRICS, volume = "49", number = "1", pages = "33--34", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3543516.3456282", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Wed Jun 8 06:42:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib", URL = "https://dl.acm.org/doi/10.1145/3543516.3456282", abstract = "With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum and \ldots{}", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "https://dl.acm.org/loi/sigmetrics", } @Article{Hu:2021:BBP, author = "Qinwen Hu and Muhammad Rizwan Asghar and Sherali Zeadally", title = "Blockchain-based public ecosystem for auditing security of software applications", journal = j-COMPUTING, volume = "103", number = "11", pages = "2643--2665", month = nov, year = "2021", CODEN = "CMPTA2", DOI = "https://doi.org/10.1007/s00607-021-00954-6", ISSN = "0010-485X (print), 1436-5057 (electronic)", ISSN-L = "0010-485X", bibdate = "Mon May 9 09:55:42 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computing.bib", URL = "https://link.springer.com/article/10.1007/s00607-021-00954-6", acknowledgement = ack-nhfb, ajournal = "Computing", fjournal = "Computing", journal-URL = "http://link.springer.com/journal/607", } @Article{Huang:2021:REB, author = "Junjie Huang and Liang Tan and Wenjuan Li and Keping Yu", title = "{RON}-enhanced blockchain propagation mechanism for edge-enabled smart cities", journal = j-J-INFO-SEC-APPL, volume = "61", number = "??", pages = "??--??", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102936", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621001538", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102936", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Jan:2021:BEE, author = "Mian Ahmad Jan and Kuo-Hui Yeh and Zhiyuan Tan and Yulei Wu", title = "Blockchain for edge-enabled smart cities applications", journal = j-J-INFO-SEC-APPL, volume = "61", number = "??", pages = "??--??", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102937", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S221421262100154X", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102937", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Khalid:2021:CBB, author = "Rabiya Khalid and Muhammad Waseem Malik and Turki Ali Alghamdi and Nadeem Javaid", title = "A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities", journal = j-J-INFO-SEC-APPL, volume = "63", number = "??", pages = "??--??", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102998", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621002064", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102998", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Li:2021:BBS, author = "Haiyu Li and Tao Wang and Zirui Qiao and Bo Yang and Yueyang Gong and Jingyi Wang and Guoyong Qiu", title = "Blockchain-based searchable encryption with efficient result verification and fair payment", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102791", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S221421262100034X", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102791", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Lu:2021:SCD, author = "Jing Lu and Shihong Wu and Hanlei Cheng and Zhiyu Xiang", title = "Smart contract for distributed energy trading in virtual power plants based on blockchain", journal = j-COMPUT-INTELL, volume = "37", number = "3", pages = "1445--1455", month = aug, year = "2021", CODEN = "COMIE6", DOI = "https://doi.org/10.1111/coin.12388", ISSN = "0824-7935 (print), 1467-8640 (electronic)", ISSN-L = "0824-7935", bibdate = "Fri Apr 1 07:47:01 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computintell.bib", acknowledgement = ack-nhfb, ajournal = "Comput. Intell.", fjournal = "Computational Intelligence", journal-URL = "https://onlinelibrary.wiley.com/journal/14678640", onlinedate = "02 August 2020", } @Article{Lv:2021:MPT, author = "Lingling Lv and Zhipeng Yang and Lei Zhang and Quanzhen Huang and Zhihong Tian", title = "Multi-party transaction framework for drone services based on alliance blockchain in smart cities", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102792", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000363", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102792", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Olukoya:2021:DBR, author = "Oluwafemi Olukoya", title = "Distilling blockchain requirements for digital investigation platforms", journal = j-J-INFO-SEC-APPL, volume = "62", number = "??", pages = "??--??", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102969", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621001800", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102969", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Panja:2021:SEE, author = "Somnath Panja and Bimal Roy", title = "A secure end-to-end verifiable e-voting system using blockchain and cloud server", journal = j-J-INFO-SEC-APPL, volume = "59", number = "??", pages = "??--??", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102815", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:37 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000557", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102815", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Polap:2021:AAI, author = "Dawid Po{\l}ap and Gautam Srivastava and Keping Yu", title = "Agent architecture of an intelligent medical system based on federated learning and blockchain technology", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102748", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000016", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102748", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Priyadharshini:2021:LCC, author = "K. Priyadharshini and R. Aroul Canessane", title = "Light chain consensus reinforcement machine learning: an effective blockchain model for {Internet of Things} using for its advancement and challenges", journal = j-COMPUT-INTELL, volume = "37", number = "4", pages = "1651--1672", month = nov, year = "2021", CODEN = "COMIE6", DOI = "https://doi.org/10.1111/coin.12395", ISSN = "0824-7935 (print), 1467-8640 (electronic)", ISSN-L = "0824-7935", bibdate = "Fri Apr 1 07:47:02 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computintell.bib", acknowledgement = ack-nhfb, ajournal = "Comput. Intell.", fjournal = "Computational Intelligence", journal-URL = "https://onlinelibrary.wiley.com/journal/14678640", onlinedate = "27 August 2020", } @Article{Raman:2021:CSB, author = "Ravi Kiran Raman and Lav R. Varshney", title = "Coding for Scalable Blockchains via Dynamic Distributed Storage", journal = j-IEEE-TRANS-NETWORKING, volume = "29", number = "6", pages = "2588--2601", month = dec, year = "2021", CODEN = "IEANEP", DOI = "https://doi.org/10.1109/TNET.2021.3098613", ISSN = "1063-6692 (print), 1558-2566 (electronic)", ISSN-L = "1063-6692", bibdate = "Fri Apr 15 05:49:27 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib", URL = "https://dl.acm.org/doi/10.1109/TNET.2021.3098613", abstract = "Blockchains store transaction data in the form of a distributed ledger where each node in the network stores a current copy of the sequence of transactions as a hash chain. This requirement of storing the entire ledger incurs a high storage cost that \ldots{}", acknowledgement = ack-nhfb, fjournal = "IEEE\slash ACM Transactions on Networking", journal-URL = "https://dl.acm.org/loi/ton", } @Article{Ren:2021:PPB, author = "Yanli Ren and Xiangyu Li and Shi-Feng Sun and Xingliang Yuan and Xinpeng Zhang", title = "Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2020.102698", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212620308450", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102698", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Shah:2021:BBS, author = "Jay Shah and Sarthak Agarwal and Arpit Shukla and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar", title = "Blockchain-based scheme for the mobile number portability", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102764", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000144", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102764", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Sharma:2021:BBD, author = "Pratima Sharma and Rajni Jindal and Malaya Dutta Borah", title = "Blockchain-based decentralized architecture for cloud storage system", journal = j-J-INFO-SEC-APPL, volume = "62", number = "??", pages = "??--??", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102970", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621001812", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102970", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Sharma:2021:BBS, author = "Rahul Sharma and Mohammad Wazid and Prosanta Gope", title = "A blockchain based secure communication framework for community interaction", journal = j-J-INFO-SEC-APPL, volume = "58", number = "??", pages = "??--??", month = may, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102790", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:35 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000351", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102790", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Verma:2021:NBB, author = "Ashwin Verma and Pronaya Bhattacharya and Deepti Saraswat and Sudeep Tanwar", title = "{{\em NyaYa\/}}: Blockchain-based electronic law record management scheme for judicial investigations", journal = j-J-INFO-SEC-APPL, volume = "63", number = "??", pages = "??--??", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.103025", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:40 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621001873", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103025", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Wang:2021:DTE, author = "Huili Wang and Wenping Ma and Fuyang Deng and Haibin Zheng and Qianhong Wu", title = "Dynamic threshold {ECDSA} signature and application to asset custody in blockchain", journal = j-J-INFO-SEC-APPL, volume = "61", number = "??", pages = "??--??", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102805", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000466", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102805", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Wang:2021:PPS, author = "Wei Wang and Lianhai Wang and Peijun Zhang and Shujiang Xu and Kunlun Fu and Lianxin Song and Shanshan Hu", title = "A privacy protection scheme for telemedicine diagnosis based on double blockchain", journal = j-J-INFO-SEC-APPL, volume = "61", number = "??", pages = "??--??", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102845", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000818", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102845", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Wang:2021:SSS, author = "Yu Wang and Gaopeng Gou and Chang Liu and Mingxin Cui and Zhen Li and Gang Xiong", title = "Survey of security supervision on blockchain from the perspective of technology", journal = j-J-INFO-SEC-APPL, volume = "60", number = "??", pages = "??--??", month = aug, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102859", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621000922", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102859", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Xu:2021:SIB, author = "Zhijun Xu and Jun Zhang and Jihua Zhou", title = "A scheme for intelligent blockchain-based manufacturing industry supply chain management", journal = j-COMPUTING, volume = "103", number = "8", pages = "1771--1790", month = aug, year = "2021", CODEN = "CMPTA2", DOI = "https://doi.org/10.1007/s00607-020-00880-z", ISSN = "0010-485X (print), 1436-5057 (electronic)", ISSN-L = "0010-485X", bibdate = "Mon May 9 09:55:41 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computing.bib", URL = "https://link.springer.com/article/10.1007/s00607-020-00880-z", acknowledgement = ack-nhfb, ajournal = "Computing", fjournal = "Computing", journal-URL = "http://link.springer.com/journal/607", } @Article{Zhang:2021:RSX, author = "Yuhui Zhang and Dejun Yang", title = "{RobustPay$^+$}: Robust Payment Routing With Approximation Guarantee in Blockchain-Based Payment Channel Networks", journal = j-IEEE-TRANS-NETWORKING, volume = "29", number = "4", pages = "1676--1686", month = aug, year = "2021", CODEN = "IEANEP", DOI = "https://doi.org/10.1109/TNET.2021.3069725", ISSN = "1063-6692 (print), 1558-2566 (electronic)", ISSN-L = "1063-6692", bibdate = "Wed Apr 20 07:36:13 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib", URL = "https://dl.acm.org/doi/10.1109/TNET.2021.3069725", abstract = "The past decade has witnessed an explosive growth in cryptocurrencies, but the blockchain-based cryptocurrencies have also raised many concerns, among which a crucial one is the scalability issue. Suffering from the large overhead of global consensus and \ldots{}", acknowledgement = ack-nhfb, fjournal = "IEEE\slash ACM Transactions on Networking", journal-URL = "https://dl.acm.org/loi/ton", } @Article{Zhu:2021:ICM, author = "Hegui Zhu and Yujia Guo and Libo Zhang", title = "An improved convolution {Merkle} tree-based blockchain electronic medical record secure storage scheme", journal = j-J-INFO-SEC-APPL, volume = "61", number = "??", pages = "??--??", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.102952", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621001642", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "102952", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Abid:2022:NBB, author = "Amal Abid and Saoussen Cheikhrouhou and Slim Kallel and Mohamed Jmaiel", title = "{NovidChain}: {Blockchain}-based privacy-preserving platform for {COVID-19} test\slash vaccine certificates", journal = j-SPE, volume = "52", number = "4", pages = "841--867", month = apr, year = "2022", CODEN = "SPEXBL", DOI = "https://doi.org/10.1002/spe.2983", ISSN = "0038-0644 (print), 1097-024X (electronic)", ISSN-L = "0038-0644", bibdate = "Fri Apr 1 16:34:33 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/spe.bib", acknowledgement = ack-nhfb, ajournal = "Softw. Pract. Exp.", fjournal = "Software --- Practice and Experience", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X", onlinedate = "18 May 2021", } @Article{Adjei-Arthur:2022:BAC, author = "Bonsu Adjei-Arthur and Jianbin Gao and Qi Xia and Eliezer da Silva Tavares and Hu Xia and Sandro Amofa and Yu Wang", title = "A blockchain-adaptive contractual approach for multi-contracting organizational entities", journal = j-FUT-GEN-COMP-SYS, volume = "132", number = "??", pages = "93--107", month = jul, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.02.003", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 29 14:04:51 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000462", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Ahmadjee:2022:SBA, author = "Sabreen Ahmadjee and Carlos Mera-G{\'o}mez and Rami Bahsoon and Rick Kazman", title = "A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats", journal = j-TOSEM, volume = "31", number = "2", pages = "36e:1--36e:45", month = apr, year = "2022", CODEN = "ATSMER", DOI = "https://doi.org/10.1145/3502740", ISSN = "1049-331X (print), 1557-7392 (electronic)", ISSN-L = "1049-331X", bibdate = "Tue May 24 07:09:20 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tosem.bib", URL = "https://dl.acm.org/doi/10.1145/3502740", abstract = "Blockchain is a disruptive technology intended to implement secure decentralised distributed systems, in which transactional data can be shared, stored, and verified by participants of the system without needing a central authentication/verification authority. Blockchain-based systems have several architectural components and variants, which architects can leverage to build secure software systems. However, there is a lack of studies to assist architects in making architecture design and configuration decisions for blockchain-based systems. This knowledge gap may increase the chance of making unsuitable design decisions and producing configurations prone to potential security risks. To address this limitation, we report our comprehensive systematic literature review to derive a taxonomy of commonly used architecture design decisions in blockchain-based systems. We map each of these decisions to potential security attacks and their posed threats. MITRE's attack tactic categories and Microsoft STRIDE threat modeling are used to systematically classify threats and their associated attacks to identify potential attacks and threats in blockchain-based systems. Our mapping approach aims to guide architects to make justifiable design decisions that will result in more secure implementations.", acknowledgement = ack-nhfb, articleno = "36e", fjournal = "ACM Transactions on Software Engineering and Methodology", journal-URL = "https://dl.acm.org/loi/tosem", } @Article{Alzoubi:2022:ITB, author = "Yehia Ibrahim Alzoubi and Ahmad Al-Ahmad and Hasan Kahtan and Ashraf Jaradat", title = "{Internet of Things} and Blockchain Integration: Security, Privacy, Technical, and Design Challenges", journal = j-FUTURE-INTERNET, volume = "14", number = "7", pages = "216", day = "21", month = jul, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14070216", ISSN = "1999-5903", bibdate = "Tue Jul 26 06:44:01 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/7/216", abstract = "The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environment would require seamless authentication, data protection, stability, attack resistance, ease of deployment, and self-maintenance, among other things. Blockchain, a technology that was born with the cryptocurrency Bitcoin, may fulfill Internet of things requirements. However, due to the characteristics of both Internet of things devices and Blockchain technology, integrating Blockchain and the Internet of things can cause several challenges. Despite a large number of papers that have been published in the field of Blockchain and the Internet of things, the problems of this combination remain unclear and scattered. Accordingly, this paper aims to provide a comprehensive survey of the challenges related to Blockchain-Internet of things integration by evaluating the related peer-reviewed literature. The paper also discusses some of the recommendations for reducing the effects of these challenges. Moreover, the paper discusses some of the unsolved concerns that must be addressed before the next generation of integrated Blockchain-Internet of things applications can be deployed. Lastly, future trends in the context of Blockchain-Internet of things integration are discussed.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Amiri-Zarandi:2022:LLB, author = "Mohammad Amiri-Zarandi and Rozita A. Dara and Evan Fraser", title = "{LBTM}: a lightweight blockchain-based trust management system for {Social Internet of Things}", journal = j-J-SUPERCOMPUTING, volume = "78", number = "6", pages = "8302--8320", month = apr, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04231-3", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:49 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04231-3", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Caldarelli:2022:OBO, author = "Giulio Caldarelli", title = "Overview of Blockchain Oracle Research", journal = j-FUTURE-INTERNET, volume = "14", number = "6", pages = "175", day = "08", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14060175", ISSN = "1999-5903", bibdate = "Fri Jun 24 09:41:47 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/6/175", abstract = "Whereas the use of distributed ledger technologies has previously been limited to cryptocurrencies, other sectors-such as healthcare, supply chain, and finance-can now benefit from them because of bitcoin scripts and smart contracts. However, these applications rely on oracles to fetch data from the real world, which cannot reproduce the trustless environment provided by blockchain networks. Despite their crucial role, academic research on blockchain oracles is still in its infancy, with few contributions and a heterogeneous approach. This study undertakes a bibliometric analysis by highlighting institutions and authors that are actively contributing to the oracle literature. Investigating blockchain oracle research state of the art, research themes, research directions, and converging studies will also be highlighted to discuss, on the one hand, current advancements in the field and, on the other hand, areas that require more investigation. The results also show that although worldwide collaboration is still lacking, various authors and institutions have been working in similar directions.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Treiblmaier:2022:WCA, author = "Horst Treiblmaier", title = "What Is Coming across the Horizon and How Can We Handle It? {Bitcoin} Scenarios as a Starting Point for Rigorous and Relevant Research", journal = j-FUTURE-INTERNET, volume = "14", number = "6", pages = "162", day = "26", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14060162", ISSN = "1999-5903", bibdate = "Fri Jun 24 09:41:47 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/6/162", abstract = "The disruptive impact of blockchain technologies can be felt across numerous industries as it threatens to disrupt existing business models and economic structures. To better understand this impact, academic researchers regularly apply well-established theories and methods. The vast majority of these approaches are based on multivariate methods that rely on average behavior and treat extreme cases as outliers. However, as recent history has shown, current developments in blockchain and cryptocurrencies are frequently characterized by aberrant behavior and unexpected events that shape individuals' perceptions, market behavior, and public policymaking. In this paper, I apply various scenario tools to identify such extreme scenarios and illustrate their underlying structure as bundles of interdependent factors. Using the case of Bitcoin, I illustrate that the identification of extreme positive and negative scenarios is complex and heavily depends on underlying economic assumptions. I present three scenarios in which Bitcoin is characterized as a financial savior, as a severe threat to economic stability, or as a substitute to overcome several shortcomings of the existing financial system. The research questions that can be derived from these scenarios bridge behavioral and design science research and provide a fertile ground for impactful future research.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Antwi:2022:SNO, author = "Robert Antwi and James Dzisi Gadze and Eric Tutu Tchao and Axel Sikora and Henry Nunoo-Mensah and Andrew Selasi Agbemenu and Kwame Opunie-Boachie Obour Agyekum and Justice Owusu Agyemang and Dominik Welte and Eliel Keelson", title = "A Survey on Network Optimization Techniques for Blockchain Systems", journal = j-ALGORITHMS-BASEL, volume = "15", number = "6", month = jun, year = "2022", CODEN = "ALGOCH", DOI = "https://doi.org/10.3390/a15060193", ISSN = "1999-4893 (electronic)", ISSN-L = "1999-4893", bibdate = "Fri Jun 24 09:32:54 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/algorithms.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.mdpi.com/1999-4893/15/6/193", acknowledgement = ack-nhfb, articleno = "193", fjournal = "Algorithms (Basel)", journal-URL = "https://www.mdpi.com/journal/algorithms", pagecount = "??", } @Article{Arasi:2022:AAB, author = "V. Ezhil Arasi and K. Indra Gandhi and K. Kulothungan", title = "Auditable attribute-based data access control using blockchain in cloud storage", journal = j-J-SUPERCOMPUTING, volume = "78", number = "8", pages = "10772--10798", month = may, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04293-3", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:51 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04293-3", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Baheti:2022:DFD, author = "Shrey Baheti and Parwat Singh Anjana and Sathya Peri and Yogesh Simmhan", title = "{DiPETrans}: a framework for distributed parallel execution of transactions of blocks in blockchains", journal = j-CCPE, volume = "34", number = "10", pages = "e6804:1--e6804:??", day = "1", month = may, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6804", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Apr 13 09:55:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe2020.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "04 January 2022", } @Article{Baniata:2022:PPA, author = "Hamza Baniata and Attila Kertesz", title = "{PriFoB}: a Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification", journal = j-J-NETW-COMPUT-APPL, volume = "205", number = "??", pages = "??--??", month = sep, year = "2022", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2022.103440", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Wed Jul 20 16:30:20 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804522000935", acknowledgement = ack-nhfb, articleno = "103440", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Baranwal:2022:BBA, author = "Gaurav Baranwal and Dinesh Kumar and Deo Prakash Vidyarthi", title = "\pkg{BARA}: a blockchain-aided auction-based resource allocation in edge computing enabled industrial internet of things", journal = j-FUT-GEN-COMP-SYS, volume = "135", number = "??", pages = "333--347", month = oct, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.05.007", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 10 07:12:09 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001728", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Bhattacharya:2022:MMM, author = "Pronaya Bhattacharya and Farnazbanu Patel and Sudeep Tanwar and Neeraj Kumar and Ravi Sharma", title = "\pkg{MB-MaaS}: Mobile Blockchain-based Mining-as-a-Service for {IIoT} environments", journal = j-J-PAR-DIST-COMP, volume = "168", number = "??", pages = "1--16", month = oct, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.05.008", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Sat Jul 16 10:35:47 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522001228", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Bilami:2022:LBB, author = "Karam Eddine Bilami and Pascal LORENZ", title = "Lightweight Blockchain-Based Scheme to Secure Wireless {M2M} Area Networks", journal = j-FUTURE-INTERNET, volume = "14", number = "5", pages = "158", day = "23", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14050158", ISSN = "1999-5903", bibdate = "Fri May 27 12:03:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/5/158", abstract = "Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their implementation on resource-constrained devices. In this paper, we discuss the architectures deployed for M2M communications and the security challenges, as well as the vulnerabilities and solutions to counter possible attacks. We present a lightweight design based on a private blockchain to secure wireless M2M communications at the device domain level. Blockchain integration provides secure storage of data while preserving integrity traceability and availability. Besides, the evaluation and experimentations under NS3 simulator of the proposed scheme show that the authentication mechanism is lightweight, and presents better performances comparatively to other protocols in terms of key parameters as communication and computational overheads, average delay and energy consumption.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Chen:2022:SBB, author = "Biwen Chen and Xue Li and Tao Xiang and Peng Wang", title = "{SBRAC}: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability", journal = j-J-INFO-SEC-APPL, volume = "65", number = "??", pages = "??--??", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.103082", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:42 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621002635", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103082", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Chen:2022:WDS, author = "Jiachi Chen and Xin Xia and David Lo and John Grundy", title = "Why Do Smart Contracts Self-Destruct? {Investigating} the Selfdestruct Function on {Ethereum}", journal = j-TOSEM, volume = "31", number = "2", pages = "30:1--30:37", month = apr, year = "2022", CODEN = "ATSMER", DOI = "https://doi.org/10.1145/3488245", ISSN = "1049-331X (print), 1557-7392 (electronic)", ISSN-L = "1049-331X", bibdate = "Tue May 24 07:09:20 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tosem.bib", URL = "https://dl.acm.org/doi/10.1145/3488245", abstract = "The \emph{selfdestruct} function is provided by Ethereum smart contracts to destroy a contract on the blockchain system. However, it is a double-edged sword for developers. On the one hand, using the \emph{selfdestruct} function enables developers to remove {\bf smart contracts (SCs)} from Ethereum and transfers Ethers when emergency situations happen, e.g., being attacked. On the other hand, this function can increase the complexity for the development and open an attack vector for attackers. To better understand the reasons why SC developers include or exclude the \emph{selfdestruct} function in their contracts, we conducted an online survey to collect feedback from them and summarize the key reasons. Their feedback shows that 66.67\% of the developers will deploy an updated contract to the Ethereum after destructing the old contract. According to this information, we propose a method to find the self-destructed contracts (also called predecessor contracts) and their updated version (successor contracts) by computing the code similarity. By analyzing the difference between the predecessor contracts and their successor contracts, we found five reasons that led to the death of the contracts; two of them (i.e., \emph{Unmatched ERC20 Token and Limits of Permission}) might affect the life span of contracts. We developed a tool named {\sc LifeScope} to detect these problems. {\sc LifeScope} reports 0 false positives or negatives in detecting \emph{Unmatched ERC20 Token}. In terms of \pkg{Limits of Permission}, {\sc LifeScope} achieves 77.89\% of $F$-measure and 0.8673 of AUC in average. According to the feedback of developers who exclude \emph{selfdestruct} functions, we propose suggestions to help developers use \emph{selfdestruct} functions in Ethereum smart contracts better.", acknowledgement = ack-nhfb, articleno = "30", fjournal = "ACM Transactions on Software Engineering and Methodology", journal-URL = "https://dl.acm.org/loi/tosem", } @Article{Chenli:2022:PNB, author = "Changhao Chenli and Wenyi Tang and Frank Gomulka and Taeho Jung", title = "{ProvNet}: Networked bi-directional blockchain for data sharing with verifiable provenance", journal = j-J-PAR-DIST-COMP, volume = "166", number = "??", pages = "32--44", month = aug, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.04.003", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Wed Jun 8 09:34:47 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522000818", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Cocco:2022:BSH, author = "Luisanna Cocco and Roberto Tonelli and Michele Marchesi", title = "Bitcoin as a Safe Haven during {COVID-19} Disease", journal = j-FUTURE-INTERNET, volume = "14", number = "4", pages = "98--??", day = "22", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14040098", ISSN = "1999-5903", bibdate = "Fri Apr 22 09:50:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/4/98", abstract = "In this paper, we investigate the role of Bitcoin as a safe haven against the stock market losses during the spread of COVID-19. The performed analysis was based on a regression model with dummy variables defined around some crucial dates of the pandemic and on the dynamic conditional correlations. To try to model the real dynamics of the markets, we studied the safe-haven properties of Bitcoin against thirteen of the major stock market indexes losses using daily data spanning from 1 July 2019 until 20 February 2021. A similar analysis was also performed for Ether. Results show that this pandemic impacts on the Bitcoin status as safe haven, but we are still far from being able to define Bitcoin as a safe haven.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Cocco:2022:SPI, author = "Luisanna Cocco and Roberto Tonelli and Michele Marchesi", title = "A System Proposal for Information Management in Building Sector Based on {BIM}, {SSI}, {IoT} and Blockchain", journal = j-FUTURE-INTERNET, volume = "14", number = "5", pages = "140", day = "30", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14050140", ISSN = "1999-5903", bibdate = "Fri May 27 12:03:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/5/140", abstract = "This work presents a Self Sovereign Identity based system proposal to show how Blockchain, Building Information Modeling, Internet of Thing devices, and Self Sovereign Identity concepts can support the process of building digitalization, guaranteeing the compliance standards and technical regulations. The proposal ensures eligibility, transparency and traceability of all information produced by stakeholders, or generated by IoT devices appropriately placed, during the entire life cycle of a building artifact. By exploiting the concepts of the Self Sovereign Identity, our proposal allows the identification of all involved stakeholders, the storage off-chain of all information, and that on-chain of the sole data necessary for the information notarization and certification, adopting multi-signature approval mechanisms where appropriate. In addition it allows the eligibility verification of the certificated information, providing also useful information for facility management. It is proposed as an innovative system and companies that adopt the Open Innovation paradigm might want to pursue it. The model proposal is designed exploiting the Veramo platform, hence the Ethereum Blockchain, and all the recommendations about Self Sovereign Identity systems given by the European Blockchain Partnership, and by the World Wide Web Consortium.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Corradini:2022:ETA, author = "Flavio Corradini and Alessandro Marcelletti and Andrea Morichetta and Andrea Polini and Barbara Re and Francesco Tiezzi", title = "Engineering Trustable and Auditable Choreography-based Systems Using Blockchain", journal = j-TMIS, volume = "13", number = "3", pages = "31:1--31:53", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3505225", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3505225", abstract = "A key challenge in engineering distributed systems consists in the integration into their development of a decentralised infrastructure allowing the system participants to trust each other. In this article, we face such a challenge by proposing a model-. \ldots{}", acknowledgement = ack-nhfb, articleno = "31", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{deAguiar:2022:BBP, author = "Erikson J. de Aguiar and Alyson J. dos Santos and Rodolfo I. Meneguette and Robson E. {De Grande} and J{\'o} Ueyama", title = "A blockchain-based protocol for tracking user access to shared medical imaging", journal = j-FUT-GEN-COMP-SYS, volume = "134", number = "??", pages = "348--360", month = sep, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.04.017", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri May 20 11:45:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001406", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Devi:2022:SBI, author = "Anju Devi and Geetanjali Rathee and Hemraj Saini", title = "Secure {Blockchain--Internet of Vehicles (B-IoV)} Mechanism using {DPSO} and {M-ITA} Algorithms", journal = j-J-INFO-SEC-APPL, volume = "64", number = "??", pages = "??--??", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.103094", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:41 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621002726", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103094", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Ding:2022:NSS, author = "Kaimeng Ding and Shiping Chen and Jiming Yu and Yanan Liu and Jie Zhu", title = "A New Subject-Sensitive Hashing Algorithm Based on {MultiRes-RCF} for Blockchains of {HRRS} Images", journal = j-ALGORITHMS-BASEL, volume = "15", number = "6", month = jun, year = "2022", CODEN = "ALGOCH", DOI = "https://doi.org/10.3390/a15060213", ISSN = "1999-4893 (electronic)", ISSN-L = "1999-4893", bibdate = "Fri Jun 24 09:32:54 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/algorithms.bib; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "https://www.mdpi.com/1999-4893/15/6/213", acknowledgement = ack-nhfb, articleno = "213", fjournal = "Algorithms (Basel)", journal-URL = "https://www.mdpi.com/journal/algorithms", pagecount = "??", } @Article{Duy:2022:BDD, author = "Phan The Duy and Hien Do Hoang and Do Thi Thu Hien and Anh Gia-Tuan Nguyen and Van-Hau Pham", title = "{B-DAC}: a decentralized access control framework on Northbound interface for securing {SDN} using blockchain", journal = j-J-INFO-SEC-APPL, volume = "64", number = "??", pages = "??--??", month = feb, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2021.103080", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:41 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212621002611", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103080", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Feng:2022:BBB, author = "Lei Feng and Yiqi Zhao and Shaoyong Guo and Xuesong Qiu and Wenjing Li and Peng Yu", title = "{BAFL}: A Blockchain-Based Asynchronous Federated Learning Framework", journal = j-IEEE-TRANS-COMPUT, volume = "71", number = "5", pages = "1092--1103", month = may, year = "2022", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.2021.3072033", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Fri Apr 8 07:50:20 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{Fitzgerald:2022:ECP, author = "Joshua Brian Fitzgerald", title = "Elliptic Curve Pairings", journal = j-COMPUTER, volume = "55", number = "4", pages = "74--77", month = apr, year = "2022", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2022.3146745", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Apr 14 16:26:07 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib", abstract = "Elliptic curve pairings are a powerful tool and a popular way to construct zero-knowledge proofs, which are beginning to be used in blockchains as a way to provide privacy in the transaction ledger.", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Florea:2022:RBT, author = "Alexandru-Ioan Florea and Ionut Anghel and Tudor Cioara", title = "A Review of Blockchain Technology Applications in Ambient Assisted Living", journal = j-FUTURE-INTERNET, volume = "14", number = "5", pages = "150", day = "12", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14050150", ISSN = "1999-5903", bibdate = "Fri May 27 12:03:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/5/150", abstract = "The adoption of remote assisted care was accelerated by the COVID-19 pandemic. This type of system acquires data from various sensors, runs analytics to understand people's activities, behavior, and living problems, and disseminates information with healthcare stakeholders to support timely follow-up and intervention. Blockchain technology may offer good technical solutions for tackling Internet of Things monitoring, data management, interventions, and privacy concerns in ambient assisted living applications. Even though the integration of blockchain technology with assisted care is still at the beginning, it has the potential to change the health and care processes through a secure transfer of patient data, better integration of care services, or by increasing coordination and awareness across the continuum of care. The motivation of this paper is to systematically review and organize these elements according to the main problems addressed. To the best of our knowledge, there are no studies conducted that address the solutions for integrating blockchain technology with ambient assisted living systems. To conduct the review, we have followed the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology with clear criteria for including and excluding papers, allowing the reader to effortlessly gain insights into the current state-of-the-art research in the field. The results highlight the advantages and open issues that would require increased attention from the research community in the coming years. As for directions for further research, we have identified data sharing and integration of care paths with blockchain, storage, and transactional costs, personalization of data disclosure paths, interoperability with legacy care systems, legal issues, and digital rights management.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Garcia:2022:ESC, author = "Rodrigo D. Garcia and Gowri Ramachandran and J{\'o} Ueyama", title = "Exploiting smart contracts in {PBFT}-based blockchains: a case study in medical prescription system", journal = j-COMP-NET-AMSTERDAM, volume = "211", number = "??", pages = "??--??", day = "5", month = jul, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.109003", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Fri May 20 09:18:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128622001669", acknowledgement = ack-nhfb, articleno = "109003", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Ge:2022:HBD, author = "Zerui Ge and Dumitrel Loghin and Beng Chin Ooi and Pingcheng Ruan and Tianwen Wang", title = "Hybrid blockchain database systems: design and performance", journal = j-PROC-VLDB-ENDOWMENT, volume = "15", number = "5", pages = "1092--1104", month = jan, year = "2022", CODEN = "????", DOI = "https://doi.org/10.14778/3510397.3510406", ISSN = "2150-8097", bibdate = "Wed May 25 08:14:25 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/vldbe.bib", URL = "https://dl.acm.org/doi/10.14778/3510397.3510406", abstract = "With the emergence of hybrid blockchain database systems, we aim to provide an in-depth analysis of the performance and trade-offs among a few representative systems. To achieve this goal, we implement Veritas and BlockchainDB from scratch. For Veritas, \ldots{}", acknowledgement = ack-nhfb, fjournal = "Proceedings of the VLDB Endowment", journal-URL = "https://dl.acm.org/loi/pvldb", } @Article{Ghorbel:2022:APP, author = "Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel", title = "Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain", journal = j-INT-J-INFO-SEC, volume = "21", number = "3", pages = "489--508", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-021-00565-4", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Sat May 28 06:50:21 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "https://link.springer.com/article/10.1007/s10207-021-00565-4", acknowledgement = ack-nhfb, ajournal = "Int. J. Info. Sci.", fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Ghosh:2022:BED, author = "Timam Ghosh and Arijit Roy and Sudip Misra", title = "{B2H}: Enabling delay-tolerant blockchain network in healthcare for {Society 5.0}", journal = j-COMP-NET-AMSTERDAM, volume = "210", number = "??", pages = "??--??", day = "19", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.108860", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Mon May 16 10:10:54 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128622000706", acknowledgement = ack-nhfb, articleno = "108860", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{Grech:2022:EAD, author = "Neville Grech and Sifis Lagouvardos and Ilias Tsatiris and Yannis Smaragdakis", title = "{Elipmoc}: advanced decompilation of {Ethereum} smart contracts", journal = j-PACMPL, volume = "6", number = "OOPSLA1", pages = "77:1--77:27", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3527321", ISSN = "2475-1421 (electronic)", ISSN-L = "2475-1421", bibdate = "Thu May 26 06:32:46 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", URL = "https://dl.acm.org/doi/10.1145/3527321", abstract = "Smart contracts on the Ethereum blockchain greatly benefit from cutting-edge analysis techniques and pose significant challenges. A primary challenge is the extremely low-level representation of deployed contracts. We present Elipmoc, a decompiler for \ldots{}", acknowledgement = ack-nhfb, articleno = "77", fjournal = "Proceedings of the ACM on Programming Languages (PACMPL)", journal-URL = "https://dl.acm.org/loi/pacmpl", } @Article{Gupta:2022:TTD, author = "Pooja Gupta and Volkan Dedeoglu and Salil S. Kanhere and Raja Jurdak", title = "{TrailChain}: Traceability of data ownership across blockchain-enabled multiple marketplaces", journal = j-J-NETW-COMPUT-APPL, volume = "203", number = "??", pages = "??--??", month = jul, year = "2022", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2022.103389", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Fri May 20 09:24:22 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804522000509", acknowledgement = ack-nhfb, articleno = "103389", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Hasan:2022:BBS, author = "Khalid Hasan and Mohammad Jabed Morshed Chowdhury and Kamanashis Biswas and Khandakar Ahmed and Md. Saiful Islam and Muhammad Usman", title = "A blockchain-based secure data-sharing framework for {Software Defined Wireless Body Area Networks}", journal = j-COMP-NET-AMSTERDAM, volume = "211", number = "??", pages = "??--??", day = "5", month = jul, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.comnet.2022.109004", ISSN = "1389-1286 (print), 1872-7069 (electronic)", ISSN-L = "1389-1286", bibdate = "Fri May 20 09:18:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1389128622001670", acknowledgement = ack-nhfb, articleno = "109004", fjournal = "Computer Networks (Amsterdam, Netherlands: 1999)", journal-URL = "http://www.sciencedirect.com/science/journal/13891286/", } @Article{He:2022:TTN, author = "Xin He and Haochen Yang and Guanghui Wang and Junyang Yu", title = "Towards trusted node selection using blockchain for crowdsourced abnormal data detection", journal = j-FUT-GEN-COMP-SYS, volume = "133", number = "??", pages = "320--330", month = aug, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.03.026", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Mon Apr 25 15:59:34 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001017", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{How:2022:BES, author = "Haw-Bin How and Swee-Huay Heng", title = "Blockchain-enabled searchable encryption in clouds: a review", journal = j-J-INFO-SEC-APPL, volume = "67", number = "??", pages = "??--??", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103183", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Thu Jun 9 10:41:37 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000655", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103183", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Hu:2022:IET, author = "Xiaoyan Hu and Cheng Zhu and Zhongqi Tong and Wenjie Gao and Guang Cheng and Ruidong Li and Hua Wu and Jian Gong", title = "Identifying {Ethereum} traffic based on an active node library and {DEVp2p} features", journal = j-FUT-GEN-COMP-SYS, volume = "132", number = "??", pages = "162--177", month = jul, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.02.012", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 29 14:04:51 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000565", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Jayabalan:2022:SBM, author = "Jayapriya Jayabalan and N. Jeyanthi", title = "Scalable blockchain model using off-chain {IPFS} storage for healthcare data security and privacy", journal = j-J-PAR-DIST-COMP, volume = "164", number = "??", pages = "152--167", month = jun, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.03.009", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Thu Mar 31 09:43:36 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522000648", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Jerbi:2022:BBS, author = "Wassim Jerbi and Omar Cheikhrouhou and Abderrahmen Guermazi and Mohamed Baz and Hafedh Trabelsi", title = "{BSI}: Blockchain to secure routing protocol in {Internet of Things}", journal = j-CCPE, volume = "34", number = "10", pages = "e6794:1--e6794:??", day = "1", month = may, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6794", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Apr 13 09:55:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe2020.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "20 December 2021", } @Article{Kadadha:2022:CBP, author = "Maha Kadadha and Hadi Otrok and Rabeb Mizouni and Shakti Singh and Anis Ouali", title = "On-chain behavior prediction Machine Learning model for blockchain-based crowdsourcing", journal = j-FUT-GEN-COMP-SYS, volume = "136", number = "??", pages = "170--181", month = nov, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.05.025", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jul 29 07:01:17 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001960", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Kakkar:2022:BBS, author = "Riya Kakkar and Rajesh Gupta and Smita Agrawal and Sudeep Tanwar and Ravi Sharma", title = "Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying {5G}", journal = j-J-INFO-SEC-APPL, volume = "67", number = "??", pages = "??--??", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103179", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Thu Jun 9 10:41:37 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000618", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103179", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Kapassa:2022:BTA, author = "Evgenia Kapassa and Marinos Themistocleous", title = "Blockchain Technology Applied in {IoV} Demand Response Management: a Systematic Literature Review", journal = j-FUTURE-INTERNET, volume = "14", number = "5", pages = "136", day = "29", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14050136", ISSN = "1999-5903", bibdate = "Fri May 27 12:03:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/5/136", abstract = "Energy management in the Internet of Vehicles (IoV) is becoming more prevalent as the usage of distributed Electric Vehicles (EV) grows. As a result, Demand Response (DR) management has been introduced to achieve efficient energy management in IoV. Through DR management, EV drivers are allowed to adjust their energy consumption and generation based on a variety of parameters, such as cost, driving patterns and driving routes. Nonetheless, research in IoV DR management is still in its early stages, and the implementation of DR schemes faces a number of significant hurdles. Blockchain is used to solve some of them (e.g., incentivization, privacy and security issues, lack of interoperability and high mobility). For instance, blockchain enables the introduction of safe, reliable and decentralized Peer-to-Peer (P2P) energy trading. The combination of blockchain and IoV is a new promising approach to further improve/overcome the aforementioned limitations. However, there is limited literature in Demand Response Management (DRM) schemes designed for IoV. Therefore, there is a need for a systematic literature review (SLR) to collect and critically analyze the existing relevant literature, in an attempt to highlight open issues. Thus, in this article, we conduct a SLR, investigating how blockchain technology assists the area of DRM in IoV. We contribute to the body of knowledge by offering a set of observations and research challenges on blockchain-based DRM in IoV. In doing so, we allow other researchers to focus their work on them, and further contribute to this area.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Kshetri:2022:SBG, author = "Nir Kshetri", title = "{El Salvador}'s Bitcoin Gamble", journal = j-COMPUTER, volume = "55", number = "6", pages = "85--89", month = jun, year = "2022", CODEN = "CPTRB4", DOI = "https://doi.org/10.1109/MC.2022.3164265", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Thu Jun 9 09:57:23 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computer2020.bib", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", } @Article{Kumar:2022:DID, author = "Randhir Kumar and Prabhat Kumar and Rakesh Tripathi and Govind P. Gupta and Sahil Garg and Mohammad Mehedi Hassan", title = "A distributed intrusion detection system to detect {DDoS} attacks in blockchain-enabled {IoT} network", journal = j-J-PAR-DIST-COMP, volume = "164", number = "??", pages = "55--68", month = jun, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.01.030", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Thu Mar 31 09:43:36 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522000351", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Lavi:2022:RBF, author = "Ron Lavi and Or Sattath and Aviv Zohar", title = "Redesigning {Bitcoin}'s Fee Market", journal = j-TEAC, volume = "10", number = "1", pages = "5:1--5:31", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3530799", ISSN = "2167-8375 (print), 2167-8383 (electronic)", ISSN-L = "2167-8375", bibdate = "Tue May 24 07:06:27 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/teac.bib", URL = "https://dl.acm.org/doi/10.1145/3530799; https://dblp.org/db/journals/teco/teco10.html#LaviSZ22", abstract = "The Bitcoin payment system involves two agent types: users that transact with the currency and pay fees and miners in charge of authorizing transactions and securing the system in return for these fees. Two of Bitcoin's challenges are (i) securing \ldots{}", acknowledgement = ack-nhfb, articleno = "5", dblp-key = "journals/teco/LaviSZ22", dblp-mdate = "2022-06-13", fjournal = "ACM Transactions on Economics and Computation", journal-URL = "https://dl.acm.org/loi/teac", } @Article{Lee:2022:MBD, author = "Jung-San Lee and Chit-Jie Chew and Jo-Yun Liu and Ying-Chin Chen and Kuo-Yu Tsai", title = "Medical blockchain: Data sharing and privacy preserving of {EHR} based on smart contract", journal = j-J-INFO-SEC-APPL, volume = "65", number = "??", pages = "??--??", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103117", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:42 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000102", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103117", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Li:2022:SBS, author = "Chunlin Li and Jing Zhang and Xianmin Yang", title = "Scalable blockchain storage mechanism based on two-layer structure and improved distributed consensus", journal = j-J-SUPERCOMPUTING, volume = "78", number = "4", pages = "4850--4881", month = mar, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04061-3", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:48 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04061-3", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Li:2022:SLM, author = "Xuejun Li and Lina Gong and Xiao Liu and Frank Jiang and Wenyu Shi and Lingmin Fan and Han Gao and Rui Li and Jia Xu", title = "Solving the last mile problem in logistics: a mobile edge computing and blockchain-based unmanned aerial vehicle delivery system", journal = j-CCPE, volume = "34", number = "7", pages = "e6068:1--e6068:??", day = "25", month = mar, year = "2022", CODEN = "CCPEBO", DOI = "https://doi.org/10.1002/cpe.6068", ISSN = "1532-0626 (print), 1532-0634 (electronic)", ISSN-L = "1532-0626", bibdate = "Wed Apr 13 09:55:00 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ccpe2020.bib", acknowledgement = ack-nhfb, ajournal = "Concurr. Comput.", fjournal = "Concurrency and Computation: Practice and Experience", journal-URL = "http://www.interscience.wiley.com/jpages/1532-0626", onlinedate = "05 November 2020", } @Article{Liao:2022:BBI, author = "Chia-Hung Liao and Xue-Qin Guan and Jen-Hao Cheng and Shyan-Ming Yuan", title = "Blockchain-based identity management and access control framework for open banking ecosystem", journal = j-FUT-GEN-COMP-SYS, volume = "135", number = "??", pages = "450--466", month = oct, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.05.015", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 10 07:12:09 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001868", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Liu:2022:BBS, author = "Gao Liu and Huidong Dong and Zheng Yan and Xiaokang Zhou and Shohei Shimizu", title = "{B4SDC}: a Blockchain System for Security Data Collection in {MANETs}", journal = j-IEEE-TRANS-BIG-DATA, volume = "8", number = "3", pages = "739--752", month = jun, year = "2022", DOI = "https://doi.org/10.1109/TBDATA.2020.2981438", ISSN = "2332-7790", bibdate = "Tue Jul 26 16:02:13 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Big Data", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317", } @Article{Liu:2022:EAS, author = "Tonglai Liu and Jigang Wu and Jiaxing Li and Jingyi Li and Zikai Zhang", title = "Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network", journal = j-COMP-J, volume = "65", number = "6", pages = "1512--1526", month = jun, year = "2022", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/bxaa196", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Fri Jun 24 10:59:06 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compj2020.bib", URL = "http://academic.oup.com/comjnl/article/65/6/1512/6146586", acknowledgement = ack-nhfb, fjournal = "Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Article{Liu:2022:IBC, author = "Jian Liu and Kui Ren", title = "Improving Blockchains With Client-Assistance", journal = j-IEEE-TRANS-COMPUT, volume = "71", number = "5", pages = "1230--1236", month = may, year = "2022", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.2021.3072129", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Fri Apr 8 07:50:20 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2020.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{Masuduzzaman:2022:UBM, author = "Md Masuduzzaman and Anik Islam and Kazi Sadia and Soo Young Shin", title = "{UAV}-based {MEC}-assisted automated traffic management scheme using blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "134", number = "??", pages = "256--270", month = sep, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.04.018", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri May 20 11:45:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001418", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Melo:2022:MBA, author = "Carlos Melo and Jean Araujo and Paulo Maciel", title = "A model-based approach for planning blockchain service provisioning", journal = j-COMPUTING, volume = "104", number = "2", pages = "315--337", month = feb, year = "2022", CODEN = "CMPTA2", DOI = "https://doi.org/10.1007/s00607-021-00956-4", ISSN = "0010-485X (print), 1436-5057 (electronic)", ISSN-L = "0010-485X", bibdate = "Mon May 9 09:55:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computing.bib", URL = "https://link.springer.com/article/10.1007/s00607-021-00956-4", acknowledgement = ack-nhfb, ajournal = "Computing", fjournal = "Computing", journal-URL = "http://link.springer.com/journal/607", } @Article{Melo:2022:PAE, author = "Carlos Melo and Felipe Oliveira and Paulo Maciel", title = "Performance and availability evaluation of the blockchain platform hyperledger fabric", journal = j-J-SUPERCOMPUTING, volume = "78", number = "10", pages = "12505--12527", month = jul, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-022-04361-2", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Fri Jun 10 07:18:59 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-022-04361-2", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Naresh:2022:PSB, author = "Vankamamidi S. Naresh and V. V. L. Divakar Allavarpu and Sivaranjani Reddi", title = "Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large {WSN}", journal = j-J-SUPERCOMPUTING, volume = "78", number = "6", pages = "8708--8732", month = apr, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04175-8", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:49 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04175-8", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Pal:2022:BIA, author = "Shantanu Pal and Ali Dorri and Raja Jurdak", title = "Blockchain for {IoT} access control: Recent trends and future research directions", journal = j-J-NETW-COMPUT-APPL, volume = "203", number = "??", pages = "??--??", month = jul, year = "2022", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2022.103371", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Fri May 20 09:24:22 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1084804522000352", acknowledgement = ack-nhfb, articleno = "103371", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Palit:2022:ABB, author = "Sudip Kumar Palit and Mohuya Chakraborty and Subhalaxmi Chakraborty", title = "{AUGChain}: blockchain-based mobile user authentication scheme in global mobility network", journal = j-J-SUPERCOMPUTING, volume = "78", number = "5", pages = "6788--6816", month = apr, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04139-y", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:48 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04139-y", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Pinto:2022:BDC, author = "Flavio Pinto and Yogachandran Rahulamathavan and James Skinner", title = "Blockchain for Doping Control Applications in Sports: A Conceptual Approach", journal = j-FUTURE-INTERNET, volume = "14", number = "7", pages = "210", day = "14", month = jul, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14070210", ISSN = "1999-5903", bibdate = "Tue Jul 26 06:44:01 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/7/210", abstract = "Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizations and sports authorities are expected to cooperate in the fight against doping. To achieve this mission, doping-related data must be produced, stored, accessed, and shared in a secure, tamperproof, and privacy-preserving manner. This paper investigates the processes and tools established by the World Anti-Doping Agency for the global harmonization of doping control activities. From this investigation, it is possible to conclude that there is an inherent trust problem, in part due to a centralized data management paradigm and to the lack of fully digitalized processes. Therefore, this paper presents two main contributions: the concept of a multiorganizational decentralized data governance model and a blockchain-based design for one of the most sensitive data-sharing processes within the anti-doping ecosystem. Throughout this article, it is shown that the adoption of a permissioned blockchain can benefit the whole anti-doping community, creating more reliable processes for handling data, where privacy and security are enhanced.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Rakshit:2022:IBT, author = "Sandip Rakshit and Nazrul Islam and Sandeep Mondal and Tripti Paul", title = "Influence of blockchain technology in {SME} internationalization: Evidence from high-tech {SMEs} in {India}", journal = j-TECHNOVATION, volume = "115", number = "??", pages = "??--??", month = jul, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.technovation.2022.102518", ISSN = "0166-4972 (print), 1879-2383 (electronic)", ISSN-L = "0166-4972", bibdate = "Sat Jun 11 08:13:45 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/technovation.bib", URL = "https://www.sciencedirect.com/science/article/pii/S0166497222000657", acknowledgement = ack-nhfb, articleno = "102518", fjournal = "Technovation", journal-URL = "http://www.sciencedirect.com/science/journal/01664972/39", } @Article{Rana:2022:FAR, author = "Ranvir Rana and Sreeram Kannan and David Tse and Pramod Viswanath", title = "{Free2Shard}: Adversary-resistant Distributed Resource Allocation for Blockchains", journal = j-POMACS, volume = "6", number = "1", pages = "11:1--11:38", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3508031", ISSN = "2476-1249", ISSN-L = "2476-1249", bibdate = "Thu May 26 07:07:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/pomacs.bib", URL = "https://dl.acm.org/doi/10.1145/3508031", abstract = "In this paper, we study a canonical distributed resource allocation problem arising in blockchains. While distributed resource allocation is a well-studied problem in networking, the blockchain setting additionally requires the solution to be resilient \ldots{}", acknowledgement = ack-nhfb, articleno = "11", fjournal = "Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)", journal-URL = "https://dl.acm.org/loi/pomacs", } @Article{Saad:2022:EPA, author = "Muhammad Saad and Victor Cook and Lan Nguyen and My T. Thai and David Mohaisen", title = "Exploring Partitioning Attacks on the Bitcoin Network", journal = j-IEEE-TRANS-NETWORKING, volume = "30", number = "1", pages = "202--214", month = feb, year = "2022", CODEN = "IEANEP", DOI = "https://doi.org/10.1109/TNET.2021.3105604", ISSN = "1063-6692 (print), 1558-2566 (electronic)", ISSN-L = "1063-6692", bibdate = "Fri Apr 15 05:49:29 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib", URL = "https://dl.acm.org/doi/10.1109/TNET.2021.3105604", abstract = "Bitcoin is the leading example of a blockchain application that facilitates peer-to-peer transactions without the need for a trusted third party. This paper considers possible attacks related to the decentralized network architecture of Bitcoin. We \ldots{}", acknowledgement = ack-nhfb, fjournal = "IEEE\slash ACM Transactions on Networking", journal-URL = "https://dl.acm.org/loi/ton", } @Article{Saraswat:2022:UBB, author = "Deepti Saraswat and Farnazbanu Patel and Pronaya Bhattacharya and Ashwin Verma and Sudeep Tanwar and Ravi Sharma", title = "{\em {UpHaaR}}: Blockchain-based charity donation scheme to handle financial irregularities", journal = j-J-INFO-SEC-APPL, volume = "68", number = "??", pages = "??--??", month = aug, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103245", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Mon Jul 18 16:19:34 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622001144", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103245", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Sezer:2022:TTP, author = "Bora Bu{\u{g}}ra Sezer and Sel{\c{c}}uk Topal and Urfat Nuriyev", title = "{TPPSUPPLY}: a traceable and privacy-preserving blockchain system architecture for the supply chain", journal = j-J-INFO-SEC-APPL, volume = "66", number = "??", pages = "??--??", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103116", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000096", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103116", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Sharma:2022:BBC, author = "Pratima Sharma and Rajni Jindal and Malaya Dutta Borah", title = "Blockchain-based cloud storage system with {CP-ABE}-based access control and revocation process", journal = j-J-SUPERCOMPUTING, volume = "78", number = "6", pages = "7700--7728", month = apr, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04179-4", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:49 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04179-4", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Shi:2022:BGE, author = "Zeshun Shi and Huan Zhou and Cees de Laat and Zhiming Zhao", title = "A {Bayesian} game-enhanced auction model for federated cloud services using blockchain", journal = j-FUT-GEN-COMP-SYS, volume = "136", number = "??", pages = "49--66", month = nov, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.05.017", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jul 29 07:01:17 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001881", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Singh:2022:IAM, author = "Jaya Singh and Ayush Sinha and Om Prakash Vyas", title = "Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology", journal = j-INT-J-INFO-SEC, volume = "21", number = "3", pages = "527--546", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s10207-021-00561-8", ISSN = "1615-5262 (print), 1615-5270 (electronic)", ISSN-L = "1615-5262", bibdate = "Sat May 28 06:50:21 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib", URL = "https://link.springer.com/article/10.1007/s10207-021-00561-8", acknowledgement = ack-nhfb, ajournal = "Int. J. Info. Sci.", fjournal = "International Journal of Information Security", journal-URL = "https://link.springer.com/journal/10207", } @Article{Su:2022:BRB, author = "Jian Su and Leyou Zhang and Yi Mu", title = "\pkg{BA-RMKABSE}: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System", journal = j-FUT-GEN-COMP-SYS, volume = "132", number = "??", pages = "299--309", month = jul, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.01.021", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 29 14:04:51 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000292", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Tan:2022:SRT, author = "Bryan Tan and Benjamin Mariano and Shuvendu K. Lahiri and Isil Dillig and Yu Feng", title = "{SolType}: refinement types for arithmetic overflow in {Solidity}", journal = j-PACMPL, volume = "6", number = "POPL", pages = "4:1--4:29", month = jan, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3498665", ISSN = "2475-1421 (electronic)", ISSN-L = "2475-1421", bibdate = "Thu May 26 06:32:48 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/pacmpl.bib", URL = "https://dl.acm.org/doi/10.1145/3498665", abstract = "As smart contracts gain adoption in financial transactions, it becomes increasingly important to ensure that they are free of bugs and security vulnerabilities. Of particular relevance in this context are arithmetic overflow bugs, as integers are often used to represent financial assets like account balances. Motivated by this observation, this paper presents SolType, a refinement type system for Solidity that can be used to prevent arithmetic over- and under-flows in smart contracts. SolType allows developers to add refinement type annotations and uses them to prove that arithmetic operations do not lead to over- and under-flows. SolType incorporates a rich vocabulary of refinement terms that allow expressing relationships between integer values and aggregate properties of complex data structures. Furthermore, our implementation, called Solid, incorporates a type inference engine and can automatically infer useful type annotations, including non-trivial contract invariants.\par To evaluate the usefulness of our type system, we use Solid to prove arithmetic safety of a total of 120 smart contracts. When used in its fully automated mode (i.e., using Solid's type inference capabilities), Solid is able to eliminate 86.3\% of redundant runtime checks used to guard against overflows. We also compare Solid against a state-of-the-art arithmetic safety verifier called VeriSmart and show that Solid has a significantly lower false positive rate, while being significantly faster in terms of verification time.", acknowledgement = ack-nhfb, articleno = "4", fjournal = "Proceedings of the ACM on Programming Languages (PACMPL)", journal-URL = "https://dl.acm.org/loi/pacmpl", } @Article{Tong:2022:BDD, author = "Wei Tong and Xuewen Dong and Yulong Shen and Xiaohong Jiang and Zhiwei Zhang", title = "A blockchain-driven data exchange model in multi-domain {IoT} with controllability and parallelity", journal = j-FUT-GEN-COMP-SYS, volume = "135", number = "??", pages = "85--94", month = oct, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.04.026", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Fri Jun 10 07:12:09 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22001558", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Wang:2022:BBM, author = "JunLu Wang and Qiang Liu and Baoyan Song", title = "Blockchain-based multi-malicious double-spending attack blacklist management model", journal = j-J-SUPERCOMPUTING, volume = "78", number = "12", pages = "14726--14755", month = aug, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-022-04370-1", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Tue Jul 19 08:40:45 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper.bib", URL = "https://link.springer.com/article/10.1007/s11227-022-04370-1", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Wang:2022:DBB, author = "Shangping Wang and Huan Li and Juanjuan Chen and Jifang Wang and Yingjuan Deng", title = "{DAG} blockchain-based lightweight authentication and authorization scheme for {IoT} devices", journal = j-J-INFO-SEC-APPL, volume = "66", number = "??", pages = "??--??", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103134", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000242", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103134", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Wang:2022:LCG, author = "Zhihao Wang and Ru Huo and Shuo Wang", title = "A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid", journal = j-FUTURE-INTERNET, volume = "14", number = "4", pages = "119--??", day = "14", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14040119", ISSN = "1999-5903", bibdate = "Fri Apr 22 09:50:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/4/119", abstract = "In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and efficient and has a low computational cost. Although a large number of scholars have conducted relevant research, most of these schemes cannot balance the computational overhead and security. Therefore, we propose a lightweight and secure key management method, having a low computational overhead, based on blockchain for smart grids. Firstly, we redesigned the architecture of the smart grid based on blockchain and completed the division of various entities. Furthermore, we designed a pairing-free certification authenticated group key agreement method based on blockchain under the architecture. Finally, we achieved higher security attributes, and lower authentication delay and computational overhead, compared to the traditional schemes, as shown in performance analysis and comparison.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Wang:2022:LSE, author = "Kai Wang and Jun Pang and Dingjie Chen and Yu Zhao and Dapeng Huang and Chen Chen and Weili Han", title = "A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin", journal = j-TWEB, volume = "16", number = "2", pages = "7:1--7:29", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3494557", ISSN = "1559-1131 (print), 1559-114X (electronic)", ISSN-L = "1559-1131", bibdate = "Sat May 21 12:32:34 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tweb.bib", URL = "https://dl.acm.org/doi/10.1145/3494557", abstract = "Exploiting the anonymous mechanism of Bitcoin, ransomware activities demanding ransom in bitcoins have become rampant in recent years. Several existing studies quantify the impact of ransomware activities, mostly focusing on the amount of ransom. However, victims' reactions in Bitcoin that can well reflect the impact of ransomware activities are somehow largely neglected. Besides, existing studies track ransom transfers at the Bitcoin address level, making it difficult for them to uncover the patterns of ransom transfers from a macro perspective beyond Bitcoin addresses.\par In this article, we conduct a large-scale analysis of ransom payments, ransom transfers, and victim migrations in Bitcoin from 2012 to 2021. First, we develop a fine-grained address clustering method to cluster Bitcoin addresses into users, which enables us to identify more addresses controlled by ransomware criminals. Second, motivated by the fact that Bitcoin activities and their participants already formed stable industries, such as Darknet and Miner, we train a multi-label classification model to identify the industry identifiers of users. Third, we identify ransom payment transactions and then quantify the amount of ransom and the number of victims in 63 ransomware activities. Finally, after we analyze the trajectories of ransom transferred across different industries and track victims' migrations across industries, we find out that to obscure the purposes of their transfer trajectories, most ransomware criminals (e.g., operators of Locky and Wannacry) prefer to spread ransom into multiple industries instead of utilizing the services of Bitcoin mixers. Compared with other industries, Investment is highly resilient to ransomware activities in the sense that the number of users in Investment remains relatively stable. Moreover, we also observe that a few victims become active in the Darknet after paying ransom. Our findings in this work can help authorities deeply understand ransomware activities in Bitcoin. While our study focuses on ransomware, our methods are potentially applicable to other cybercriminal activities that have similarly adopted bitcoins as their payments.", acknowledgement = ack-nhfb, articleno = "7", fjournal = "ACM Transactions on the Web (TWEB)", journal-URL = "https://dl.acm.org/loi/tweb", } @Article{Watorek:2022:MCC, author = "Marcin Watorek and Jaros{\l}aw Kwapie{\'n} and Stanis{\l}aw Drozdz", title = "Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-{COVID-19} Time", journal = j-FUTURE-INTERNET, volume = "14", number = "7", pages = "215", day = "21", month = jul, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14070215", ISSN = "1999-5903", bibdate = "Tue Jul 26 06:44:01 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/7/215", abstract = "Unlike price fluctuations, the temporal structure of cryptocurrency trading has seldom been a subject of systematic study. In order to fill this gap, we analyse detrended correlations of the price returns, the average number of trades in time unit, and the traded volume based on high-frequency data representing two major cryptocurrencies: bitcoin and ether. We apply the multifractal detrended cross-correlation analysis, which is considered the most reliable method for identifying nonlinear correlations in time series. We find that all the quantities considered in our study show an unambiguous multifractal structure from both the univariate (auto-correlation) and bivariate (cross-correlation) perspectives. We looked at the bitcoin-ether cross-correlations in simultaneously recorded signals, as well as in time-lagged signals, in which a time series for one of the cryptocurrencies is shifted with respect to the other. Such a shift suppresses the cross-correlations partially for short time scales, but does not remove them completely. We did not observe any qualitative asymmetry in the results for the two choices of a leading asset. The cross-correlations for the simultaneous and lagged time series became the same in magnitude for the sufficiently long scales.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Wei:2022:SBD, author = "Qian Wei and Bingzhe Li and Wanli Chang and Zhiping Jia and Zhaoyan Shen and Zili Shao", title = "A Survey of Blockchain Data Management Systems", journal = j-TECS, volume = "21", number = "3", pages = "25:1--25:28", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3502741", ISSN = "1539-9087 (print), 1558-3465 (electronic)", ISSN-L = "1539-9087", bibdate = "Wed Jul 20 06:57:46 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tecs.bib", URL = "https://dl.acm.org/doi/10.1145/3502741", abstract = "Blockchain has been widely deployed in various fields, such as finance, education, and public services. Blockchain has decentralized mechanisms with persistency and auditability and runs as an immutable distributed ledger, where transactions are jointly \ldots{}", acknowledgement = ack-nhfb, articleno = "25", fjournal = "ACM Transactions on Embedded Computing Systems", journal-URL = "https://dl.acm.org/loi/tecs", } @Article{Wu:2022:TTI, author = "Siwei Wu and Lei Wu and Yajin Zhou and Runhuai Li and Zhi Wang and Xiapu Luo and Cong Wang and Kui Ren", title = "Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on {Ethereum}", journal = j-TOSEM, volume = "31", number = "3", pages = "54:1--54:33", month = jul, year = "2022", CODEN = "ATSMER", DOI = "https://doi.org/10.1145/3505263", ISSN = "1049-331X (print), 1557-7392 (electronic)", ISSN-L = "1049-331X", bibdate = "Tue May 24 07:09:22 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tosem.bib", URL = "https://dl.acm.org/doi/10.1145/3505263", abstract = "Ethereum has been attracting lots of attacks, hence there is a pressing need to perform timely investigation and detect more attack instances. However, existing systems suffer from the scalability issue due to the following reasons. First, the tight \ldots{}", acknowledgement = ack-nhfb, articleno = "54", fjournal = "ACM Transactions on Software Engineering and Methodology", journal-URL = "https://dl.acm.org/loi/tosem", } @Article{Xu:2022:SPS, author = "Guangquan Xu and Hongpeng Bai and Jun Xing and Tao Luo and Neal N. Xiong and Xiaochun Cheng and Shaoying Liu and Xi Zheng", title = "{SG-PBFT}: a secure and highly efficient distributed blockchain {PBFT} consensus algorithm for intelligent {Internet of Vehicles}", journal = j-J-PAR-DIST-COMP, volume = "164", number = "??", pages = "1--11", month = jun, year = "2022", CODEN = "JPDCER", DOI = "https://doi.org/10.1016/j.jpdc.2022.01.029", ISSN = "0743-7315 (print), 1096-0848 (electronic)", ISSN-L = "0743-7315", bibdate = "Thu Mar 31 09:43:36 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jpardistcomp2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0743731522000363", acknowledgement = ack-nhfb, fjournal = "Journal of Parallel and Distributed Computing", journal-URL = "http://www.sciencedirect.com/science/journal/07437315", } @Article{Yang:2022:BBK, author = "Xiaodong Yang and Jiaqi Wang and Wanting Xi and Tian Tian and Caifen Wang", title = "A blockchain-based keyword search scheme with dual authorization for electronic health record sharing", journal = j-J-INFO-SEC-APPL, volume = "66", number = "??", pages = "??--??", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103154", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Sun May 8 11:59:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000448", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103154", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Ye:2022:VDV, author = "Jiaming Ye and Mingliang Ma and Yun Lin and Lei Ma and Yinxing Xue and Jianjun Zhao", title = "{Vulpedia}: Detecting vulnerable {Ethereum} smart contracts via abstracted vulnerability signatures", journal = j-J-SYST-SOFTW, volume = "192", number = "??", pages = "??--??", month = oct, year = "2022", CODEN = "JSSODM", DOI = "https://doi.org/10.1016/j.jss.2022.111410", ISSN = "0164-1212 (print), 1873-1228 (electronic)", ISSN-L = "0164-1212", bibdate = "Wed Aug 3 12:30:43 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsystsoftw2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0164121222001236", acknowledgement = ack-nhfb, articleno = "111410", fjournal = "Journal of Systems and Software", journal-URL = "http://www.sciencedirect.com/science/journal/01641212", } @Article{Yuan:2022:EMR, author = "Jianwen Yuan and Qinglin Zhao and Yu-Teng Chang", title = "Edge mining resources allocation among normal and gap blockchains using game theory", journal = j-J-SUPERCOMPUTING, volume = "78", number = "7", pages = "9934--9951", month = may, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04249-7", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:50 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04249-7", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{Yuan:2022:IBP, author = "Yilin Yuan and Jianbiao Zhang and Zheng Li", title = "Identity-based public data integrity verification scheme in cloud storage system via blockchain", journal = j-J-SUPERCOMPUTING, volume = "78", number = "6", pages = "8509--8530", month = apr, year = "2022", CODEN = "JOSUED", DOI = "https://doi.org/10.1007/s11227-021-04193-6", ISSN = "0920-8542 (print), 1573-0484 (electronic)", ISSN-L = "0920-8542", bibdate = "Mon Jun 6 08:11:49 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jsuper2020.bib", URL = "https://link.springer.com/article/10.1007/s11227-021-04193-6", acknowledgement = ack-nhfb, ajournal = "J. Supercomputing", fjournal = "The Journal of Supercomputing", journal-URL = "http://link.springer.com/journal/11227", } @Article{ZareRavasan:2022:ESI, author = "Ahad ZareRavasan and Taha Mansouri and Michal Krc{\'a}l and Saeed Rouhani", title = "Editorial for the Special Issue on Blockchain: Applications, Challenges, and Solutions", journal = j-FUTURE-INTERNET, volume = "14", number = "5", pages = "155", day = "19", month = may, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14050155", ISSN = "1999-5903", bibdate = "Fri May 27 12:03:38 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/5/155", abstract = "The digital transformation is exciting the uptake of Internet-of-Things technologies, and raises the questions surrounding our knowledge of the positions of many of these things. A review of indoor localization technologies summarized in this paper shows that with conventional RF-based techniques, a significant challenge exists in terms of achieving good accuracy with a low power consumption at the device side. We present hybrid RF-acoustic approaches as an interesting alternative: the slow propagation speed of sound allows for accurate distance measurements, while RF can easily provide synchronization, data, and power to the devices. We explain how the combination of adequate signaling realizing a late wake-up of the devices with backscattering could position energy-neutral devices. Experiments in a real-life testbed confirmed the potential 10 cm-accuracy based on RF-harvested energy. Nonetheless, these also expose open challenges to be resolved in order to achieve accurate 3D positioning.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Zhai:2022:BSS, author = "Zhonghao Zhai and Subin Shen and Yanqin Mao", title = "{BPKI}: a secure and scalable blockchain-based public key infrastructure system for web services", journal = j-J-INFO-SEC-APPL, volume = "68", number = "??", pages = "??--??", month = aug, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1016/j.jisa.2022.103226", ISSN = "2214-2126", ISSN-L = "2214-2126", bibdate = "Mon Jul 18 16:19:34 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jinfosecappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S2214212622000990", acknowledgement = ack-nhfb, ajournal = "J. Info. Sec. Appl.", articleno = "103226", fjournal = "Journal of Information Security and Applications (JISA)", journal-URL = "http://www.sciencedirect.com/science/journal/22142126", } @Article{Zhang:2022:TAM, author = "Jixian Zhang and Wenlu Lou and Hao Sun and Qian Su and Weidong Li", title = "Truthful auction mechanisms for resource allocation in the {Internet of Vehicles} with public blockchain networks", journal = j-FUT-GEN-COMP-SYS, volume = "132", number = "??", pages = "11--24", month = jul, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.02.002", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 29 14:04:51 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000450", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zhang:2022:TBE, author = "Wenbo Zhang and Yayu Bai and Jingyu Feng", title = "\pkg{TIIA}: a blockchain-enabled {Threat Intelligence Integrity Audit} scheme for {IIoT}", journal = j-FUT-GEN-COMP-SYS, volume = "132", number = "??", pages = "254--265", month = jul, year = "2022", CODEN = "FGSEVI", DOI = "https://doi.org/10.1016/j.future.2022.02.023", ISSN = "0167-739X (print), 1872-7115 (electronic)", ISSN-L = "0167-739X", bibdate = "Tue Mar 29 14:04:51 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/futgencompsys2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167739X22000723", acknowledgement = ack-nhfb, fjournal = "Future Generation Computer Systems", journal-URL = "http://www.sciencedirect.com/science/journal/0167739X", } @Article{Zheng:2022:DRB, author = "Jason Zheng and Chidinma Dike and Stefan Pancari and Yi Wang and George C. Giakos and Wafa Elmannai and Bingyang Wei", title = "An In-Depth Review on Blockchain Simulators for {IoT} Environments", journal = j-FUTURE-INTERNET, volume = "14", number = "6", pages = "182", day = "10", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.3390/fi14060182", ISSN = "1999-5903", bibdate = "Fri Jun 24 09:41:47 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/future-internet.bib", URL = "https://www.mdpi.com/1999-5903/14/6/182", abstract = "Simulating blockchain technology within the IoT has never been as important. Along with this comes the need to find suitable blockchain simulators capable of simulating blockchain networks within an IoT environment. Despite there being a wide variety of blockchain simulators, not all are capable of simulating within an IoT environment and not all are suitable for every IoT environment. This article will review previously published works and present a list of suitable blockchain simulators as well as a few untested simulators that have the potential to simulate blockchain networks within an IoT environment. A total of 18 blockchain simulators are presented and discussed in this paper. In addition, a comprehensive list of the advantages and limitations of each simulator is presented to demonstrate the best situation in which simulators should be used. Finally, recommendations are made on when each simulator should be used and in what situation it should be avoided.", acknowledgement = ack-nhfb, journal-URL = "https://www.mdpi.com/journal/futureinternet", } @Article{Febrero-Bande:2023:FCB, author = "Manuel Febrero-Bande and Wenceslao Gonz{\'a}lez-Manteiga and Brenda Prallon and Yuri F. Saporito", title = "Functional classification of bitcoin addresses", journal = j-COMPUT-STAT-DATA-ANAL, volume = "181", number = "??", pages = "??--??", month = may, year = "2023", CODEN = "CSDADW", DOI = "https://doi.org/10.1016/j.csda.2022.107687", ISSN = "0167-9473 (print), 1872-7352 (electronic)", ISSN-L = "0167-9473", bibdate = "Fri Feb 10 09:56:08 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/computstatdataanal2020.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167947322002675", acknowledgement = ack-nhfb, articleno = "107687", fjournal = "Computational Statistics \& Data Analysis", journal-URL = "http://www.sciencedirect.com/science/journal/01679473", } @Article{Franceschet:2023:VDA, author = "Massimo Franceschet", title = "Viewpoint: Decentraland: The Alleged Decentralization of Blockchain Applications", journal = j-CACM, volume = "66", number = "6", pages = "45--47", month = jun, year = "2023", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3563942", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Jun 1 13:54:56 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3563942", abstract = "Breaking down the blockchain.", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Gramoli:2023:HTF, author = "Vincent Gramoli and Qiang Tang", title = "Hot Topics: The Future of Blockchain Consensus", journal = j-CACM, volume = "66", number = "7", pages = "79--80", month = jul, year = "2023", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3589225", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Jul 1 13:07:01 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", note = "East Asia and Oceania Region Special Section.", URL = "https://dl.acm.org/doi/10.1145/3589225", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Putra:2023:HTC, author = "Guntur Dharma Putra and Sidra Malik and Volkan Dedeoglu and Raja Jurda and Salil S. Kanhere", title = "Hot Topics: Challenges in Designing Blockchain for Cyber-Physical Systems", journal = j-CACM, volume = "66", number = "7", pages = "81--82", month = jul, year = "2023", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3589648", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Jul 1 13:07:01 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", note = "East Asia and Oceania Region Special Section.", URL = "https://dl.acm.org/doi/10.1145/3589648", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Qu:2023:BEF, author = "Youyang Qu and Md Palash Uddin and Chenquan Gan and Yong Xiang and Longxiang Gao and John Yearwood", title = "Blockchain-enabled Federated Learning: a Survey", journal = j-COMP-SURV, volume = "55", number = "4", pages = "70:1--70:??", month = may, year = "2023", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/3524104", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Sat Nov 26 08:32:02 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/compsurv.bib", URL = "https://dl.acm.org/doi/10.1145/3524104", abstract = "Federated learning (FL) has experienced a boom in recent years, which is jointly promoted by the prosperity of machine learning and Artificial Intelligence along with emerging privacy issues. In the FL paradigm, a central server and local end devices \ldots{}", acknowledgement = ack-nhfb, articleno = "70", fjournal = "ACM Computing Surveys", journal-URL = "https://dl.acm.org/loi/csur", } @Article{Sheh:2023:VWY, author = "Wesley Sheh and Joel Nishimura", title = "Viewpoint: Why You Should Be Able to Make Your Own Individualized, Digital Nano-Currency", journal = j-CACM, volume = "66", number = "8", pages = "35--38", month = aug, year = "2023", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3583987", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Aug 1 09:33:49 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3583987", abstract = "Increasing opportunities for access to traditional financial systems.", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Belchior:2024:RAB, author = "Rafael Belchior and Jan S{\"u}{\ss}enguth and Qi Feng and Thomas Hardjono and Andr{\'e} Vasconcelos and Miguel Correia", title = "Research and Advances: a Brief History of Blockchain Interoperability", journal = j-CACM, volume = "67", number = "10", pages = "62--69", month = oct, year = "2024", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3648607", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Oct 1 11:46:22 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3648607", abstract = "A deep dive into blockchain interoperability: why it is needed, progress that has been made over the past decade, how it is currently deployed and used, and likely paths of future development.", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Ebrahimpour:2024:BFS, author = "Ghader Ebrahimpour and Mohammad Sayad Haghighi", title = "Is Bitcoin Future as Secure as We Think? {Analysis} of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions", journal = j-TOPS, volume = "27", number = "2", pages = "14:1--14:??", month = may, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3641546", ISSN = "2471-2566 (print), 2471-2574 (electronic)", ISSN-L = "2471-2566", bibdate = "Fri Jun 14 06:53:34 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tops.bib", URL = "https://dl.acm.org/doi/10.1145/3641546", abstract = "Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker's computational power does not exceed 50\% of the network power. In this article, we design a novel bribery attack and show that this guarantee can be hugely undermined. Miners are assumed to be rational in this setup, and they are given incentives that are dynamically calculated. In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage. We will reformulate the bribery attack to propose a general mathematical foundation upon which we build multiple strategies. We show that, unlike Whale Attack, these strategies are practical, especially in the future when halvings lower the mining rewards. In the so-called ``guaranteed variable-rate bribing with commitment'' strategy, through optimization by Differential Evolution (DE), we show how double-spending is possible in the Bitcoin ecosystem for any transaction whose value is above 218.9BTC, and this comes with 100\% success rate. A slight reduction in the success probability, e.g., by 10%, brings the threshold down to 165BTC. If the rationality assumption holds, then this shows how vulnerable blockchain-based systems like Bitcoin are. We suggest a soft fork on Bitcoin to fix this issue at the end.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Priv. Secur.", articleno = "14", fjournal = "ACM Transactions on Privacy and Security (TOPS)", journal-URL = "https://dl.acm.org/loi/tops", } @Book{Huang:2024:WBNb, author = "Ken Huang and Youwei Yang and Fan Zhang and Xi Chen and Feng Zhu", title = "{Web3}: Blockchain, the New Economy, and the Self-Sovereign Internet", publisher = pub-CAMBRIDGE, address = pub-CAMBRIDGE:adr, pages = "????", year = "2024", ISBN = "1-009-37566-0 (e-book), 1-009-37567-9 (hardcover)", ISBN-13 = "978-1-009-37566-5 (e-book), 978-1-009-37567-2 (hardcover)", LCCN = "HG1710 .H836 2024", bibdate = "Thu Nov 21 09:37:32 MST 2024", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "This text for MBA students and industry professionals explores key Web3 concepts such as blockchain, DeFi, tokenomics, and smart contracts, demystifying the technology behind NFTs and DAOs and the complex regulatory landscape. It is ideal for readers seeking to stay on top of emerging trends in the digital economy.", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Technological innovations; Business enterprises; Blockchains (Databases); Business; Data processing; Transferts {\'e}lectroniques de fonds; Innovations; Entreprises; Cha{\^\i}nes de blocs; Gestion; Informatique", tableofcontents = "Web3 concepts and general introduction \\ The first principles of Web \\ Blockchains : the foundation \\ The scalability of Web \\ The smart contract ecosystem \\ The tokenomics for Web \\ DeFi and next generation of FinTech \\ NFT and its ecosystem \\ Decentralized autonomous organizations and organization formation on Web \\ Regulatory aspects of Web \\ Web3 and the future of Web", } @Article{Wang:2024:CCE, author = "Xite Wang and Senping Tian and Wei Cui", title = "{ContractCheck}: Checking {Ethereum} Smart Contracts in Fine-Grained Level", journal = j-IEEE-TRANS-SOFTW-ENG, volume = "50", number = "7", pages = "1789--1806", month = jul, year = "2024", CODEN = "IESEDJ", DOI = "https://doi.org/10.1109/TSE.2024.3400294", ISSN = "0098-5589 (print), 1939-3520 (electronic)", ISSN-L = "0098-5589", bibdate = "Sat Aug 24 08:23:19 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2020.bib", acknowledgement = ack-nhfb, ajournal = "IEEE Trans. Softw. Eng.", fjournal = "IEEE Transactions on Software Engineering", journal-URL = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32", keywords = "blockchain security; Blockchains; Codes; neural network; Neural networks; Security; Semantics; Smart contract; Smart contracts; Vectors; vulnerability detection", } @Article{Williams:2024:BZK, author = "Alex Williams", title = "{BLOG@CACM}: Zero-Knowledge Proofs and Their Role within the Blockchain", journal = j-CACM, volume = "67", number = "7", pages = "6--7", month = jul, year = "2024", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3653478", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jul 2 16:36:35 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", URL = "https://dl.acm.org/doi/10.1145/3653478", abstract = "In each issue of Communications, we publish selected posts or excerpts from the many blogs on our website. The views expressed by bloggers are their own and not necessarily held by Communications or the Association for Computing Machinery. \ldots", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } @Article{Zhang:2024:BUB, author = "Hongwei Zhang and Wei Fan and Jinsong Wang", title = "Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges", journal = j-J-NETW-COMPUT-APPL, volume = "222", number = "??", pages = "??--??", month = feb, year = "2024", CODEN = "JNCAF3", DOI = "https://doi.org/10.1016/j.jnca.2023.103795", ISSN = "1084-8045 (print), 1095-8592 (electronic)", ISSN-L = "1084-8045", bibdate = "Fri Dec 29 12:33:34 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib", URL = "http://www.sciencedirect.com/science/article/pii/S108480452300214X", acknowledgement = ack-nhfb, articleno = "103795", fjournal = "Journal of Network and Computer Applications", journal-URL = "http://www.sciencedirect.com/science/journal/10848045", } @Article{Cusumano:2026:TSM, author = "Michael A. Cusumano", title = "Technology Strategy and management: Stablecoins: Why They Are Both Useful and Problematic", journal = j-CACM, volume = "69", number = "1", pages = "23--26", month = jan, year = "2026", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/3775064", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Dec 22 09:29:26 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cacm2020.bib", abstract = "Considering both sides of the stablecoin.", acknowledgement = ack-nhfb, ajournal = "Commun. ACM", fjournal = "Communications of the ACM", journal-URL = "https://dl.acm.org/loi/cacm", } %%% ==================================================================== %%% Cross-referenced entries must come last, sorted by year, and then by %%% citation label: @Proceedings{Chaum:1983:ACP, editor = "David Chaum and Ronald L. Rivest and Alan T. Sherman", booktitle = "{Advances in Cryptology: Proceedings of CRYPTO '83 (21--24 August 1983: University of California, Santa Barbara)}", title = "{Advances in Cryptology: Proceedings of CRYPTO '83 (21--24 August 1983: University of California, Santa Barbara)}", publisher = pub-PLENUM, address = pub-PLENUM:adr, bookpages = "xii + 395", pages = "xii + 395", year = "1983", DOI = "https://doi.org/10.1007/978-1-4757-0602-4", ISBN = "0-306-41637-9, 1-4757-0604-9 (print), 1-4757-0602-2", ISBN-13 = "978-0-306-41637-8, 978-1-4757-0604-8 (print), 978-1-4757-0602-4", LCCN = "QA76.9.A25 C791 1983", bibdate = "Fri Dec 1 10:07:52 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", acknowledgement = ack-nhfb, tableofcontents = "Algorithms and Theory \\ Fast Computation of Discrete Logarithms in GF (q) \\ Some Remarks on the Herlestam--Johannesson Algorithm for Computing Logarithms over GF(2p) \\ A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem \\ Infinite Structures in Information Theory \\ A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography \\ Comparison of Two Pseudo-Random Number Generators \\ On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys \\ Modes of Operation \\ Some Regular Properties of the `Data Encryption Standard' Algorithm \\ The Average Cycle Size of the Key Stream in Output Feedback Encipherment \\ Analysis of Certain Aspects of Output Feedback Mode \\ Drainage and the DES Summary \\ Security of a Keystream Cipher with Secret Initial Value \\ Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes \\ Randomized Encryption Techniques \\ Protocols and Transaction Security \\ On the Security of Multi-Party Protocols in Distributed Systems \\ On the Security of Ping-Pong Protocols \\ The Use of Public-Key Cryptography for Signing Checks \\ Blind Signatures for Untraceable Payments \\ A Randomized Protocol for Signing Contracts \\ On Signatures and Authentication \\ Applications \\ Cryptographic Protection of Personal Data Cards \\ Non-Public Key Distribution \\ Cryptographic Solution to a Multilevel Security Problem \\ Local Network Cryptosystem Architecture: Access Control \\ Implementing an Electronic Notary Public \\ Quantum Cryptography, or Unforgeable Subway Tokens \\ Special Session on Cryptanalysis \\ A Polynomial Time Algorithm for Breaking the Basic Merkle--Hellman Cryptosystem \\ A Preliminary Report on the Cryptanalysis of Merkle--Hellman Knapsack Cryptosystems \\ On Breaking the Iterated Merkle--Hellman Public-Key Cryptosystem \\ Rump Session: Impromptu Talks by Conference Attendees \\ Long Key Variants of DES \\ On the Security of Multi-Party Ping-Pong Protocols \\ Inferring a Sequence Generated by a Linear Congruence \\ Key Reconstruction \\ Nondeterministic Cryptography \\ A Short Report on the RSA Chip", } @Proceedings{Juels:2004:FCI, editor = "Ari Juels", booktitle = "{Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9--12, 2004: revised papers}", title = "{Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9--12, 2004: revised papers}", volume = "3110", publisher = pub-SV, address = pub-SV:adr, pages = "2--8", year = "2004", DOI = "https://doi.org/10.1007/978-3-540-27809-2", ISBN = "3-540-27809-5, 3-540-27809-5 (e-book)", ISBN-13 = "978-3-540-27809-2, 978-3-540-27809-2 (e-book)", LCCN = "HG1710 .F35 2004", bibdate = "Sun Jan 21 08:11:23 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/10.1007/b98935", abstract = "This book constitutes the thoroughly refereed post-proceedings of the 8th International Conference on Financial Cryptography, FC 2004, held in Key West, FL, USA, in February 2004. The 17 revised full papers presented together with abstracts of 4 invited talks and 4 panel statements were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on loyalty and micropayment systems, user authentication, e-voting, auctions and lotteries, game theoretic and cryptographic tools, and mix networks and anonymous communications.", acknowledgement = ack-nhfb, tableofcontents = "Invited Talks \\ Analyzing the Success and Failure of Recent e-Payment Schemes \\ Peppercoin Micropayments \\ Loyalty and Micropayment Systems \\ Microcredits for Verifiable Foreign Service Provider Metering \\ A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves \\ User Authentication \\ Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop \\ Call Center Customer Verification by Query-Directed Passwords \\ Invited Talks \\ Cryptography and the French Banking Cards: Past, Present, Future \\ PayPass Security and Risk \\ e-Voting \\ The Vector-Ballot e-Voting Approach \\ Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast \\ Panel Session: Building Usable Security Systems \\ Usability and Acceptability of Biometric Security Systems \\ Mental Models of Computer Security \\ Visualization Tools for Security Administrators \\ Secure Interaction Design \\ Invited Talk \\ Bringing Payment Technology to the Unbanked \\ Auctions and Lotteries \\ Interleaving Cryptography and Mechanism Design \\ Secure Generalized Vickrey Auction without Third-party Servers \\ Electronic National Lotteries \\ Identity-Based Chameleon Hash and Applications \\ Game Theoretic and Cryptographic Tools \\ Selecting Correlated Random Actions \\ An Efficient and Usable Multi-show Non-transferable Anonymous Credential System \\ The Ephemeral Pairing Problem \\ Mix Networks and Anonymous Communications \\ Mixminion: Strong Anonymity for Financial Cryptography \\ Practical Anonymity for the Masses with MorphMix \\ Timing Attacks in Low-Latency Mix Systems \\ Provable Unlinkability against Traffic Analysis", } @Proceedings{Ioannidis:2005:ACN, editor = "John Ioannidis and Angelos Keromytis and Moti Yung", booktitle = "{Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, June 7--10, 2005: proceedings}", title = "{Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, June 7--10, 2005: proceedings}", volume = "3531", publisher = pub-SV, address = pub-SV:adr, pages = "xi + 530", year = "2005", DOI = "https://doi.org/10.1007/b137093", ISBN = "3-540-26223-7 (paperback), 3-540-31542-X (e-book)", ISBN-13 = "978-3-540-26223-7 (paperback), 978-3-540-31542-1 (e-book)", ISSN = "0302-9743", LCCN = "TK5102.85 .A26 2005", bibdate = "Sun Jan 21 14:01:31 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/10.1007/b137093", abstract = "The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Communi-cations and Information Security Association). It was held at Columbia University in New York, USA, J une 7--10, 2005.", acknowledgement = ack-nhfb, meetingname = "ACNS (Conference) (3rd: 2005: New York, NY)", subject = "Telecommunication; Security measures; Congresses; Data encryption (Computer science); Cryptography; T{\'e}l{\'e}communications; S{\'e}curit{\'e}; Mesures; Congr{\`e}s; Chiffrement (Informatique); Cryptographie; COMPUTERS; Security; Cryptography; Informatique; Cryptography; Data encryption (Computer science); Security measures; Authentifikation; Computersicherheit; Datensicherung; Internet; Kryptologie; Kryptosystem; Rechnernetz", tableofcontents = "Two-server password-only authenticated key exchange / Jonathan Katz \\ Strengthening password-based authentication protocols against online dictionary attacks / Peng Wang, Yongdae Kim, Vishal Kher \\ Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme / Raphael C.-W. Phan and Bok-Min Goi \\ Efficient security mechanisms for overlay multicast-based content distribution / Sencun Zhu, Chao Yao, Donggang Liu \\ A traitor tracing scheme based on RSA for fast decryption / John Patrick McGregor, Yiqun Lisa Yin, and Ruby B. Lee \\ N-party encrypted diffie-hellman key exchange using different passwords / Jin Wook Byun and Dong Hoon Lee \\ Messin' with Texas deriving mother's maiden names using public records / Virgil Griffith and Markus Jakobsson \\ Mitigating network denial-of-service through diversity-based traffic management / Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji \\ Searching for high-value rare events with uncheatable grid computing / Wenliang Du and Michael T. Goodrich \\ Digital signatures do not guarantee exclusive ownership / Thomas Pornin and Julien P. Stern \\ Thompson's group and public key cryptography / Vladimir Shpilrain and Alexander Ushakov \\ Rainbow, a new multivariable polynomial signature scheme / Jintai Ding and Dieter Schmidt \\ Badger: a fast and provably secure MAC / Martin Boesgaard, Thomas Christensen, and Erik Zenner \\ IDS false alarm reduction using continuous and discontinuous patterns / Abdulrahman Alharby and Hideki Imai \\ Indexing information for data forensics / Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia \\ Model generalization and its implications on intrusion detection / Zhuowei Li, Amitabha Das, and Jianying Zhou \\ Intrusion-resilient secure channels / Gene Itkis, Robert McNerney Jr., and Scott Russell \\ Optimal asymmetric encryption and signature paddings Benoit Chevallier-Mames, Duong Hieu Phan, and David Pointcheval \\ Efficient and leakage-resilient authenticated key transport protocol based on RSA / SeongHan Shin, Kazukuni Kobara, and Hideki Imi \\ Identity based encryptionwithout redundancy / Benoit Libert and Jean-Jacques Quisquater \\ OACerts: oblivious attribute certificates / Jiangtao Li and Ninghui Li \\ Dynamic k-times anonymous authentication / Lan Nguyen and Rei Safavi-Naini \\ Efficient anonymous roaming and its security analysis / Guomin Yang, Duncan S. Wong, and Xiaotie Deng \\ Quantifying security in hybrid cellular networks / Markus Jakobsson and Liu Yang \\ Off-line karma: a decentralized currency for peer-to-peer and grid applications / Flavio D. Garcia and Jaap-Henk Hoepman \\ Building reliable mix networks with fair exchange / Michael K. Reiter, XiaoFeng Wang, and Matthew Wright \\ SCARE of the DES (side channel analysis for reverse engineering of the data encryption standard) / Remy Daudigny, Herve Ledi and Frederic Muller \\ Robust key extraction from physical uncloneable functions / B. Skoric, P. Tuyls, and W. Ophey \\ Efficient constructions for one-way hash chains / Yih-Chun Hu, Markus Jakobsson, and Adrian Perrig \\ Privacy preserving keyword searches on remote encrypted data / Yan-Cheng Chang and Michael Mitzenmacher \\ An efficient solution to the millionaires' problem based on homomorphic encryption / Hsiao-Ying Lin and Wen-Guey Tzeng \\ Non-interactive zero-knowledge arguments for voting / Jens Groth \\ Short signature and universal designated verifier signature without random oracles / Rui Zhang, Jun Furukawa, and Hideki Imai \\ Efficient identity based ring signature / Sherman S. M. Chow, Siu-Ming Yiu, and Lucas C. K. Hui \\ New signature schemes with coupons and tight reduction / Benoit Chevallier-Mames", } @Proceedings{Keromytis:2012:FCD, editor = "Angelos D. Keromytis", booktitle = "{Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27--March 2, 2012, Revised Selected Papers}", title = "{Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27--March 2, 2012, Revised Selected Papers}", volume = "7397", publisher = pub-SV, address = pub-SV:adr, pages = "xi + 416", year = "2012", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-32946-3", ISBN = "3-642-32945-4 (print), 3-642-32946-2 (e-book)", ISBN-13 = "978-3-642-32945-6 (print), 978-3-642-32946-3 (e-book)", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", LCCN = "QA76.9.A25 F3 2012", bibdate = "Wed Dec 19 15:21:41 MST 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs.bib", series = ser-LNCS, URL = "http://www.springerlink.com/content/978-3-642-32946-3", acknowledgement = ack-nhfb, } @Book{Sadeghi:2013:FCD, editor = "Ahmad-Reza Sadeghi", booktitle = "{Financial Cryptography and Data Security: 17th International Conference, FC 2013 Okinawa, Japan, April 1--5, 2013. Revised Selected Paper}", title = "{Financial Cryptography and Data Security: 17th International Conference, FC 2013 Okinawa, Japan, April 1--5, 2013. Revised Selected Paper}", volume = "7859", publisher = pub-SV, address = pub-SV:adr, pages = "xv + 406", year = "2013", DOI = "https://doi.org/10.1007/978-3-642-39884-1", ISBN = "3-642-39884-7", ISBN-13 = "978-3-642-39884-1", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 11:53:59 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs.bib", series = ser-LNCS, acknowledgement = ack-nhfb, } @Proceedings{Bohme:2014:FCD, editor = "Rainer B{\"o}hme and Michael Brenner and Tyler Moore and Matthew Smith", booktitle = "{Financial cryptography and data security: FC 2014 Workshops, Bitcoin and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}", title = "{Financial cryptography and data security: FC 2014 Workshops, Bitcoin and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}", volume = "8438", publisher = pub-SV, address = pub-SV:adr, pages = "xii + 249", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1", ISBN = "3-662-44773-8 (paperback)", ISBN-13 = "978-3-662-44773-4 (paperback)", LCCN = "????", MRclass = "94-06 94A60 00B25", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = ser-LNCS, URL = "http://www.loc.gov/catdir/enhancements/fy1501/2014950823-d.html; http://www.loc.gov/catdir/enhancements/fy1501/2014950823-t.html", acknowledgement = ack-nhfb, tableofcontents = "Part I First Workshop on Bitcoin Research \\ Bitcoin Transactions, Policy and Legal Issues How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? / Dorit Ron and Adi Shamir / 3 \\ Towards Risk Scoring of Bitcoin Transactions / Malte M{\"o}ser, Rainer B{\"o}hme, and Dominic Breuker / 16 \\ Challenges and Opportunities Associated With a Bitcoin-Based Transaction Rating System / David Vandervort / 33 \\ Bitcoin: A First Legal Analysis With Reference to German and US-American Law / Franziska Boehm and Paulina Pesch / 43 \\ Bitcoin Security Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem / Marie Vasek, Micah Thornton, and Tyler Moore / 57 \\ Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools / Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore / 72 \\ The Bitcoin P2P Network / Joan Antoni Donet Donet, Cristina P{\'e}rez-Sol{\`a}, and Jordi Herrera-Joancomart{\'\i} / 87 \\ Improving Digital Currencies Fair Two-Party Computations via Bitcoin Deposits / Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and {\L}ukasz Mazurek / 105 \\ Increasing Anonymity in Bitcoin / Amitabh Saxena, Janardan Misra, and Aritra Dhar / 122 \\ Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity / Christina Garman, Matthew Green, Ian Miers, and Aviel D. Rubin / 140 \\ Bitcoin Poster Abstracts On Offline Payments with Bitcoin (Poster Abstract) / Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung / 159 \\ One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) / Ethan Heilman / 161 \\ From Bitcoin to the Brixton Pound: History and Prospects for Alternative Currencies (Poster Abstract) / Garrick Hileman / 163 \\ Part II Applied Homomorphic Cryptography and Encrypted Computing \\ High-Speed Fully Homomorphic Encryption Over the Integers / Xiaolin Cao, Ciara Moore, M{\'a}ire O Neill, Neil Hanley, and Elizabeth O Sullivan / 169 \\ Practical and Privacy-Preserving Policy Compliance for Outsourced Data / Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, and Rebecca N. Wright / 181 \\ Bandwidth Efficient PIR from NTRU / Yark{\i}n Dor{\"o}z, Berk Sunar, and Ghaith Hammouri / 195 \\ Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince / Yark{\i}n Dor{\"o}z, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar / 208 \\ A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU / Kurt Rohloff and David Bruce Cousins / 221 \\ Restructuring the NSA Metadata Program / Seny Kamara / 235 \\ Author Index / 249", } @Book{Champagne:2014:BSC, editor = "Phil Champagne", booktitle = "The book of {Satoshi}: the collected writings of bitcoin creator {Satoshi Nakamoto}", title = "The book of {Satoshi}: the collected writings of bitcoin creator {Satoshi Nakamoto}", publisher = "E53 Publishing LLC", pages = "xix + 372", year = "2014", ISBN = "0-9960613-0-4 (hardcover), 0-9960613-1-2 (paperback)", ISBN-13 = "978-0-9960613-0-8 (hardcover), 978-0-9960613-1-5 (paperback)", LCCN = "HG1710 .P34 2014", bibdate = "Thu Aug 27 08:05:28 MDT 2020", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "Have you, like the rest of the world, speculated as to the identity of Satoshi Nakamoto, anonymous creator of Bitcoin? The world's first cryptocurrency, Bitcoin went online in 2009 and has since revolutionized our concepts of currency and money. Not supported by any government or central bank, completely electronic, Bitcoin is a virtual currency based on advanced cryptographic systems. Like the currency he created, the identity of Bitcoin's creator Satoshi Nakamoto is virtual, existing only online. The Nakamoto persona, which may represent an individual or a group, exists only in the online publications that introduced and explained Bitcoin during its earliest days. Here, collected and professionally published for the first time are the essential writings that detail Bitcoin's creation. Included are * Satoshi Nakamoto Emails and Posts on Computer Forums Presented in Chronological Order * Bitcoin Fundamentals Presented in Layman's Terms * Bitcoin's Potential and Profound Economic Implications * The Seminal Paper Which Started It All. The Book of Satoshi provides a convenient way to parse through what Bitcoin's creator wrote over the span of the two years that constituted his ``public life'' before he disappeared from the Internet, at least under the name Satoshi Nakamoto. Beginning on November 1st 2009 with the publication of the seminal paper describing Bitcoin, this public life ends at about the time PC World speculated as to a possible link between Bitcoin and WikiLeaks, the infamous website that publishes leaked classified materials. Was there a connection? You be the judge. Nakamoto's true identity may never be known. Therefore the writings reproduced here are probably all the world will ever hear from him concerning Bitcoin's creation, workings, and theoretical basis. Want to learn more about Bitcoin? Go directly to the source-the writings of the creator himself, Satoshi Nakamoto!.", acknowledgement = ack-nhfb, remark = "This work was self-published by the editor using the E53 Publishing platform; revision date may vary between printings.", subject = "Computers; Software Development and Engineering; Business and Econimics; Money and Monetary Policy; Electronic Commerce; Bitcoin (Currency); Electronic funds transfers; Money", } @Proceedings{Christin:2014:FCD, editor = "Nicolas Christin and Reihaneh Safavi-Naini", booktitle = "{Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}", title = "{Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}", volume = "8438", publisher = pub-SV, address = pub-SV:adr, pages = "xii + 247", year = "2014", DOI = "https://doi.org/10.1007/978-3-662-44774-1", ISBN = "3-662-44773-8 (print), 3-662-44774-6 (e-book)", ISBN-13 = "978-3-662-44773-4 (print), 978-3-662-44774-1 (e-book)", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 11:59:16 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs.bib", series = ser-LNCS, URL = "http://www.springerlink.com/content/978-3-662-44774-1", acknowledgement = ack-nhfb, } @Proceedings{Duskin:2014:VCB, editor = "Valerie Duskin", booktitle = "{Virtual currency and the Bitcoin revolution: perspectives and considerations from Congressional Hearings}", title = "{Virtual currency and the Bitcoin revolution: perspectives and considerations from Congressional Hearings}", publisher = "Nova Publishers", address = "New York, NY, USA", pages = "viii + 189", year = "2014", ISBN = "1-63117-280-8", ISBN-13 = "978-1-63117-280-9", LCCN = "HG1710 .V57 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", series = "Economic issues, problems and perspectives", acknowledgement = ack-nhfb, subject = "Electronic funds transfers; Electronic commerce; Money", } @Proceedings{USCHCSM:2014:BEB, editor = "{United States Congress House Committee on Small Business}", booktitle = "{Bitcoin: examining the benefits and risks for small business: hearing before the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, second session, hearing held April 2, 2014}", title = "{Bitcoin: examining the benefits and risks for small business: hearing before the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, second session, hearing held April 2, 2014}", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "iii + 79", year = "2014", LCCN = "KF27 .S6 2014", bibdate = "Mon Dec 4 08:37:48 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, remark = "Shipping list no.: 2014-0252-P. ``Small Business Committee document number 113-064.''.", subject = "Electronic funds transfers; United States; Evaluation; Small business; Technological innovations; Decentralization in management; Electronic commerce", } @Proceedings{Brenner:2015:FCD, editor = "Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff", booktitle = "{Financial cryptography and data security. FC 2015 international workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015. Revised selected papers}", title = "{Financial cryptography and data security. FC 2015 international workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015. Revised selected papers}", volume = "8976", publisher = pub-SV, address = pub-SV:adr, pages = "xii + 309 + 59", year = "2015", DOI = "https://doi.org/10.1007/978-3-662-48051-9", ISBN = "3-662-48050-6 (paperback), 3-662-48051-4 (e-book)", ISBN-13 = "978-3-662-48050-2 (paperback), 978-3-662-48051-9 (e-book)", LCCN = "QA76.9.A25", MRclass = "94-06 94A60 00B25", bibdate = "Wed Jan 24 12:03:09 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, ZMnumber = "06480534; 1321.94006", abstract = "This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015.", acknowledgement = ack-nhfb, subject = "Computer science; Computer security; Data encryption; Application software; Management information systems; Electronic commerce", } @Proceedings{Oswald:2015:ACE, editor = "Elisabeth Oswald and Marc Fischlin", booktitle = "{Advances in Cryptology --- EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30, 2015, Proceedings, Part II}", title = "{Advances in Cryptology --- EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30, 2015, Proceedings, Part II}", volume = "9057", publisher = pub-SV, address = pub-SV:adr, pages = "xviii + 838", year = "2015", ISBN = "3-662-46802-6 (print), 3-662-46803-4 (e-book)", ISBN-13 = "978-3-662-46802-9 (print), 978-3-662-46803-6 (e-book)", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 15:31:21 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs.bib", series = ser-LNCS, URL = "http://www.springerlink.com/content/978-3-662-46803-6", abstract = "The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.", acknowledgement = ack-nhfb, tableofcontents = "Universal Signature Aggregators \\ Fully Structure-Preserving Signatures and Shrinking Commitments \\ Disjunctions for Hash Proof Systems: New Constructions and Applications \\ Quasi-Adaptive NIZK for Linear Subspaces Revisited \\ Leakage-Resilient Circuits Revisited? Optimal Number of Computing Components Without Leak-Free Hardware \\ Noisy Leakage \\ Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge \\ Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates \\ One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin \\ The Bitcoin Backbone Protocol: Analysis and Applications \\ Linear Secret Sharing Schemes from Error Correcting Codes \\ Function Secret Sharing \\ Cluster Computing in Zero Knowledge \\ Hosting Services on an Untrusted Cloud \\ How to Obfuscate Programs Directly \\ Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data \\ Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World \\ Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation \\ Improved Dual System ABE in Prime-Order Groups via Predicate Encodings \\ Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model \\ Cryptographic Reverse Firewalls \\ Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols \\ Authenticated Key Exchange from Ideal Lattices \\ Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model \\ Privacy Amplification in the Isolated Qubits Model \\ Generic Hardness of the Multiple Discrete Logarithm Problem", } @Proceedings{Clark:2016:FCD, editor = "Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan Wallach and Michael Brenner and Kurt Rohloff", booktitle = "{Financial cryptography and data security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016: revised selected papers}", title = "{Financial cryptography and data security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016: revised selected papers}", volume = "9604", publisher = pub-SV, address = pub-SV:adr, pages = "xii + 341", year = "2016", DOI = "https://doi.org/10.1007/978-3-662-53357-4", ISBN = "3-662-53356-1 (print), 3-662-53357-X (e-book)", ISBN-13 = "978-3-662-53356-7 (print), 978-3-662-53357-4 (e-book)", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 12:09:11 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, acknowledgement = ack-nhfb, subject = "Computer science; Computer security; Data encryption (Computer science); Application software; Computers and civilization; Management information systems; E-commerce; Elektronischer Zahlungsverkehr; Kryptologie; Datensicherung", } @Book{Olleros:2016:RHD, editor = "F. Xavier Olleros and Majlinda Zhegu", booktitle = "Research Handbook on Digital Transformations", title = "Research Handbook on Digital Transformations", publisher = "Edward Elgar Publishing", address = "Cheltenham, UK", pages = "xi + 461", year = "2016", ISBN = "1-78471-775-4 (hardcover), 1-78471-776-2 (e-book)", ISBN-13 = "978-1-78471-775-9 (hardcover), 978-1-78471-776-6 (e-book)", LCCN = "HM851 .R465 2016", bibdate = "Sat Jan 20 16:48:40 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; z3950.loc.gov:7090/Voyager", abstract = "The digital transition of the world economy is now entering a phase of broad and deep societal impact. While there is one overall transition, there are many different sectoral transformations, from health and legal services to tax reports and taxi rides, as well as a rising number of transversal trends and policy issues, from widespread precarious employment and privacy concerns to market monopoly and cybercrime. This Research Handbook offers a rich and interdisciplinary synthesis of some of the recent research on the digital transformations currently under way. This comprehensive study contains chapters covering sectoral and transversal analyses, all of which are specially commissioned and include cutting-edge research. The contributions featured are global, spanning four continents and seven different countries, as well as interdisciplinary, including experts in economics, sociology, law, finance, urban planning and innovation management. The digital transformations discussed are fertile ground for researchers, as established laws and regulations, organizational structures, business models, value networks and workflow routines are contested and displaced by newer alternatives. This book will be equally pertinent to three constituencies: academic researchers and graduate students, practitioners in various industrial and service sectors and policy makers.", acknowledgement = ack-nhfb, subject = "Information society; Digital electronics; Social aspects; Technological innovations", tableofcontents = "Digital transformations: an introduction / F. Xavier Olleros and Majlinda Zhegu \\ Part I sectoral analyses \\ 1: How online learning will transform legal education / David I. C. Thomson \\ 2: The digital future of the oldest information profession / Ray Worthy Campbell \\ 3: Medicine in the age of smart machines: legal liability challenges / Fazal Khan \\ 4: Digital health technologies and digital data: new ways of monitoring, measuring and commodifying human bodies / Deborah Lupton \\ 5: The digital disruption of banking and payment services / David Arnold and Paul Jeffery \\ 6: Collaboration, participation, and transparency: the promise of digitizing academic research / Sascha Friesike and Benedikt Fecher \\ 7: University libraries in the digital era / Kyle K. Courtney and Emily Kilcer \\ 8: Online dating platforms: a tool for social science research / Andreas Schmitz and Doreen Zillmann \\ 9: Atoms matter: the role of local 'makerspaces' in the coming digital economy / Joel West and Anne Greul \\ 10: Smart cities, social capital and citizens at play: a critique and a way forward / Marcus Foth, Andrew Hudson-Smith and Dean Gifford \\ Part II transversal topics \\ 11: Blockchain technology: principles and applications / Marc Pilkington \\ 12: 3d printing and intellectual property / Lucas Osborn \\ 13: Big data and the future for privacy / Neil M. Richards and Jonathan H. King \\ 14: Crowdwork, corporate social responsibility and fair labor practices / Miriam A. Cherry and Winifred R. Poster \\ 15: Crowdfunding: principles, trends and issues / St\'ephane Onn\'ee and Sophie Renault \\ 16: The gamification of education and business: a critical analysis and future research prospects / Amy Duvernet, Alberto Asquer and Inna Krachkovskaya \\ 17: The impact of digital technologies on innovation policy / Kenji E. Kushida \\ 18: Innovation policy for cloud-computing contracts / John M. Newman \\ 19: Competition policy in a world of big data / Simonetta Vezzoso \\ 20: A continuum of internet-based crime: how the effectiveness of cybersecurity policies varies across cybercrime types / Eric Jardine", } @Proceedings{ACM:2017:ACP, editor = "{ACM}", booktitle = "{ASIA CCS'17: proceedings of the 2017 ACM Asia Conference on Computer and Communications Security: April 2--6, 2017, Abu Dhabi, UAE}", title = "{ASIA CCS'17: proceedings of the 2017 ACM Asia Conference on Computer and Communications Security: April 2--6, 2017, Abu Dhabi, UAE}", publisher = pub-ACM, address = pub-ACM:adr, pages = "932 (est.)", year = "2017", ISBN = "1-4503-4944-7", ISBN-13 = "978-1-4503-4944-4", LCCN = "????", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://dl.acm.org/citation.cfm?id=3052973", acknowledgement = ack-nhfb, } @Proceedings{ACM:2017:BPA, editor = "{ACM}", booktitle = "{BCC'17: proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts: April 2, 2017, Abu Dhabi, UAE}", title = "{BCC'17: proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts: April 2, 2017, Abu Dhabi, UAE}", publisher = pub-ACM, address = pub-ACM:adr, pages = "??--??", year = "2017", ISBN = "1-4503-4974-9", ISBN-13 = "978-1-4503-4974-1", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://dl.acm.org/citation.cfm?id=3055518", acknowledgement = ack-nhfb, location = "Abu Dhabi, United Arab Emirates", } @Proceedings{ACM:2017:EPI, editor = "{ACM}", booktitle = "{eGose '17: Proceedings of the International Conference on Electronic Governance and Open Society: Challenges in Eurasia, St. Petersburg, Russia}", title = "{eGose '17: Proceedings of the International Conference on Electronic Governance and Open Society: Challenges in Eurasia, St. Petersburg, Russia}", publisher = pub-ACM, address = pub-ACM:adr, pages = "??--??", year = "2017", ISBN = "1-4503-5412-2", ISBN-13 = "978-1-4503-5412-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", acknowledgement = ack-nhfb, } @Proceedings{ACM:2017:IPA, editor = "{ACM}", booktitle = "{IoTPTS'17: proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security: April 2, 2017, Abu Dhabi, UAE}", title = "{IoTPTS'17: proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security: April 2, 2017, Abu Dhabi, UAE}", publisher = pub-ACM, address = pub-ACM:adr, pages = "????", year = "2017", ISBN = "1-4503-4969-2", ISBN-13 = "978-1-4503-4969-7", bibdate = "Thu Jan 18 11:50:20 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://dl.acm.org/citation.cfm?id=3055245", acknowledgement = ack-nhfb, location = "Abu Dhabi, United Arab Emirates", } @Book{Bheemaiah:2017:BA, author = "Kariappa Bheemaiah", booktitle = "The Blockchain Alternative", title = "The Blockchain Alternative", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "xx + 248", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2674-2", ISBN = "1-4842-2673-9 (paperback), 1-4842-2674-7 (e-book)", ISBN-13 = "978-1-4842-2673-5 (paperback), 978-1-4842-2674-2 (e-book)", LCCN = "HG4026 .B522 2017", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/book/10.1007/978-1-4842-2674-2", acknowledgement = ack-nhfb, tableofcontents = "Introduction \\ Debt-based economy: the intricate dance of money and debt \\ Fragmentation of fiance \\ Innovating capitalism \\ Complexity economics: a new way to witness capitalism", } @Book{Drescher:2017:BB, author = "Daniel Drescher", booktitle = "Blockchain Basics", title = "Blockchain Basics", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "xv + 255", year = "2017", DOI = "https://doi.org/10.1007/978-1-4842-2604-9", ISBN = "1-4842-2603-8 (print), 1-4842-2604-6 (e-book)", ISBN-13 = "978-1-4842-2603-2 (print), 978-1-4842-2604-9 (e-book)", LCCN = "HG1710 .D74 2017", bibdate = "Wed Jan 24 09:11:52 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", URL = "http://link.springer.com/book/10.1007/978-1-4842-2604-9", abstract = "In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminolog is explained through pictures, analogies, and metaphors. This book bridges the gap that exits between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.", acknowledgement = ack-nhfb, subject = "Banks and Banking; Blockchains (Databases); Business and Economics; Computers; Data encryption (Computer science); Database management; Databases; E-Commerce; Electronic commerce; Electronic funds transfers; General", tableofcontents = "About the Author \\ About the Technical Reviewer \\ Introduction \\ Stage I: Terminology and Technical Foundations \\ Step 1: Thinking in Layers and Aspects \\ The Metaphor \\ Layers of a Software System \\ Application vs. Implementation \\ Functional vs. Nonfunctional Aspects \\ Considering Two Layers at the Same Time \\ Integrity \\ Outlook \\ Summary \\ Step 2: Seeing the Big Picture \\ The Metaphor \\ A Payment System \\ Two Types of Software Architecture \\ The Advantages of Distributed Systems \\ Higher Computing Power \\ Cost Reduction \\ Higher Reliability \\ Ability to Grow Naturally \\ The Disadvantages of Distributed Systems \\ Coordination Overhead \\ Communication Overhead \\ Dependencies on Networks \\ Higher Program Complexity \\ Security Issues \\ Distributed Peer-to-Peer Systems \\ Mixing Centralized and Distributed Systems \\ Identifying Distributed Systems \\ The Purpose of the Blockchain \\ Outlook \\ Summary \\ Step 3: Recognizing the Potential \\ The Metaphor \\ How a Peer-to-Peer System Changed a Whole Industry \\ The Potential of Peer-to-Peer Systems \\ Terminology and the Link to the Blockchain \\ The Definition of a Peer-to-Peer System \\ Architecture of Peer-to-Peer Systems \\ The Link Between Peer-to-Peer Systems and the Blockchain \\ The Potential of the Blockchain \\ Outlook \\ Summary \\ Stage II: Why the Blockchain Is Needed \\ Step 4: Discovering the Core Problem \\ The Metaphor \\ Trust and Integrity in Peer-to-Peer Systems \\ Integrity Threats in Peer-to-Peer Systems \\ Technical Failures \\ Malicious Peers \\ The Core Problem to Be Solved by the Blockchain \\ Outlook \\ Summary \\ Step 5: Disambiguating the Term \\ The Term \\ A Data Structure \\ An Algorithm \\ A Suite of Technologies \\ An Umbrella Term for Purely Distributed Peer-to-Peer Systems with a Common Application Area \\ The Usage of the Term in This Book \\ Provisional Definition \\ The Role of Managing Ownership \\ The Application Area of the Blockchain in This Book \\ Outlook \\ Summary \\ Step 6: Understanding the Nature of Ownership \\ The Metaphor \\ Ownership and Witnesses \\ Foundations of Ownership \\ A Short Detour to Security \\ Identification \\ Authentication \\ Authorization \\ Purposes and Properties of a Ledger \\ Ownership and the Blockchain \\ Outlook \\ Summary \\ Step 7: Spending Money Twice \\ The Metaphor \\ The Double Spending Problem \\ The Term \\ Double Spending as a Problem of Copying Digital Goods \\ Double Spending as a Problem of Distributed Peer-to-Peer Systems of Ledgers \\ Double Spending as an Example of Violated Integrity in Distributed Peer-to-Peer Systems \\ How to Solve the Double Spending Problem \\ Solving Double Spending as a Problem of Copying Digital Goods \\ Solving Double Spending as a Problem of a Distributed Peer-to-Peer System of Ledgers \\ Solving Double Spending as an Example of Violated Integrity in Distributed Peer-to-Peer Systems \\ The Usage of Double Spending in This Book \\ Outlook \\ Summary \\ Stage III: How the Blockchain Works \\ Step 8: Planning the Blockchain \\ The Goal", } @Book{Garcia-Alfaro:2017:DPM, editor = "Joaquin Garcia-Alfaro and Guillermo Navarro-Arribas and Hannes Hartenstein and Jordi Herrera-Joancomart{\'i}", booktitle = "{Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14--15, 2017, Proceedings}", title = "{Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14--15, 2017, Proceedings}", volume = "10436", publisher = pub-SV, address = pub-SV:adr, pages = "xiii + 446", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-67816-0", ISBN = "3-319-67815-9 (print), 3-319-67816-7 (e-book)", ISBN-13 = "978-3-319-67815-3 (print), 978-3-319-67816-0 (e-book)", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 14:40:53 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/lncs.bib", series = ser-LNCS, URL = "http://link.springer.com/10.1007/978-3-319-67816-0", abstract = "This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017. The DPM Workshop received 51 submissions from which 16 full papers were selected for presentation. The papers focus on challenging problems such as translation of high-level business goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. From the CBT Workshop six full papers and four short papers out of 27 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing.", acknowledgement = ack-nhfb, subject = "Computer security; Congresses; Data encryption (Computer science); Data protection; Computer security.; Data encryption (Computer science); Data protection.; Computer Science; Systems and Data Security; Management of Computing and Information Systems; Data Encryption; Information Systems Applications (including Internet); Algorithm Analysis and Problem Complexity", tableofcontents = "A Proof Calculus for Attack Trees in Isabelle \\ Confidentiality of Interactions in Concurrent Object-Oriented Systems \\ Using Oblivious RAM in Genomic Studies \\ Towards Efficient and Secure Encrypted Databases: Extending \\ Message-Locked Encryption in Three-Party Model \\ Searchable Encrypted Relational Databases: Risks and Countermeasures \\ Private verification of access on medical data: an initial study \\ Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences \\ Bounding Privacy Leaks in Privacy Preserving Data Mining \\ Threshold Single Password Authentication \\ Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization \\ Enforcement of External Anonymization \\ DLoc: Distributed Auditing for Data Location Compliance in Cloud \\ Inonymous: Anonymous Invitation-Based System \\ Order-Preserving Encryption Using Approximate Integer Common Divisors \\ Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks \\ Securing Proof-of-Stake Blockchain Protocols \\ Merged Mining: Curse or Cure? \\ Atomically Trading with Roger: Gambling on the success of a hardfork \\ Smart Contracts and Blockchain Identity \\ In Code We Trust? Measuring the Control Flow Immutability of All \\ Smart Contracts Deployed on Ethereum \\ Who Am I? Secure Identity Registration on Distributed Ledgers \\ User-centric System for Verified Identities on the Bitcoin Blockchain \\ Towards a Concurrent and Distributed Route Selection for Payment Channel Networks \\ Graphene: A New Protocol for Block Propagation Using Set Reconciliation \\ Revisiting Difficulty Control for Blockchain Systems \\ Secure Event Tickets on a Blockchain", } @Proceedings{Grossklags:2017:FCD, editor = "Jens Grossklags and Bart Preneel", booktitle = "{Financial cryptography and data security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised selected papers}", title = "{Financial cryptography and data security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised selected papers}", volume = "9603", publisher = pub-SV, address = pub-SV:adr, pages = "xiv + 620", year = "2017", DOI = "https://doi.org/10.1007/978-3-662-54970-4", ISBN = "3-662-54969-7 (print), 3-662-54970-0 (e-book)", ISBN-13 = "978-3-662-54969-8 (print), 978-3-662-54970-4 (e-book)", ISSN = "0302-9743", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 12:14:43 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, URL = "http://link.springer.com/10.1007/978-3-662-54970-4", abstract = "This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.", acknowledgement = ack-nhfb, meetingname = "FC (Conference) (20th : 2016 : Christ Church, Barbados)", subject = "Data encryption (Computer science); Congresses; Computer security; User-centered system design; Computer security.; Data encryption (Computer science); User-centered system design.", tableofcontents = "Fraud and deception \\ Payments, auctions, and e-voting \\ Multiparty computation \\ Mobile malware \\ Social interaction and policy \\ Cryptanalysis \\ Surveillance and anonymity \\ Web security and data privacy \\ Bitcoin mining \\ Cryptographic protocols \\ Payment use and abuse", } @Proceedings{Jakobsson:2017:FCD, editor = "Markus Jakobsson and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore", booktitle = "{Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}", title = "{Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}", volume = "10323", publisher = pub-SV, address = pub-SV:adr, pages = "xxii + 636 + 97", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-70278-0", ISBN = "3-319-70277-7 (print), 3-319-70278-5 (e-book)", ISBN-13 = "978-3-319-70277-3 (print), 978-3-319-70278-0 (e-book)", LCCN = "QA76.9.A25", bibdate = "Wed Jan 24 12:11:49 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = ser-LNCS, acknowledgement = ack-nhfb, subject = "Computer science; Computer organization; Computer security; Data encryption (Computer science); Computers", } @Book{Morabito:2017:BIT, author = "Vincenzo Morabito", booktitle = "Business Innovation through Blockchain: the {B3} Perspective", title = "Business Innovation through Blockchain: the {B3} Perspective", publisher = pub-SV, address = pub-SV:adr, pages = "xxii + 173", year = "2017", DOI = "https://doi.org/10.1007/978-3-319-48478-5", ISBN = "3-319-48477-X (print), 3-319-48478-8 (e-book)", ISBN-13 = "978-3-319-48477-8 (print), 978-3-319-48478-5 (e-book)", LCCN = "HD45", bibdate = "Wed Jan 24 15:09:34 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/10.1007/978-3-319-48478-5", abstract = "This book explores the main challenges and trends related to the use of blockchain technology for digital business innovation with the aim of providing practitioners with stimulating insights and ideas. Readers will find a unified survey of current scientific work on blockchain and related phenomena, such as bitcoin, from a range of perspectives, including information systems, technology management, innovation research, computer science, and engineering. In this way, the book links research and industry practices suitable for use by practitioners in their day-to-day activities and also provides an update on what academia may offer in terms of industry proposals. The contents are divided into three parts. After discussion of blockchain technology and management, including impacts on value chains and systems, governance, and security issues, the bitcoin phenomenon and main technological trends in the use of blockchain are addressed. The final part presents examples of business innovation using blockchain that are drawn from across the globe. Throughout, the author adopts a methodologically rigorous approach while ensuring that the text is readily understandable for readers, regardless of their degree of acquaintance with blockchain.", acknowledgement = ack-nhfb, subject = "Business enterprises; Technological innovations; Management; BUSINESS and ECONOMICS; Industrial Management.; Management.; Management Science.; Organizational Behavior.; Technological innovations.; Management.", tableofcontents = "Part I Blockchain technology and management \\ 1 The blockchain paradigm change structure \\ 2 Blockchain value system \\ 3 Blockchain governance \\ 4 The security of blockchain systems \\ Part II Bitcoin phenomenon and trends \\ 5 Digital Currencies \\ 6 Smart Contracts and Licensing \\ 7 Blockchain and Enterprise Systems \\ Part III Blockchain Business Innovation \\ 8 Blockchain practices \\ 9 Conclusion: the B3 perspective", } @Book{Sixt:2017:BAD, author = "Elfriede Sixt", booktitle = "{Bitcoins und andere dezentrale Transaktionssysteme: Blockchains als Basis einer Krypto{\"o}konomie}", title = "{Bitcoins und andere dezentrale Transaktionssysteme: Blockchains als Basis einer Krypto{\"o}konomie}", publisher = pub-SV, address = pub-SV:adr, pages = "xiv + 195", year = "2017", DOI = "https://doi.org/10.1007/978-3-658-02844-2", ISBN = "3-658-02843-2 (print), 3-658-02844-0 (e-book)", ISBN-13 = "978-3-658-02843-5 (print), 978-3-658-02844-2 (e-book)", LCCN = "HG1710", bibdate = "Wed Jan 24 15:12:03 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://www.springerlink.com/content/978-3-658-02844-2", acknowledgement = ack-nhfb, language = "German", subject = "Bitcoin; Transaction systems (Computer systems); BUSINESS and ECONOMICS / Finance; Bitcoin.; Transaction systems (Computer systems)", } @Book{Dhillon:2018:BEA, author = "Vikram Dhillon and David Metcalf and Max Hooper", booktitle = "Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you", title = "Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you", publisher = pub-APRESS, address = pub-APRESS:adr, pages = "xvii + 218 + 103", year = "2018", DOI = "https://doi.org/10.1007/978-1-4842-3081-7", ISBN = "1-4842-3080-9 (print), 1-4842-3081-7 (e-book)", ISBN-13 = "978-1-4842-3080-0 (print), 978-1-4842-3081-7 (e-book)", LCCN = "QA76.9.D32", bibdate = "Wed Jan 24 12:32:42 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://link.springer.com/10.1007/978-1-4842-3081-7", abstract = "Work with blockchain and understand its potential application beyond cryptocurrencies in the domains of healthcare, Internet of Things, finance, decentralized organizations, and open science. Featuring case studies and practical insights generated from a start-up spun off from the authors own lab, this book covers a unique mix of topics not found in others and offers insight into how to overcome real hurdles that arise as the market and consumers grow accustomed to blockchain based start-ups. You'll start with a review of the historical origins of blockchain and explore the basic cryptography needed to make the blockchain work for Bitcoin. You will then learn about the technical advancements made in the surrounded ecosystem: the Ethereum virtual machine, Solidity, Colored Coins, the Hyperledger Project, Blockchain-as-a-service offered through IBM, Microsoft and more. This book looks at the consequences of machine-to-machine transactions using the blockchain socially, technologically, economically and politically. \booktitle{Blockchain Enabled Applications} provides you with a clear perspective of the ecosystem that has developed around the blockchain and the various industries it has penetrated.", acknowledgement = ack-nhfb, subject = "Blockchains (Databases); COMPUTERS / Databases / General.; Blockchains (Databases)", tableofcontents = "1. Behold the Dreamers \\ 2. The Gold Rush \\ 3. Blocks in a Chain \\ 4. Ether in the Air \\ 5. Decentralized Organizations \\ 6. The DAO Hacked \\ 7. Ethereum Tokens: High Performance Computing \\ 8. Blockchain in Science \\ 9. Blockchain in Healthcare \\ 10. The Hyperledger Project \\ 11. Recent Developments in Blockchain \\ 12. Technological Revolutions and Financial Capital \\ Appendix. Building a Healthcare Consortium", } @Book{Hofmann:2018:SCF, author = "Erik Hofmann and Urs Magnus Strewe and Nicola Bosia", booktitle = "Supply Chain Finance and Blockchain Technology: the Case of Reverse Securitisation", title = "Supply Chain Finance and Blockchain Technology: the Case of Reverse Securitisation", publisher = pub-SV, address = pub-SV:adr, pages = "viii + 91", year = "2018", DOI = "https://doi.org/10.1007/978-3-319-62371-9", ISBN = "3-319-62370-2 (paperback), 3-319-62371-0 (e-book)", ISBN-13 = "978-3-319-62370-2 (paperback), 978-3-319-62371-9 (e-book)", ISSN = "2913-1720", LCCN = "HD38.5 .H632 2018", bibdate = "Wed Jan 24 14:35:30 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "SpringerBriefs in finance", URL = "http://link.springer.com/book/10.1007/978-3-319-62371-9", abstract = "This book investigates how the Blockchain Technology (BCT) for Supply Chain Finance (SCF) programs allows businesses to come together in partnerships and accelerate cash flows throughout the supply chain. BCT promises to change the way individuals and corporations exchange value and information over the Internet, and is perfectly positioned to enable new levels of collaboration among the supply chain actors. The book reveals new opportunities stemming from the application of BCT to SCF financing solutions, particularly reverse factoring - or approved payables financing. To do so, it first identifies the principal barriers and pain points in delivering financing solutions. Then, a possible blockchain-driven supply chain model is defined. Using this framework, the book subsequently discusses relevant use cases for the technology, which could open up new opportunities in the SCF space. It demonstrates that blockchain and distributed ledgers technologies could deliver substantial benefits for all parties involved in SCF transactions, promising to expedite the processes and lower the overall costs of financing programs. Industry giants such as IBM, Maersk, China-based Dianrong and FnConn (a Foxconn subsidiary) are currently working to digitize the global, cross-border supply chain using blockchain technology, and will likely soon create blockchain platforms for supply chain finance. These solutions aim to reduce complexity and make data sharing more secure, accurate and efficient. This book offers a highly topical resource for stakeholders across the entire supply chain, helping them prepare for the upcoming technological revolution.", acknowledgement = ack-nhfb, subject = "Business logistics; Blockchains (Databases); Partnership; Blockchains (Databases); Business logistics.; Partnership.; Absatzfinanzierung; Au{\ss}enhandelsfinanzierung; Blockchain; Factoring; Supply Chain Management", tableofcontents = "Preface --- Why This Book? \\ Contents \\ 1 Introduction --- Why to Pay Attention on Blockchain-Driven Supply Chain Finance? \\ 1.1 Purpose \\ 1.2 Structure \\ 1.3 Brief Look at the Literature \\ References \\ 2 Background I --- What Is Buyer-Led Supply Chain Finance? \\ 2.1 Defining Buyer-Led Supply Chain Finance \\ 2.2 Overview of Approved Payables Financing Instruments \\ 2.2.1 Dynamic Discounting \\ 2.2.2 Reverse Factoring \\ 2.2.3 Reverse Securitisation \\ 2.3 Key Drivers of Approved Payables Financing Instruments \\ References \\ 3 Background II --- What Is Reverse Securitisation?3.1 Defining Securitisation in Supply Chain Finance \\ 3.1.1 Supplier-Led Account Receivables Securitisation \\ 3.1.2 Inventory Securitisation \\ 3.1.3 Buyer-Led-Approved Payables Securitisation \\ 3.2 Key Characteristics of Reverse Securitisation \\ 3.2.1 Structuring Options \\ 3.2.2 Credit Enhancement \\ 3.2.3 Securities Issuance \\ 3.2.4 Parties Involved \\ 3.3 A Platform-Driven Reverse Securitisation Approach \\ References \\ 4 Background III --- What Is Blockchain Technology? \\ 4.1 Defining the Blockchain and Its Key Technical Aspects \\ 4.1.1 Peer-to-Peer Value Exchange System \\ 4.1.2 Group Consensus Mechanism \\ 4.1.3 Private and Public Distributed Validation Networks \\ 4.1.4 Smart Contracts \\ 4.2 A Distributed Ledger's Landscape of Blockchain Technology \\ 4.3 Key Features of Blockchain Technology \\ References \\ 5 Concept --- Where Are the Opportunities of Blockchain-Driven Supply Chain Finance? \\ 5.1 Dealing with Supply Chain Finance Barriers and Supply Chain Processes \\ 5.1.1 Compliance Requirements (KYC) \\ 5.1.2 Accounting Rules and Treatments \\ 5.1.3 Issuing and Post-trade Clearing and Settlement Processing \\ 5.1.4 Relevant Supply Chain Activities \\ 5.2 Layers of Blockchain-Driven Supply Chains \\ 5.2.1 The Order Processing Layer \\ 5.2.2 The Shipping Layer \\ 5.2.3 The Invoicing Layer \\ 5.2.4 The Payment Layer \\ 5.3 Opportunities of Blockchain-Driven Supply Chains \\ 5.3.1 Increased 'Window of Opportunities' \\ 5.3.2 Efficient Cash Settlement \\ 5.3.3 Simplified Invoice Validity Check \\ 5.3.4 Integration of Product and Money Flows \\ 5.4 Blockchain-Driven Reverse Securitisation \\ References \\ 6 Discussion --- How Does the Full Potential of Blockchain Technology in Supply Chain Finance Look Like? \\ 6.1 A Wider Scope of Supply Chain Finance Solutions \\ 6.1.1 Blockchain-Based Inventory Financing \\ 6.1.2 Blockchain-Based Purchase Order Financing \\ 6.1.3 Blockchain-Based Receivables Financing \\ 6.1.4 Sum-up of the Wider Scope \\ 6.2 Limitations \\ 6.3 Future Research \\ References \\ 7 Conclusion --- What Can We Learn from Blockchain-Driven Supply Chain Finance?", } @Book{LealFilho:2018:HSS, editor = "Walter {Leal Filho} and Robert W. Marans and John Callewaert", booktitle = "Handbook of sustainability and social science research", title = "Handbook of sustainability and social science research", publisher = pub-SV, address = pub-SV:adr, year = "2018", DOI = "https://doi.org/10.1007/978-3-319-67122-2", ISBN = "3-319-67121-9 (print), 3-319-67122-7 (e-book)", ISBN-13 = "978-3-319-67121-5 (print), 978-3-319-67122-2 (e-book)", ISSN = "2199-7373", LCCN = "HC79.E5", bibdate = "Wed Jan 24 14:47:17 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", series = "World sustainability series", URL = "http://link.springer.com/10.1007/978-3-319-67122-2", abstract = "In this handbook social science researchers who focus on sustainability present and discuss their findings, including empirical work, case studies, teaching and learning innovations, and applied projects. As such, the book offers a basis for the dissemination of information, ideas and experiences acquired in the execution of research projects, especially initiatives which have influenced behavior, decision-making, or policy. Furthermore, it introduces methodological approaches and projects which aim to offer a better understanding of sustainability across society and economic sectors. This multidisciplinary overview presents the work of researchers from across the spectrum of the social sciences. It stimulates innovative thinking on how social sciences influence sustainable development and vice-versa.", acknowledgement = ack-nhfb, subject = "Sustainability; Handbooks, manuals, etc; Sustainable development; Social sciences; Research; BUSINESS and ECONOMICS; Industries; General; Research; Sustainability; Sustainable development", tableofcontents = "Interplays of Sustainability, Resilience, Adaptation and Transformation \\ Using Meta-Analysis in the Social Sciences to Improve Environmental Policy \\ Integrating Social Science Research to Advance Sustainability Education \\ Inclusive Sustainability: Environmental Justice in Higher Education \\ Connective Methodologies: Visual Communication Design and Sustainability in Higher Education \\ The Teaching Green Building: Five Theoretical Perspectives \\ Blockchain for Good? Digital Ledger Technology and Sustainable Development Goals", } @Book{Linnhoff-Popien:2018:DMU, editor = "Claudia Linnhoff-Popien and Ralf Schneider and Michael Zaddach", booktitle = "Digital Marketplaces Unleashed", title = "Digital Marketplaces Unleashed", publisher = pub-SV, address = pub-SV:adr, pages = "xxxiii + 935", year = "2018", DOI = "https://doi.org/10.1007/978-3-662-49275-8", ISBN = "3-662-49274-1, 3-662-49275-X (e-book)", ISBN-13 = "978-3-662-49274-1, 978-3-662-49275-8 (e-book)", LCCN = "QA75.5-76.95", bibdate = "Wed Jan 24 15:18:23 MST 2018", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", URL = "http://link.springer.com/10.1007/978-3-662-49275-8", abstract = "This collection of different views on how digitalization is influencing various industrial sectors addresses essential topics like big data and analytics, fintech and insuretech, cloud and mobility technologies, disruption and entrepreneurship. The technological advances of the 21st century have been massively impacted by the digital upheaval: there is no future without digitalization. The sale of products and services has left the classical point of sale and now takes place on a variety of channels. Whether in the automotive industry, travel and traffic, in cities, or the financial industry --- newly designed ecosystems are being created everywhere; data is being generated and analyzed in real time; and companies are competing for mobile access channels to customers in order to gain knowledge about their individual contexts and preferences. In turn, customers can now publicly share their opinions, experiences and knowledge as User Generated Content, allowing them to impact the market and empowering them to build or destroy trust.", acknowledgement = ack-nhfb, subject = "Internet; Economic aspects; Electronic commerce; Electronic commerce.; Economic aspects.", tableofcontents = "Foreword \\ Acknowledgment \\ List of Contributors \\ Contents \\ List of Authors \\ Part I Prefaces \\ 1 Preface: Humans in Digital Marketplaces \\ 2 Preface: Digital Society? The Great Transformation / 21 \\ 3 Preface: New Computing in Digital Marketplaces Unleashed \\ Part II Introduction \\ 4 Welcome to the Age of Spontaneous Business Models: Start Shaping or Be Shaped \\ Part III Digital Society \\ 5 Preface: So Far, so Bad \\ the Complexity-Fear Dilemma in Cybersecurity and Its Lesson for Digitalization at Large \\ 6 Valuation, Recognition, and Signaling in the Digital Public Sphere: the TED Talk Ranking Ecosystem / 14 \\ Digitalization in Schools \\ Organization, Collaboration and Communication \\ References \\ 15 The Unsung Power of Horizontal Grassroots \\ References \\ 16 The COMALAT Approach to Individualized E-Learning in Job-Specific Language Competences \\ References \\ Part V Disruptive Technologies and Entrepreneurship \\ 17 Preface: Reprogramming Your Corporate Immune System \\ 18 How Corporations Can Win the Race Against Disruptive Startups \\ References \\ 19 Smart Contracts \\ Blockchains in the Wings \\ References \\ 20 The Last Step Remains Analogue \ldots{} \\ References \\ 21 Marketplace-Driven, Game-Changing IT Games to Address Complex, Costly Community Problems \\ References \\ 22 Industrial Evolution and Disruptive Innovation: Theories, Evidence and Perspectives \\ References \\ Part VI Digital Business Outcomes \\ 23 Preface: Digital Business Outcomes \\ References \\ 24 Software Industrialisation \\ How to Industrialise Knowledge Work? \\ References \\ 25 From Digital Retail to Real-Time Retail \\ 26 Privacy Preserving Personalization in Complex Ecosystems \\ References \\ Part VII Cognitive Systems \\ 27 Cognitive Computing \\ the new Paradigm of the Digital World \\ 28 From Tweet to Chatbot \\ Content Management as a Core Competency for the Digital Evolution \\ References \\ 29 The European Network and Information Security Directive \\ a Cornerstone of the Digital Single Market \\ References \\ 30 The Future of Machine Learning and Predictive Analytics \\ References \\ 31 How Banks Can Better Serve Their Customers Through Artificial Techniques \\ References \\ Part VIII Fin- and Insuretech \\ 32 Preface: Fin- and Insuretech \\ References \\ 33 Fintech Hypes, but Wealthy Internet Savvy Investors Prefer to Stay Hybrid \\ References \\ 34 The Digital Insurance \\ Facing Customer Expectation in a Rapidly Changing World", } @Book{Zheng:2021:BIM, editor = "Zibin Zheng and Hong-Ning Dai and Jiajing Wu", booktitle = "Blockchain Intelligence: Methods, Applications and Challenges", title = "Blockchain Intelligence: Methods, Applications and Challenges", publisher = "Springer Singapore", address = "Singapore", pages = "ix + 166", year = "2021", DOI = "https://doi.org/10.1007/978-981-16-0127-9", ISBN = "981-16-0126-7 (print), 981-16-0127-5 (e-book), 981-16-0128-3 (print), 981-16-0129-1 (print)", ISBN-13 = "978-981-16-0126-2 (print), 978-981-16-0127-9 (e-book), 978-981-16-0128-6 (print), 978-981-16-0129-3 (print)", LCCN = "Q335 .B56 2021", bibdate = "Wed Oct 20 10:36:04 MDT 2021", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "This book focuses on using artificial intelligence (AI) to improve blockchain ecosystems. Gathering the latest advances resulting from AI in blockchain data analytics, it also presents big data research on blockchain systems. Despite blockchain's merits of decentralisation, immutability, non-repudiation and traceability, the development of blockchain technology has faced a number of challenges, such as the difficulty of data analytics on encrypted blockchain data, poor scalability, software vulnerabilities, and the scarcity of appropriate incentive mechanisms. Combining AI with blockchain has the potential to overcome the limitations, and machine learning-based approaches may help to analyse blockchain data and to identify misbehaviours in blockchain. In addition, deep reinforcement learning methods can be used to improve the reliability of blockchain systems. This book focuses in the use of AI to improve blockchain systems and promote blockchain intelligence. It describes data extraction, exploration and analytics on representative blockchain systems such as Bitcoin and Ethereum. It also includes data analytics on smart contracts, misbehaviour detection on blockchain data, and market analysis of blockchain-based cryptocurrencies. As such, this book provides researchers and practitioners alike with valuable insights into big data analysis of blockchain data, AI-enabled blockchain systems, and applications driven by blockchain intelligence.", acknowledgement = ack-nhfb, subject = "Professional Computing; Artificial Intelligence; Data Mining and Knowledge Discovery; Software Engineering/Programming and Operating Systems", tableofcontents = "1: Overview of blockchain and smart contract \\ 2: On-chain and Off-Chain Blockchain Data Collection \\ 3: Analysis and Mining of Blockchain Transaction Network \\ 4: Intelligence Driven Optimization of Smart Contracts \\ 5: Misbehavior Detection on Blockchain Data \\ 6: Market Analysis of Blockchain-based Cryptocurrencies \\ 7: Open research problems", } @Book{Greenberg:2022:TD, author = "Andy Greenberg", booktitle = "Tracers in the Dark: the Global Hunt for the Crime Lords of Cryptocurrency", title = "Tracers in the Dark: the Global Hunt for the Crime Lords of Cryptocurrency", publisher = pub-DOUBLEDAY, address = pub-DOUBLEDAY:adr, pages = "xi + 367", year = "2022", ISBN = "0-385-54809-5 (hardcover), 0-593-31561-8 (paperback), 0-385-54810-9 (e-book)", ISBN-13 = "978-0-385-54809-0 (hardcover), , 978-0-593-31561-3 (paperback), 978-0-385-54810-6 (e-book)", LCCN = "HV6773 .G7424 2022", bibdate = "Mon Nov 14 06:00:32 MST 2022", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib", abstract = "A propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, taking once-anonymous realms of money, drugs, and violence and holding them up to the light Black markets have always thrived in the shadows of society. Increasingly, these enterprises-drug dealing, money laundering, human trafficking, terrorist funding-have found their shadows online. Digital crime lords inhabiting lawless corners of the internet have operated more freely than their analog counterparts could have ever dreamed of. At the heart of their massive conspiracies: cryptocurrency. By transacting not in dollars or pounds but in Bitcoin-a currency with anonymous ledgers, overseen by no government, beholden to no bankers-black marketeers robbed law enforcement for years of their chief method of cracking down on criminal markets, namely, following the money. But what if the centerpiece of this dark economy held a secret, fatal flaw? What if their currency wasn't so cryptic after all? An investigator using the right mixture of technical wizardry, financial forensics, and old-fashioned persistence could crack open an entire world of crime. Men with No Names is a story of crime and consequences unlike any other. With unprecedented access to the major players in federal law enforcement and private industry, veteran cybersecurity reporter Andy Greenberg tells an astonishing saga of criminal empires built and destroyed. He introduces an IRS agent with a defiant streak; a Bitcoin-tracing Danish entrepreneur; and a colorful ensemble of hardboiled agents and prosecutors as they delve deep into the crypto-underworld. The result is a thrilling, globe-spanning story of dirty cops, drug bazaars, sex-abuse rings, and the biggest takedown of an online narcotics market in the history of the internet. This is a cat-and-mouse story and a tale of a technological one-upmanship that's utterly of our time. Filled with canny maneuvering and shocking twists, it answers a provocative question: How would some of the world's most brazen criminals behave if they were sure they could never get caught?", acknowledgement = ack-nhfb, subject = "Computer crimes; Commercial crimes; Cryptocurrencies; Transnational crime; Criminalit{\'e} informatique; Infractions {\'e}conomiques; Cryptomonnaie; Criminalit{\'e} internationale; cryptocurrencies.; SOCIAL SCIENCE / Sociology / General.; Commercial crimes.; Computer crimes.; Cryptocurrencies.; Transnational crime.", }