Here below is the list of Most Cited Publications about ‘Proof of Work’.
Proof of Work algorithms are used by the majority of present day cryptocurrencies. Different approaches try to resist centralization by special hardware by relying on memory intensive algorithms. Proof-of-work can also be applied to cloud computing and non-blockchain applications, such as reducing spam in email. Generally, these are highly mathematical and game-theoretic scenarios. Some algorithms try to combine proof of work with more useful work, such as finding prime numbers.
Last updated November 19th, 2017.
Most Cited ‘Proof of Work’ Publications
- “Bitcoin: A peer-to-peer electronic cash system“. S Nakamoto. 2008. academia.edu . 2024 cites.
- “Authenticated routing for ad hoc networks“. K Sanzgiri, D LaFlamme, B Dahill…. 2005. ieeexplore.ieee.org IEEE Journal on …. 367 cites.
- “Hashcash-a denial of service counter-measure“. A Back. 2002. sunsite.icm.edu.pl . 354 cites.
- “Majority is not enough: Bitcoin mining is vulnerable“. I Eyal, EG Sirer. 2014. Springer International conference on financial cryptography and …. 345 cites.
- “Quantitative analysis of the full bitcoin transaction graph“. D Ron, A Shamir. 2013. Springer … Conference on Financial Cryptography and Data …. 308 cites.
- “Bitter to better—how to make bitcoin a better currency“. S Barber, X Boyen, E Shi, E Uzun. 2012. Springer International Conference on Financial …. 307 cites.
- “An analysis of anonymity in the bitcoin system“. F Reid, M Harrigan. 2013. Springer Security and privacy in social networks. 297 cites.
- “Zerocoin: Anonymous distributed e-cash from bitcoin“. I Miers, C Garman, M Green…. 2013. ieeexplore.ieee.org Security and Privacy (SP) …. 293 cites.
- “Fighting spam on social web sites: A survey of approaches and future challenges“. P Heymann, G Koutrika…. 2007. ieeexplore.ieee.org IEEE Internet …. 288 cites.
- “Filtering spam with behavioral blacklisting“. A Ramachandran, N Feamster, S Vempala. 2007. dl.acm.org Proceedings of the 14th …. 275 cites.
- “Moderately hard, memory-bound functions“. M Abadi, M Burrows, M Manasse…. 2005. dl.acm.org ACM Transactions on …. 273 cites.
- “An empirical study of spam traffic and the use of DNS black lists“. J Jung, E Sit. 2004. dl.acm.org Proceedings of the 4th ACM SIGCOMM conference on …. 268 cites.
- “Legal violence: Immigration law and the lives of Central American immigrants“. C Menjívar, L Abrego. 2012. journals.uchicago.edu American Journal of Sociology. 252 cites.
- “Ethereum: A secure decentralised generalised transaction ledger“. G Wood. 2014. cryptopapers.net Ethereum Project Yellow Paper. 237 cites.
- “Zerocash: Decentralized anonymous payments from bitcoin“. EB Sasson, A Chiesa, C Garman…. 2014. ieeexplore.ieee.org Security and Privacy …. 235 cites.
- “Security threats in cloud computing“. FB Shaikh, S Haider. 2011. ieeexplore.ieee.org Internet technology and secured …. 230 cites.
- “Incentive-aware routing in DTNs“. U Shevade, HH Song, L Qiu…. 2008. ieeexplore.ieee.org Network Protocols, 2008 …. 229 cites.
- “Self-assembly of metal nanocrystals on ultrathin oxide for nonvolatile memory applications“. C Lee, J Meteer, V Narayanan, EC Kan. 2005. Springer Journal of Electronic Materials. 224 cites.
- “Information propagation in the bitcoin network“. C Decker, R Wattenhofer. 2013. ieeexplore.ieee.org Peer-to-Peer Computing (P2P) …. 218 cites.
- “Evaluating user privacy in bitcoin“. E Androulaki, GO Karame, M Roeschlin…. 2013. Springer … Conference on Financial …. 217 cites.
- “The session initiation protocol (SIP) and spam“. J Rosenberg, C Jennings. 2008. rfc-editor.org . 209 cites.
- “Establishing the Genuinity of Remote Computer Systems.“. R Kennell, LH Jamieson. 2003. static.usenix.org USENIX Security Symposium. 201 cites.
- “Sok: Research perspectives and challenges for bitcoin and cryptocurrencies“. J Bonneau, A Miller, J Clark…. 2015. ieeexplore.ieee.org Security and Privacy …. 200 cites.
- “Portcullis: protecting connection setup from denial-of-capability attacks“. B Parno, D Wendlandt, E Shi, A Perrig…. 2007. dl.acm.org ACM SIGCOMM …. 197 cites.
- “Bitcoin: Economics, technology, and governance“. R Böhme, N Christin…. 2015. American Economic Association The Journal of …. 195 cites.
- “The Bitcoin Backbone Protocol: Analysis and Applications.“. JA Garay, A Kiayias, N Leonardos. 2015. eprint.iacr.org EUROCRYPT (2). 187 cites.
- “Proofs of work and bread pudding protocols“. M Jakobsson, A Juels. 1999. Springer Secure Information Networks. 176 cites.
- “RE: Reliable Email.“. S Garriss, M Kaminsky, MJ Freedman, B Karp…. 2006. usenix.org NSDI. 170 cites.
- “Bounds on information exchange for Byzantine agreement“. D Dolev, R Reischuk. 1985. dl.acm.org Journal of the ACM (JACM). 167 cites.
- “Methods, apparatus and systems for chronicling the activities of field technicians“. S Nielsen, C Chambers, J Farr. 2012. Google Patents US Patent App. 13/465,524. 166 cites.
- “Beware the middleman: Empirical analysis of Bitcoin-exchange risk“. T Moore, N Christin. 2013. Springer … Conference on Financial Cryptography and Data …. 162 cites.
- “From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again“. N Bitansky, R Canetti, A Chiesa, E Tromer. 2012. dl.acm.org Proceedings of the 3rd …. 160 cites.
- “The economics of Bitcoin mining, or Bitcoin in the presence of adversaries“. JA Kroll, IC Davey, EW Felten. 2013. thebitcoin.fr Proceedings of WEIS. 157 cites.
- “The regularisation of unauthorized migrants: Literature survey and country case studies“. A Levinson. 2005. compas.ox.ac.uk . 157 cites.
- “Time and work tracker“. GR Skinner, MG Lehman. 1997. Google Patents US Patent 5,696,702. 155 cites.
- “Optimal mechanism design and money burning“. JD Hartline, T Roughgarden. 2008. dl.acm.org Proceedings of the fortieth annual ACM …. 149 cites.
- “Using uncleanliness to predict future botnet addresses“. MP Collins, TJ Shimeall, S Faber, J Janies…. 2007. dl.acm.org Proceedings of the 7th …. 145 cites.
- “On bitcoin and red balloons“. M Babaioff, S Dobzinski, S Oren, A Zohar. 2012. dl.acm.org Proceedings of the 13th ACM …. 142 cites.
- “Modeling and preventing phishing attacks“. M Jakobsson. 2005. researchgate.net Financial Cryptography. 142 cites.
- “Information security economics–and beyond“. R Anderson, T Moore. 2007. Springer Advances in cryptology-crypto 2007. 136 cites.
- “Peer-to-peer systems“. R Rodrigues, P Druschel. 2010. dl.acm.org Communications of the ACM. 131 cites.
- “Proof-of-work proves not to work; version 0.2“. B Laurie, R Clayton. 2004. pdfs.semanticscholar.org Workshop on Economics and …. 130 cites.
- “Double-spending fast payments in bitcoin“. GO Karame, E Androulaki, S Capkun. 2012. dl.acm.org … of the 2012 ACM conference on …. 129 cites.
- “Brown-collar jobs: Occupational segregation and earnings of recent-immigrant Latinos“. L Catanzarite. 2000. journals.sagepub.com Sociological Perspectives. 123 cites.
- “Dismantling the poverty trap: Disability policy for the twenty‐first century“. DC Stapleton, BL O’day, GA Livermore…. 2006. Wiley Online Library The Milbank …. 122 cites.
- “Decentralizing privacy: Using blockchain to protect personal data“. G Zyskind, O Nathan. 2015. ieeexplore.ieee.org Security and Privacy Workshops (SPW …. 119 cites.
- “Proofs of work and bread pudding protocols“. BM Jakobsson, A Juels. 2008. Google Patents US Patent 7,356,696. 117 cites.
- “On scaling decentralized blockchains“. K Croman, C Decker, I Eyal, AE Gencer, A Juels…. 2016. Springer … Conference on Financial …. 114 cites.
- “Bitcoin-NG: A Scalable Blockchain Protocol.“. I Eyal, AE Gencer, EG Sirer, R Van Renesse. 2016. usenix.org NSDI. 114 cites.
- “Network time and work tracker“. GR Skinner, MG Lehman. 1999. Google Patents US Patent 5,963,914. 112 cites.
- “Proof nets for unit-free multiplicative-additive linear logic“. DJD Hughes, RJ Van Glabbeek. 2005. dl.acm.org ACM Transactions on Computational …. 111 cites.
- “The taxation of undocumented immigrants: Separate, unequal, and without representation“. FJ Lipman. 2006. HeinOnline Harv. Latino L. Rev.. 111 cites.
- “An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies.“. F Li, MH Hsieh. 2006. pdfs.semanticscholar.org CEAS. 109 cites.
- “An analysis of anonymity in the bitcoin system“. F Reid, M Harrigan. 2011. ieeexplore.ieee.org Privacy, Security, Risk and Trust (PASSAT …. 107 cites.
- “Cryptographic primitives enforcing communication and storage complexity“. P Golle, S Jarecki, I Mironov. 2002. Springer International Conference on Financial …. 104 cites.
- “A next-generation smart contract and decentralized application platform“. V Buterin. 2014. weusecoins.com white paper. 104 cites.
- “Secure computation without authentication“. B Barak, R Canetti, Y Lindell, R Pass…. 2005. Springer Annual International …. 100 cites.
- “Welfare trends in Sweden: balancing the books for the 1990s“. J Palme, A Bergmark, O Backman…. 2002. journals.sagepub.com … of European Social …. 100 cites.
- “Mixcoin: Anonymity for Bitcoin with accountable mixes“. J Bonneau, A Narayanan, A Miller, J Clark…. 2014. Springer … Conference on Financial …. 99 cites.
- “Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing“. MH Sqalli, F Al-Haidari, K Salah. 2011. ieeexplore.ieee.org Utility and Cloud Computing …. 98 cites.
- “Transformations between uml and owl-s“. R Grønmo, MC Jaeger, H Hoff. 2005. Springer European Conference on Model Driven …. 98 cites.
- ““When perhaps the real problem is money itself!”: the practical materiality of Bitcoin“. B Maurer, TC Nelms, L Swartz. 2013. Taylor & Francis Social Semiotics. 97 cites.
- “Structure and anonymity of the bitcoin transaction graph“. M Ober, S Katzenbeisser, K Hamacher. 2013. mdpi.com Future internet. 93 cites.
- “James Joyce“. HS Gorman. 1974. Octagon Press, Limited . 93 cites.
- “Countering DoS attacks with stateless multipath overlays“. A Stavrou, AD Keromytis. 2005. dl.acm.org Proceedings of the 12th ACM conference on …. 93 cites.
- “How to play almost any mental game over the net-concurrent composition via super-polynomial simulation“. B Barak, A Sahai. 2005. ieeexplore.ieee.org … of Computer Science, 2005. FOCS 2005 …. 92 cites.
- “The Midwives Book“. J Sharp. 1985. revolvy.com . 92 cites.
- “NetFence: preventing internet denial of service from inside out“. X Liu, X Yang, Y Xia. 2010. dl.acm.org ACM SIGCOMM Computer Communication …. 90 cites.
- “Free riding in peer-to-peer networks“. M Karakaya, I Korpeoglu, Ö Ulusoy. 2009. ieeexplore.ieee.org IEEE Internet computing. 89 cites.
- “Deanonymisation of clients in Bitcoin P2P network“. A Biryukov, D Khovratovich, I Pustogarov. 2014. dl.acm.org Proceedings of the 2014 ACM …. 88 cites.
- “Guaranteeing access in spite of distributed service-flooding attacks“. VD Gligor. 2003. Springer Security Protocols Workshop. 86 cites.
- “Blockchains and smart contracts for the internet of things“. K Christidis, M Devetsikiotis. 2016. ieeexplore.ieee.org IEEE Access. 86 cites.
- “Monte Carlo estimates of the mass gap of the O (2) and O (3) spin models in 1+ 1 dimensions“. G Fox, R Gupta, O Martin, S Otto. 1982. Elsevier Nuclear Physics B. 86 cites.
- “Welfare and the unemployment crisis: Sweden in the 1990s“. Å Bergmark, J Palme. 2003. Wiley Online Library International Journal of Social Welfare. 85 cites.
- “Innovations in payment technologies and the emergence of digital currencies“. R Ali, J Barrdear, R Clews, J Southgate. 2014. papers.ssrn.com . 83 cites.
- “The economics of Bitcoin and similar private digital currencies“. GP Dwyer. 2015. Elsevier Journal of Financial Stability. 83 cites.
- “Transition: The History of a Literary Era 1927-1938“. D McMillan. 1975. Calder Publications Limited . 82 cites.
- “Analysis of hashrate-based double spending“. M Rosenfeld. 2014. arxiv.org arXiv preprint arXiv:1402.2009. 80 cites.
- “Enabling blockchain innovations with pegged sidechains“. A Back, M Corallo, L Dashjr, M Friedenbach…. 2014. blockstream.ca URL: http://www …. 80 cites.
- “The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication“. M Vukolić. 2015. Springer International Workshop on Open Problems in Network …. 79 cites.
- “A unified framework for concurrent security: universal composability from stand-alone non-malleability“. H Lin, R Pass, M Venkitasubramaniam. 2009. dl.acm.org … of the forty-first annual ACM …. 79 cites.
- “Permacoin: Repurposing bitcoin work for data preservation“. A Miller, A Juels, E Shi, B Parno…. 2014. ieeexplore.ieee.org Security and Privacy (SP) …. 76 cites.
- “The effect of stock spam on financial markets“. R Böhme, T Holz. 2006. papers.ssrn.com . 76 cites.
- “Making nursing visible? Gender, technology and the care plan as script“. M Wilson. 2002. emeraldinsight.com Information Technology & People. 76 cites.
- “Ppcoin: Peer-to-peer crypto-currency with proof-of-stake“. S King, S Nadal. 2012. peerco.in self-published paper, August. 75 cites.
- “Analyzing interaction between distributed denial of service attacks and mitigation technologies“. WJ Blackert, DM Gregg, AK Castner…. 2003. ieeexplore.ieee.org … and exposition, 2003 …. 75 cites.
- “Secure high-rate transaction processing in bitcoin“. Y Sompolinsky, A Zohar. 2015. Springer … Conference on Financial Cryptography and Data …. 75 cites.
- “Do the rich get richer? An empirical analysis of the Bitcoin transaction network“. D Kondor, M Pósfai, I Csabai, G Vattay. 2014. journals.plos.org PloS one. 75 cites.
- “Mitigating distributed denial of service attacks with dynamic resource pricing“. D Mankins, R Krishnan, C Boyd, J Zao…. 2001. ieeexplore.ieee.org … , 2001. ACSAC 2001 …. 74 cites.
- “Keeping denial-of-service attackers in the dark“. G Badishi, A Herzberg, I Keidar. 2007. ieeexplore.ieee.org IEEE Transactions on …. 74 cites.
- “Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.“. G Karame, E Androulaki…. 2012. users.encs.concordia.ca IACR Cryptology ePrint …. 74 cites.
- “CoinShuffle: Practical decentralized coin mixing for Bitcoin“. T Ruffing, P Moreno-Sanchez, A Kate. 2014. Springer European Symposium on …. 72 cites.
- “The miner’s dilemma“. I Eyal. 2015. ieeexplore.ieee.org Security and Privacy (SP), 2015 IEEE Symposium on. 71 cites.
- “Secure distributed human computation“. C Gentry, Z Ramzan, S Stubblebine. 2005. dl.acm.org … of the 6th ACM conference on …. 70 cites.
- “Bitcoin mining and its energy footprint“. KJ O’Dwyer, D Malone. 2014. IET . 68 cites.
- “Propagating trust in ad-hoc networks for reliable routing“. AA Pirzada, A Datta, C McDonald. 2004. ieeexplore.ieee.org Wireless Ad-Hoc Networks …. 65 cites.
- “The Illlusory Provisions of Sanctions: The Immigration Reform and Control Act of 1986“. CM Espenoza. 1994. HeinOnline Geo. Immigr. LJ. 64 cites.
- “Is Bitcoin a decentralized currency?“. A Gervais, G Karame, S Capkun, V Capkun. 2014. syssec.ethz.ch IEEE security & privacy. 64 cites.
- “Blockchain technology: principles and applications“. M Pilkington. 2015. papers.ssrn.com Browser Download This Paper. 63 cites.
- “SoK: secure messaging“. N Unger, S Dechand, J Bonneau, S Fahl…. 2015. ieeexplore.ieee.org Security and Privacy …. 62 cites.
- “Commitcoin: Carbon dating commitments with bitcoin“. J Clark, A Essex. 2012. Springer Financial Cryptography and Data Security. 61 cites.
- “Towards Reliable Storage of 56-bit Secrets in Human Memory.“. J Bonneau, SE Schechter. 2014. usenix.org USENIX Security Symposium. 61 cites.
- “Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake [Extended Abstract] y“. I Bentov, C Lee, A Mizrahi, M Rosenfeld. 2014. dl.acm.org ACM SIGMETRICS …. 60 cites.
- “Enhancing bitcoin security and performance with strong consistency via collective signing“. EK Kogias, P Jovanovic, N Gailly, I Khoffi…. 2016. usenix.org 25th USENIX Security …. 60 cites.
- “Decentralized blockchain technology and the rise of lex cryptographia“. A Wright, P De Filippi. 2015. papers.ssrn.com . 60 cites.
- “Optimal selfish mining strategies in bitcoin“. A Sapirshtein, Y Sompolinsky, A Zohar. 2016. Springer International Conference on …. 59 cites.
- “Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks“. S VivinSandar, S Shenai. 2012. search.proquest.com International Journal of Computer …. 58 cites.
- “Tachograph for motor vehicles“. G Mutz. 1987. Google Patents US Patent 4,644,368. 57 cites.
- “Secure outsourced garbled circuit evaluation for mobile devices“. H Carter, B Mood, P Traynor…. 2016. content.iospress.com Journal of Computer …. 57 cites.
- “The sudden removal of user fees: the perspective of a frontline manager in Burundi“. M Nimpagaritse, MP Bertone. 2011. academic.oup.com Health policy and planning. 56 cites.
- “Hidden struggles: spaces of power and resistance in informal work in urban Argentina“. R Whitson. 2007. journals.sagepub.com Environment and Planning A. 56 cites.
- “Application of the random forest method in studies of local lymph node assay based skin sensitization data“. S Li, A Fedorowicz, H Singh…. 2005. ACS Publications Journal of chemical …. 55 cites.
- “Diverticular disease of the colon: a 1968 view.“. I Williams. 1968. ncbi.nlm.nih.gov Gut. 54 cites.
- “Proofs of space“. S Dziembowski, S Faust, V Kolmogorov…. 2015. Springer Annual Cryptology …. 54 cites.
- “How many undocumented: The numbers behind the US-Mexico migration talks“. BL Lowell, R Suro. 2002. researchgate.net . 54 cites.
- “Time and work tracker with hardware abstraction layer“. GR Skinner, MG Lehman. 2001. Google Patents US Patent 6,185,514. 54 cites.
- “Quantification of overload injuries to thoracolumbar vertebrae and discs in persons exposed to heavy physical exertions or vibration at the workplace Part II …“. P Brinckmann, W Frobin, M Biggemann, M Tillotson…. 1998. Elsevier Clinical …. 54 cites.
- “Outsourced proofs of retrievability“. F Armknecht, JM Bohli, GO Karame, Z Liu…. 2014. dl.acm.org Proceedings of the 2014 …. 53 cites.
- “Towards next-generation botnets“. R Hund, M Hamann, T Holz. 2008. ieeexplore.ieee.org Computer Network Defense, 2008 …. 52 cites.
- “Inclusive block chain protocols“. Y Lewenberg, Y Sompolinsky, A Zohar. 2015. Springer International Conference on …. 51 cites.
- “ScrambleSuit: A polymorphic network protocol to circumvent censorship“. P Winter, T Pulls, J Fuss. 2013. dl.acm.org Proceedings of the 12th ACM workshop on …. 50 cites.
- “Cryptocurrencies without proof of work“. I Bentov, A Gabizon, A Mizrahi. 2016. Springer International Conference on Financial …. 49 cites.
- “Vuvuzela: Scalable private messaging resistant to traffic analysis“. J Van Den Hooff, D Lazar, M Zaharia…. 2015. dl.acm.org Proceedings of the 25th …. 49 cites.
- “Blockstack: A Global Naming and Storage System Secured by Blockchains.“. M Ali, JC Nelson, R Shea, MJ Freedman. 2016. usenix.org USENIX Annual Technical …. 48 cites.
- “A moving target DDoS defense mechanism“. H Wang, Q Jia, D Fleck, W Powell, F Li…. 2014. Elsevier Computer …. 48 cites.
- “Hourglass schemes: how to prove that cloud files are encrypted“. M Van Dijk, A Juels, A Oprea, RL Rivest…. 2012. dl.acm.org Proceedings of the …. 48 cites.
- “On the security and performance of proof of work blockchains“. A Gervais, GO Karame, K Wüst, V Glykantzis…. 2016. dl.acm.org Proceedings of the …. 47 cites.
- “Stubborn mining: Generalizing selfish mining and combining with an eclipse attack“. K Nayak, S Kumar, A Miller, E Shi. 2016. ieeexplore.ieee.org Security and Privacy …. 47 cites.
- “Distributed Quota Enforcement for Spam Control.“. M Walfish, JD Zamfirescu, H Balakrishnan, DR Karger…. 2006. usenix.org NSDI. 46 cites.
- “An economic response to unsolicited communication“. T Loder, M Van Alstyne, R Wash. 2006. degruyter.com Advances in Economic Analysis & …. 46 cites.
- “Analysis of the blockchain protocol in asynchronous networks“. R Pass, L Seeman, A Shelat. 2017. Springer … International Conference on the Theory and …. 45 cites.
- “Proactively Accountable Anonymous Messaging in Verdict.“. H Corrigan-Gibbs, DI Wolinsky, B Ford. 2013. usenix.org USENIX Security Symposium. 45 cites.
- “The problem with Bitcoin“. D Bradbury. 2013. Elsevier Computer Fraud & Security. 45 cites.
- “Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money“. GW Peters, E Panayi. 2016. Springer Banking Beyond Banks and Money. 45 cites.
- “Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency“. J Becker, D Breuker, T Heide, J Holler…. 2013. Springer The Economics of …. 44 cites.
- “Decentralized Anonymous Credentials.“. C Garman, M Green, I Miers. 2014. internetsociety.org NDSS. 44 cites.
- “Case study of the miner botnet“. D Plohmann, E Gerhards-Padilla. 2012. ieeexplore.ieee.org Cyber Conflict (CYCON) …. 43 cites.
- “The stellar consensus protocol: A federated model for internet-level consensus“. D Mazieres. 2015. weusecoins.com Stellar Development Foundation. 43 cites.
- “Controlling spam through lightweight currency“. D Turner, D Havey. 2004. pdfs.semanticscholar.org Proceedings of the Hawaii …. 43 cites.
- “Misbehavior in bitcoin: A study of double-spending and accountability“. GO Karame, E Androulaki, M Roeschlin…. 2015. dl.acm.org ACM Transactions on …. 43 cites.
- “Toward a secure batch verification with group testing for VANET“. CC Lee, YM Lai. 2013. Springer Wireless networks. 43 cites.
- “When More Security Equals Less Workplace Safety: Reconsidering US Laws That Disadvantage Unauthorized Workers“. B Lyon. 2003. HeinOnline U. Pa. J. Lab. & Emp. L.. 43 cites.
- “Why countries continue to consider regularization“. A Levinson. 2005. Migration Information Source. 42 cites.
- “Centrally banked cryptocurrencies“. G Danezis, S Meiklejohn. 2015. arxiv.org arXiv preprint arXiv:1505.06895. 42 cites.
- “Toxic Reproductive and Genetic Hazards in the Workplace: Challenging the Myths of the Tort and Workers’ Compensation Systems“. JM Eggen. 1993. HeinOnline Workers’ Comp. L. Rev.. 42 cites.
- “Productivity space of information security in an extension of the Gordon-Loeb’s InvestmentModel“. K Matsuura. 2009. Springer Managing Information Risk and the Economics of …. 41 cites.
- “Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.“. D Stebila, L Kuppusamy, J Rangasamy, C Boyd…. 2011. Springer CT-RSA. 41 cites.
- “Game-theoretic analysis of DDoS attacks against Bitcoin mining pools“. B Johnson, A Laszka, J Grossklags, M Vasek…. 2014. Springer … Conference on Financial …. 41 cites.
- “The weakest failure detector for message passing set-agreement“. C Delporte-Gallet, H Fauconnier, R Guerraoui…. 2008. Springer International Symposium …. 41 cites.
- “Bitcoin over Tor isn’t a good idea“. A Biryukov, I Pustogarov. 2015. ieeexplore.ieee.org Security and Privacy (SP), 2015 …. 41 cites.
- “spow: On-demand cloud-based eddos mitigation mechanism“. SH Khor, A Nakao. 2009. falleneth.com HotDep (Fifth Workshop on Hot Topics in System …. 40 cites.
- “Anonymity of bitcoin transactions“. M Möser. 2013. wi.uni-muenster.de Münster bitcoin conference. 40 cites.
- “Corporate governance and blockchains“. D Yermack. 2017. academic.oup.com Review of Finance. 40 cites.
- “Bitcoin: Technical background and data analysis“. AI Badev, M Chen. 2014. papers.ssrn.com . 40 cites.
- “A secure sharding protocol for open blockchains“. L Luu, V Narayanan, C Zheng, K Baweja…. 2016. dl.acm.org Proceedings of the …. 40 cites.
- “Where Is Current Research on Blockchain Technology?—A Systematic Review“. J Yli-Huumo, D Ko, S Choi, S Park, K Smolander. 2016. journals.plos.org PloS one. 40 cites.
- “Proof of Work can Work.“. D Liu, LJ Camp. 2006. ai2-s2-pdfs.s3.amazonaws.com WEIS. 39 cites.
- “Occupational issues of allergic contact dermatitis“. KE Andersen. 2003. Springer … archives of occupational and environmental health. 39 cites.
- “Towards a theory of trust in networks of humans and computers“. V Gligor, JM Wing. 2011. Springer Security Protocols XIX. 39 cites.
- “Catena: A memory-consuming password-scrambling framework“. C Forler, S Lucks, J Wenzel. 2013. pdfs.semanticscholar.org . 39 cites.
- “Can welfare reform make disability disappear?“. R Galvin. 2004. Wiley Online Library Australian Journal of Social Issues. 39 cites.
- “The security cost of cheap user interaction“. R Böhme, J Grossklags. 2011. dl.acm.org Proceedings of the 2011 workshop on New …. 39 cites.
- “Systems and methods for protecting against denial of service attacks“. WC Feng, E Kaiser. 2012. Google Patents US Patent 8,321,955. 38 cites.
- “Bitcoin is memory“. WJ Luther, J Olson. 2013. papers.ssrn.com . 38 cites.
- “Architecture of the Hyperledger blockchain fabric“. C Cachin. 2016. pdfs.semanticscholar.org Workshop on Distributed Cryptocurrencies and …. 38 cites.
- “Motag: Moving target defense against internet denial of service attacks“. Q Jia, K Sun, A Stavrou. 2013. ieeexplore.ieee.org Computer Communications and …. 38 cites.
- “Primed: community-of-interest-based ddos mitigation“. P Verkaik, O Spatscheck, J Van der Merwe…. 2006. dl.acm.org Proceedings of the …. 38 cites.
- “Do libertarians dream of electric coins? The material embeddedness of Bitcoin“. H Karlstrøm. 2014. Taylor & Francis Distinktion: Scandinavian Journal of Social Theory. 37 cites.
- “The role of gender in user resistance and information systems failure“. M Wilson, D Howcroft. 2000. Springer … and social perspectives on information technology. 37 cites.
- “Unconditional welfare benefits and the principle of reciprocity“. S Segall. 2005. journals.sagepub.com Politics, philosophy & economics. 36 cites.
- “The hunting of the SNARK“. N Bitansky, R Canetti, A Chiesa, S Goldwasser…. 2017. Springer Journal of …. 36 cites.
- “Enhancing ZRTP by using Computational Puzzles.“. H Hlavacs, WN Gansterer, H Schabauer, J Zottl…. 2008. jucs.org J. UCS. 36 cites.
- “Adapting workers’ compensation to the special problems of occupational disease“. L Locke. 1985. HeinOnline Harv. Envtl. L. Rev.. 35 cites.
- “To Hash or Not to Hash Again?(In) Differentiability Results for H 2 and HMAC.“. Y Dodis, T Ristenpart, JP Steinberger, S Tessaro. 2012. Springer CRYPTO. 35 cites.
- “Demystifying incentives in the consensus computer“. L Luu, J Teutsch, R Kulkarni, P Saxena. 2015. dl.acm.org Proceedings of the 22nd ACM …. 35 cites.
- “Halting password puzzles“. X Boyen. 2007. static.usenix.org Proc. Usenix Security. 35 cites.
- “Primecoin: Cryptocurrency with prime number proof-of-work“. S King. 2013. bravenewcoin.com July 7th. 34 cites.
- “Proofs of space: When space is of the essence“. G Ateniese, I Bonacina, A Faonio, N Galesi. 2014. Springer International Conference on …. 34 cites.
- “R-Chain: A Self-Maintained Reputation Management System in P2P Networks.“. L Liu, S Zhang, KD Ryu, P Dasgupta. 2004. cactus.eas.asu.edu ISCA PDCS. 34 cites.
- “The Plight of the Targeted Attacker in a World of Scale.“. C Herley. 2010. fbiic.gov WEIS. 34 cites.
- “The market for cryptocurrencies“. LH White. 2015. HeinOnline Cato J.. 34 cites.
- “About the relation between psycho-analytic training and psycho-analytic therapy“. M Grotjahn. 1954. search.proquest.com The International journal of psycho-analysis. 34 cites.
- “Botcoin: Monetizing Stolen Cycles.“. DY Huang, H Dharmdasani, S Meiklejohn, V Dave…. 2014. cs.ucl.ac.uk NDSS. 34 cites.
- “DoS: Fighting fire with fire“. M Walfish, H Balakrishnan, D Karger, S Shenker. 2005. conferences.sigcomm.org . 33 cites.
- “Bitcoin mining pools: A cooperative game theoretic analysis“. Y Lewenberg, Y Bachrach, Y Sompolinsky…. 2015. dl.acm.org Proceedings of the …. 33 cites.
- “The dual receiver cryptosystem and its applications“. T Diament, HK Lee, AD Keromytis, M Yung. 2004. dl.acm.org Proceedings of the 11th …. 33 cites.
- “Low-Cost Client Puzzles Based on Modular Exponentiation.“. G Karame, S Capkun. 2010. Springer ESORICS. 33 cites.
- “Blockchain technology: Beyond bitcoin“. M Crosby, P Pattanayak, S Verma…. 2016. scet.berkeley.edu Applied …. 33 cites.
- “Speed-Security Tradeoffs in Blockchain Protocols.“. A Kiayias, G Panagiotakos. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint …. 33 cites.
- “Bitcoin meets strong consistency“. C Decker, J Seidel, R Wattenhofer. 2016. dl.acm.org Proceedings of the 17th International …. 32 cites.
- “Tampering with the delivery of blocks and transactions in bitcoin“. A Gervais, H Ritzdorf, GO Karame…. 2015. dl.acm.org Proceedings of the 22nd …. 32 cites.
- “Sybilcontrol: practical sybil defense with computational puzzles“. F Li, P Mittal, M Caesar, N Borisov. 2012. dl.acm.org … of the seventh ACM workshop on …. 32 cites.
- “Regularization programs for undocumented migrants“. S Sunderhaus. 2007. ceeol.com Migration Letters. 32 cites.
- “A domain-specific language for modelling security objectives in a business process models of soa applications“. M Saleem, J Jaafar, M Hassan. 2012. researchgate.net AISS. 31 cites.
- “Spacecoin: A cryptocurrency based on proofs of space“. S Park, K Pietrzak, J Alwen, G Fuchsbauer, P Gazi. 2015. pdfs.semanticscholar.org . 31 cites.
- “Trust transfer: Encouraging self-recommendations without sybil attack“. JM Seigneur, A Gray, CD Jensen. 2005. Springer iTrust. 31 cites.
- “Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology)“. M Mainelli, M Smith. 2015. the-blockchain.com The Journal of Financial Perspectives. 31 cites.
- “The bitcoin P2P network“. JAD Donet, C Pérez-Sola…. 2014. Springer … Conference on Financial …. 31 cites.
- “ChoiceNet: toward an economy plane for the Internet“. T Wolf, J Griffioen, KL Calvert, R Dutta…. 2014. dl.acm.org ACM SIGCOMM …. 31 cites.
- “Labor law after legalization“. MJ Wishnie. 2007. HeinOnline Minn. L. Rev.. 31 cites.
- “Financial exclusion in Latin America—or the social costs of not banking the urban poor“. TM Solo. 2008. journals.sagepub.com Environment and Urbanization. 31 cites.
- “On Bitcoin as a public randomness source.“. J Bonneau, J Clark, S Goldfeder. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint …. 31 cites.
- “Test martingales, Bayes factors and p-values“. G Shafer, A Shen, N Vereshchagin, V Vovk. 2011. JSTOR Statistical Science. 31 cites.
- “Multi layer approach to defend ddos attacks caused by spam“. D Nagamalai, C Dhinakaran…. 2007. ieeexplore.ieee.org … Engineering, 2007. MUE’ …. 31 cites.
- “Virtual office environment“. O Tsatalos, S Karamanlakis. 2006. Google Patents US Patent App. 11/450,875. 31 cites.
- “Occupationally related disorders“. DB Baker, PJ Landrigan. 1990. Elsevier Medical Clinics of North America. 31 cites.
- “Statistical methods for stochastic differential equations“. M Kessler, A Lindner, M Sorensen. 2012. books.google.com . 30 cites.
- “Coinparty: Secure multi-party mixing of bitcoins“. JH Ziegeldorf, F Grossmann, M Henze…. 2015. dl.acm.org Proceedings of the 5th …. 30 cites.
- “The blockchain as a software connector“. X Xu, C Pautasso, L Zhu, V Gramoli…. 2016. ieeexplore.ieee.org … (WICSA), 2016 13th …. 30 cites.
- “Formalizing anonymous blacklisting systems“. R Henry, I Goldberg. 2011. ieeexplore.ieee.org Security and Privacy (SP), 2011 IEEE …. 30 cites.
- “Secure content access and replication in pure p2p networks“. E Palomar, JME Tapiador, JC Hernandez-Castro…. 2008. Elsevier Computer …. 29 cites.
- “Bitcoin: under the hood“. A Zohar. 2015. dl.acm.org Communications of the ACM. 28 cites.
- “Caught in a web: Immigrant women and domestic violence“. DL Jang. 1994. HeinOnline Clearinghouse Rev.. 28 cites.
- “The cryptoanarchists’ answer to cash“. ME Peck. 2012. ieeexplore.ieee.org IEEE Spectrum. 28 cites.
- “Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems“. T Swanson. 2015. pdfs.semanticscholar.org Report, available online, Apr. 28 cites.
- “Transparent data deduplication in the cloud“. F Armknecht, JM Bohli, GO Karame…. 2015. dl.acm.org Proceedings of the 22nd …. 28 cites.
- “Egalitarianism and exclusion: US guest worker programs and a non-subordination approach to the labor-based admission of nonprofessional foreign national“. AJ Elmore. 2006. HeinOnline Geo. Immigr. LJ. 28 cites.
- “Tendermint: Consensus without mining“. J Kwon. 2014. cdn.relayto.com Draft v. 0.6, fall. 27 cites.
- “Email traffic: a quantitative snapshot.“. R Clayton. 2007. cl.cam.ac.uk CEAS. 27 cites.
- “Spam zombies from outer space“. J Aycock, N Friess. 2006. dspace.ucalgary.ca . 27 cites.
- “Model-based adaptive dos attack mitigation“. C Barna, M Shtern, M Smit, V Tzerpos…. 2012. dl.acm.org Proceedings of the 7th …. 27 cites.
- “Fairnet-How to counter free riding in peer-to-peer data structures“. E Buchmann, K Bohm. 2004. Springer Lecture Notes in Computer Science. 26 cites.
- “Time-lock puzzles from randomized encodings“. N Bitansky, S Goldwasser, A Jain, O Paneth…. 2016. dl.acm.org Proceedings of the …. 26 cites.
- “Migratory modernity and the cosmology of consumption in Côte d’Ivoire“. S Newell. 2005. books.google.com Migration and economy: Global and local dynamics. 26 cites.
- “A study of geolocation databases“. Y Shavitt, N Zilberman. 2010. arxiv.org arXiv preprint arXiv:1005.5674. 26 cites.
- “The false premises and promises of Bitcoin“. BP Hanley. 2013. arxiv.org arXiv preprint arXiv:1312.2048. 26 cites.
- “On the privacy provisions of bloom filters in lightweight bitcoin clients“. A Gervais, S Capkun, GO Karame…. 2014. dl.acm.org Proceedings of the 30th …. 26 cites.
- “Bitcoin: a first assessment“. D Woo. 2013. static.elitesecurity.org . 26 cites.
- “Survey on new solutions against distributed denial of service attacks“. C SUN, B Liu. 2009. en.cnki.com.cn Acta Electronica Sinica. 25 cites.
- “Hybrid consensus: Efficient consensus in the permissionless model“. R Pass, E Shi. 2017. drops.dagstuhl.de LIPIcs-Leibniz International Proceedings in …. 25 cites.
- “Cumulative Injury of Disease Claims: An Attempt to Define Employers’ Liability for Workers’ Compensation“. J LaDou, LE Mulryan, KJ McCarthy. 1980. HeinOnline Am. JL & Med.. 25 cites.
- “Interdisciplinary writing“. D Hamilton. 1980. JSTOR College English. 25 cites.
- “Bearing Witness to Economic Injustices of Undocumented Immigrant Families: A New Class of Undeserving Poor“. FJ Lipman. 2006. HeinOnline Nev. LJ. 25 cites.
- “Difficulty control for blockchain-based consensus systems“. D Kraft. 2016. Springer Peer-to-Peer Networking and Applications. 25 cites.
- “An analytical model for DDoS attacks and defense“. Y Xiang, W Zhou, Z Li. 2006. ieeexplore.ieee.org Computing in the Global Information …. 25 cites.
- “Blockchain-the Gateway to Trust-Free Cryptographic Transactions.“. R Beck, JS Czepluch, N Lollike, S Malone. 2016. aisel.aisnet.org ECIS. 25 cites.
- “The regulation of respiration during muscular work“. USV EULER, G Liljestrand. 1946. Wiley Online Library Acta Physiologica. 24 cites.
- “Near field communications handbook“. SA Ahson, M Ilyas. 2011. books.google.com . 24 cites.
- “Time-Lock Puzzles in the Random Oracle Model.“. M Mahmoody, T Moran, SP Vadhan. 2011. Springer CRYPTO. 24 cites.
- “On power splitting games in distributed computation: The case of bitcoin pooled mining“. L Luu, R Saha, I Parameshwaran…. 2015. ieeexplore.ieee.org … (CSF), 2015 IEEE …. 24 cites.
- “Peer-to-Peer systems and applications“. K Wehrle, R Steinmetz. 2005. researchgate.net LNCS. 24 cites.
- “Enforcing collaboration in peer-to-peer routing services“. T Moreton, A Twigg. 2003. Springer iTrust. 24 cites.
- “Medrec: Using blockchain for medical data access and permission management“. A Azaria, A Ekblaw, T Vieira…. 2016. ieeexplore.ieee.org Open and Big Data (OBD …. 24 cites.
- “Economics and security resource page“. R Anderson. 2005. cl.cam.ac.uk undated Web page. As of November. 24 cites.
- “Proof-of-Work“. B Laurie, R Clayton. 2004. Proves Not to Work” WEAS. 23 cites.
- “Re: Bitcoin P2P e-cash paper“. S Nakamoto. 2008. users.encs.concordia.ca The Cryptography Mailing List. 23 cites.
- “Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial Cryptography and Data …. 23 cites.
- “Towards Denial-of-Service-Resilient Key Agreement Protocols.“. D Stebila, B Ustaoglu. 2009. Springer ACISP. 23 cites.
- “Towards mitigation of low and slow application ddos attacks“. M Shtern, R Sandel, M Litoiu, C Bachalo…. 2014. ieeexplore.ieee.org … (IC2E), 2014 IEEE …. 23 cites.
- “A Survey of Attacks on Ethereum Smart Contracts (SoK)“. N Atzei, M Bartoletti, T Cimoli. 2017. Springer … Conference on Principles of Security and …. 23 cites.
- “Central American immigrant workers and legal violence in Phoenix, Arizona“. C Menjívar. 2013. Springer Latino Studies. 23 cites.
- “Preventing massive automated access to web resources“. A Basso, S Sicco. 2009. Elsevier computers & security. 23 cites.
- “The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology“. W Mougayar. 2016. books.google.com . 23 cites.
- “Ouroboros: A provably secure proof-of-stake blockchain protocol“. A Kiayias, A Russell, B David, R Oliynykov. 2017. Springer Annual International …. 22 cites.
- “Towards risk scoring of Bitcoin transactions“. M Möser, R Böhme, D Breuker. 2014. Springer International Conference on Financial …. 22 cites.
- “Fruitchains: A fair blockchain“. R Pass, E Shi. 2017. dl.acm.org Proceedings of the ACM Symposium on Principles of …. 22 cites.
- “Home media atomizer: remote sharing of home content-without semi-trusted proxies“. P Belimpasakis, S Moloney, V Stirbu…. 2008. ieeexplore.ieee.org IEEE Transactions …. 22 cites.
- “An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.“. HA Kalodner, M Carlsten, P Ellenbogen…. 2015. pdfs.semanticscholar.org WEIS. 22 cites.
- “Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions“. A Miller, A Kosba, J Katz, E Shi. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …. 22 cites.
- “Payment-Based Email.“. DA Turner, N Deng. 2004. cse.csusb.edu SNPD. 22 cites.
- “Rhetoric of enrollment and acts of resistance: information technology as text“. M Wilson. 2003. Springer Global and organizational discourse about information …. 22 cites.
- “Queue Management as a DoS counter-measure?“. D Boteanu, JM Fernandez, J McHugh, J Mullins. 2007. Springer ISC. 22 cites.
- “The role of RFID in the mobile phone“. JCL Calvet. 2005. c.unik.no Telektronikk. 22 cites.
- “New Kids on the Blockchain: How Bitcoin’s Technology Could Reinvent the Stock Market“. L Lee. 2015. HeinOnline Hastings Bus. LJ. 22 cites.
- “Equihash: Asymmetric proof-of-work based on the generalized birthday problem“. A Biryukov, D Khovratovich. 2017. ledgerjournal.org Ledger. 21 cites.
- “Blockchain thinking: The brain as a dac (decentralized autonomous organization)“. M Swan. 2015. the-blockchain.com Texas Bitcoin Conference. 21 cites.
- “Beyond Cryptocurrencies-A Taxonomy of Decentralized Consensus Systems“. F Glaser, L Bezzenberger. 2015. papers.ssrn.com . 21 cites.
- “An adaptive authentication protocol based on reputation for peer-to-peer system“. H Lee, K Kim. 2003. caislab.kaist.ac.kr … on Cryptography and Information Security (SCIS). 21 cites.
- “Corda: An Introduction“. RG Brown, J Carlyle, I Grigg, M Hearn. 2016. researchgate.net R3 CEV, August. 21 cites.
- “Reconstructing Hash Reversal based Proof of Work Schemes.“. J Green, J Juen, O Fatemieh, R Shankesi…. 2011. usenix.org LEET. 20 cites.
- “Bitmessage: A peer-to-peer message authentication and delivery system“. J Warren. 2012. dropbox.curry.com white paper (27 November 2012), https://bitmessage …. 20 cites.
- “A TorPath to TorCoin: proof-of-bandwidth altcoins for compensating relays“. M Ghosh, M Richardson, B Ford, R Jansen. 2014. dtic.mil . 20 cites.
- “The case for public work“. W Feng, E Kaiser. 2007. ieeexplore.ieee.org IEEE Global Internet Symposium, 2007. 20 cites.
- “An efficient confidentiality-preserving proof of ownership for deduplication“. L González-Manzano, A Orfila. 2015. Elsevier Journal of Network and Computer …. 20 cites.
- “Publicly verifiable proofs of sequential work“. M Mahmoody, T Moran, S Vadhan. 2013. dl.acm.org … of the 4th conference on Innovations …. 20 cites.
- “Security when people matter: structuring incentives for user behavior“. R Wash, JK MacKie-Mason. 2007. dl.acm.org … of the ninth international conference on …. 20 cites.
- “Introduction to bitcoins: a pseudo-anonymous electronic currency system“. S Martins, Y Yang. 2011. dl.acm.org Proceedings of the 2011 Conference of the Center …. 20 cites.
- “Keeping denial-of-service attackers in the dark“. G Badishi, A Herzberg, I Keidar. 2005. Springer International Symposium on Distributed …. 20 cites.
- “Tradeoff cryptanalysis of memory-hard functions“. A Biryukov, D Khovratovich. 2014. Springer International Conference on the Theory and …. 20 cites.
- “Analyzing the Deployment of Bitcoin’s P2P Network under an AS-level Perspective“. S Feld, M Schönfeld, M Werner. 2014. Elsevier Procedia Computer Science. 20 cites.
- “Economics of blockchain“. S Davidson, P De Filippi, J Potts. 2016. papers.ssrn.com . 20 cites.
- “DaaS: DDoS mitigation-as-a-service“. SH Khor, A Nakao. 2011. ieeexplore.ieee.org Applications and the Internet (SAINT), 2011 …. 20 cites.
- “SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.“. L Luu, V Narayanan, K Baweja, C Zheng…. 2015. weusecoins.com IACR Cryptology …. 20 cites.
- “A guided tour puzzle for denial of service prevention“. M Abliz, T Znati. 2009. ieeexplore.ieee.org Computer Security Applications Conference …. 20 cites.
- “Moving Beyond Bitcoin to an Endogenous Theory of Decentralized Ledger Technology Regulation: An Initial Proposal“. CL Reyes. 2016. papers.ssrn.com . 20 cites.
- “Digital currencies, decentralized ledgers, and the future of central banking“. M Raskin, D Yermack. 2016. nber.org . 20 cites.
- “Some simple economics of the blockchain“. C Catalini, JS Gans. 2016. nber.org . 20 cites.
- “The Use of Calculations in Petrology: A study for students“. FF Grout. 1926. journals.uchicago.edu The Journal of Geology. 20 cites.
- “Introduction to distributed hash tables“. E Rescorla, N Resonance. 2006. ietf.org IETF-65 Technical Plenary. 19 cites.
- “The legal status of online currencies: are bitcoins the future?“. R Bollen. 2013. papers.ssrn.com Browser Download This Paper. 19 cites.
- “Trusting records: is Blockchain technology the answer?“. VL Lemieux, VL Lemieux. 2016. emeraldinsight.com Records Management Journal. 19 cites.
- “Hindering false event dissemination in VANETs with proof-of-work mechanisms“. E Palomar, JM de Fuentes, AI González-Tablas…. 2012. Elsevier … Research Part C …. 18 cites.
- “On the feasibility of a censorship resistant decentralized name system“. M Wachs, M Schanzenbach, C Grothoff. 2014. Springer Foundations and Practice of …. 18 cites.
- “Resource inflation threats to denial of service countermeasures“. R Shankesi, O Fatemieh, CA Gunter. 2010. ideals.illinois.edu . 18 cites.
- “When bitcoin mining pools run dry“. A Laszka, B Johnson, J Grossklags. 2015. Springer International Conference on Financial …. 18 cites.
- “Formal modelling and automatic detection of resource exhaustion attacks“. B Groza, M Minea. 2011. dl.acm.org Proceedings of the 6th ACM Symposium on …. 17 cites.
- “Challenges in protecting tor hidden services from botnet abuse“. N Hopper. 2014. Springer … Conference on Financial Cryptography and Data …. 17 cites.
- “Bitcoin and beyond“. A Extance. 2015. nature.com Nature. 17 cites.
- “An integrated approach to cryptographic mitigation of denial-of-service attacks“. J Rangasamy, D Stebila, C Boyd, JG Nieto. 2011. dl.acm.org Proceedings of the 6th ACM …. 17 cites.
- “Can currency competition work?“. J Fernández-Villaverde, D Sanches. 2016. nber.org . 17 cites.
- “Using client puzzles to mitigate distributed denial of service attacks in the tor anonymous routing environment“. NA Fraser, DJ Kelly, RA Raines…. 2007. ieeexplore.ieee.org … , 2007. ICC’07. IEEE …. 17 cites.
- “Questions related to Bitcoin and other Informational Money“. JA Bergstra, K de Leeuw. 2013. arxiv.org arXiv preprint arXiv:1305.5956. 17 cites.
- “IRCA’s antidiscrimination provisions: what went wrong?“. R Perotti. 1992. JSTOR International Migration Review. 17 cites.
- “Analyzing Internet e-mail date-spoofing“. MT Banday, FA Mir, JA Qadri, NA Shah. 2011. Elsevier Digital Investigation. 17 cites.
- “The IoT electric business model: Using blockchain technology for the internet of things“. Y Zhang, J Wen. 2017. Springer Peer-to-Peer Networking and Applications. 17 cites.
- “The impact and potential of blockchain on securities transaction lifecycle“. M Mainelli, A Milne. 2016. papers.ssrn.com . 17 cites.
- “Bootstrapping Communications into an Anti-Censorship System.“. P Lincoln, I Mason, PA Porras, V Yegneswaran…. 2012. usenix.org FOCI. 16 cites.
- “The politics of cryptography: Bitcoin and the ordering machines“. Q DuPont. 2014. hplusmagazine.com Journal of Peer Production. 16 cites.
- “Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.“. A Biryukov, D Dinu, D Khovratovich. 2015. eprint.iacr.org IACR Cryptology ePrint Archive. 16 cites.
- “Pow-based distributed cryptography with no trusted setup“. M Andrychowicz, S Dziembowski. 2015. Springer Annual Cryptology Conference. 16 cites.
- “Is disruptive blockchain technology the future of financial services?“. LJ Trautman. 2016. papers.ssrn.com . 16 cites.
- “mod_kaPoW: Mitigating DoS with transparent proof-of-work“. E Kaiser. 2007. dl.acm.org Proceedings of the 2007 ACM CoNEXT conference. 15 cites.
- “Blackcoin’s proof-of-stake protocol v2“. P Vasin. 2014. blackcoin.co . 15 cites.
- “Bitcoin mining acceleration and performance quantification“. JA Dev. 2014. ieeexplore.ieee.org Electrical and Computer Engineering (CCECE), 2014 …. 15 cites.
- “A survey of P2P Network security“. L Washbourne. 2015. arxiv.org arXiv preprint arXiv:1504.01358. 15 cites.
- “Spam-I-am: A Proposal for Spam Control using Distributed Quota Management“. H Balakrishnan, D Karger. 2004. researchgate.net 3rd ACM SIGCOMM Workshop on Hot …. 15 cites.
- “Performance Benchmarking of BPEL Engines: A Comparison Framework, Status Quo Evaluation and Challenges.“. C Röck, S Harrer, G Wirtz. 2014. ai2-s2-pdfs.s3.amazonaws.com SEKE. 15 cites.
- “Demands and anxiety: The effects of the new immigration law“. CL Wolchok. 1997. HeinOnline Hum. Rts.. 15 cites.
- “Building trust in storage outsourcing: Secure accounting of utility storage“. V Kher, Y Kim. 2007. ieeexplore.ieee.org … Distributed Systems, 2007. SRDS 2007. 26th …. 15 cites.
- “Method and apparatus for using client puzzles to protect against denial-of-service attacks“. CL Schuba, E Guttman. 2005. Google Patents US Patent 6,944,663. 15 cites.
- “Smart contracts, Bitcoin bots, and consumer protection“. J Fairfield. 2014. litigation-essentials.lexisnexis.com Wash. & Lee L. Rev. Online. 15 cites.
- “Cryptofinance“. CR Harvey. 2016. papers.ssrn.com Browser Download This Paper. 15 cites.
- “On the complexity of scrypt and proofs of space in the parallel random oracle model“. J Alwen, B Chen, C Kamath, V Kolmogorov…. 2016. Springer … Conference on the …. 15 cites.
- “Cryptocurrencies as a disruption? empirical findings on user adoption and future potential of bitcoin and co“. AW Baur, J Bühler, M Bick, CS Bonorden. 2015. Springer … on e-Business, e-Services and …. 15 cites.
- “Cryptocurrency value formation: An empirical study leading to a cost of production model for valuing bitcoin“. AS Hayes. 2017. Elsevier Telematics and Informatics. 15 cites.
- “XFT: Practical Fault Tolerance beyond Crashes.“. S Liu, P Viotti, C Cachin, V Quéma, M Vukolic. 2016. usenix.org OSDI. 15 cites.
- “Undocumented Workers and the NLRA:” Hoffman Plastic Compounds” and Beyond“. O Baird. 2003. JSTOR The Labor Lawyer. 15 cites.
- “Collaborative use of individual search histories“. A Komlodi, WG Lutters. 2007. academic.oup.com Interacting with Computers. 15 cites.
- “Throttling Outgoing SPAM for Webmail Services.“. Z Zhong, K Huang, K Li. 2005. pdfs.semanticscholar.org CEAS. 15 cites.
- “Poverty, Social Exclusion and Ethnicity in Serbia and Montenegro: The Case of the Roma“. C Bodewig, A Sethi. 2005. www-wds.worldbank.org . 15 cites.
- “Криптовалюта как феномен современной информационной экономики: проблемы теоретического осмысления“. ДС Вахрушев, ОВ Железов. 2014. cyberleninka.ru Интернет-журнал Науковедение. 15 cites.
- “An (almost) constant-effort solution-verification proof-of-work protocol based on merkle trees“. F Coelho. 2008. Springer Lecture Notes in Computer Science. 14 cites.
- “It Will Cost You Nothing to’Kill’a Proof-of-Stake Crypto-Currency“. N Houy. 2014. papers.ssrn.com Browser Download This Paper. 14 cites.
- “Can we stabilize the price of a Cryptocurrency?: Understanding the design of Bitcoin and its potential to compete with Central Bank money“. M Iwamura, Y Kitamura, T Matsumoto, K Saito. 2014. papers.ssrn.com . 14 cites.
- “Exploring the Bitcoin Network.“. A Baumann, B Fabian, M Lischke. 2014. academia.edu WEBIST (1). 14 cites.
- “Efficient and secure decentralized network size estimation“. N Evans, B Polot, C Grothoff. 2012. Springer NETWORKING 2012. 14 cites.
- “Bitcoin will bite the dust“. K Dowd, M Hutchinson. 2015. HeinOnline Cato J.. 14 cites.
- “Bootstrapping trust in online dating: Social verification of online dating profiles“. G Norcie, E De Cristofaro, V Bellotti. 2013. Springer International Conference on Financial …. 14 cites.
- “A security authentication method based on trust evaluation in VANETs“. A Zhou, J Li, Q Sun, C Fan, T Lei, F Yang. 2015. Springer EURASIP Journal on Wireless …. 14 cites.
- “A robust mechanism for defending distributed denial of service attacks on web servers“. J Sen. 2011. arxiv.org arXiv preprint arXiv:1103.3333. 14 cites.
- “TorWard: Discovery of malicious traffic over Tor“. Z Ling, J Luo, K Wu, W Yu, X Fu. 2014. ieeexplore.ieee.org INFOCOM, 2014 Proceedings …. 14 cites.
- “Fastpass: Providing first-packet delivery“. D Wendlandt, DG Andersen, A Perrig. 2006. repository.cmu.edu . 14 cites.
- “The rise of’Class Apartheid’in accessing secondary schools in Sandton, Gauteng“. J Bell, TM McKay. 2011. journals.co.za Southern African Review of Education with …. 14 cites.
- “Blockchain for IoT security and privacy: The case study of a smart home“. A Dorri, SS Kanhere, R Jurdak…. 2017. ieeexplore.ieee.org Pervasive Computing …. 14 cites.
- “On reverse-engineering S-Boxes with hidden design criteria or structure“. A Biryukov, L Perrin. 2015. Springer Annual Cryptology Conference. 14 cites.
- “An agri-food supply chain traceability system for China based on RFID & blockchain technology“. F Tian. 2016. ieeexplore.ieee.org Service Systems and Service Management (ICSSSM) …. 14 cites.
- “Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on Dependable …. 14 cites.
- “Distributed Cryptography Based on the Proofs of Work.“. M Andrychowicz, S Dziembowski. 2014. eprint.iacr.org IACR Cryptology ePrint Archive. 13 cites.
- “A simulation model for analysis of attacks on the bitcoin peer-to-peer network“. T Neudecker, P Andelfinger…. 2015. ieeexplore.ieee.org … Management (IM), 2015 …. 13 cites.
- “Internet protocol adoption: Learning from Bitcoin“. R Böhme. 2013. informationsecurity.uibk.ac.at IAB Workshop on Internet Technology …. 13 cites.
- “Deregulating the Market for Legal Services in the European Community: Freedom of Establishment and Freedom to Provide Services for EC Lawyers in the Federal …“. H Eidenmüller. 1990. Wiley Online Library The Modern Law Review. 13 cites.
- “Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins“. T Ruffing, A Kate, D Schröder. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …. 13 cites.
- “Controlling Spam by Secure Internet Content Selection.“. A Herzberg. 2004. Springer SCN. 13 cites.
- “When your sensor earns money: exchanging data for cash with Bitcoin“. D Wörner, T von Bomhard. 2014. dl.acm.org Proceedings of the 2014 ACM International …. 13 cites.
- “The blockchain anomaly“. C Natoli, V Gramoli. 2016. ieeexplore.ieee.org … and Applications (NCA), 2016 IEEE 15th …. 13 cites.
- “Hiding the input-size in secure two-party computation“. Y Lindell, K Nissim, C Orlandi. 2013. Springer … Conference on the Theory and Application …. 13 cites.
- “Taking a bit out of crime: Bitcoin and cross-border tax evasion“. T Slattery. 2014. HeinOnline Brook. J. Int’l L.. 13 cites.
- “Research and challenges on bitcoin anonymity“. J Herrera-Joancomartí. 2015. Springer Data Privacy Management, Autonomous …. 13 cites.
- “On Trees, Chains and Fast Transactions in the Blockchain.“. A Kiayias, G Panagiotakos. 2016. eprint.iacr.org IACR Cryptology ePrint Archive. 13 cites.
- “Bitcoin: bubble or blockchain“. P Godsiff. 2015. Springer Agent and Multi-Agent Systems: Technologies and …. 13 cites.
- “A multi-faceted approach towards spam-resistible mail“. MW Wu, Y Huang, SK Lu, Y Chen…. 2005. ieeexplore.ieee.org … 2005. Proceedings. 11th …. 13 cites.
- “Cuckoo Cycle: a memory-hard proof-of-work system.“. J Tromp. 2014. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology ePrint Archive. 12 cites.
- “Work Stealing for Time-constrained Octree Exploration: Application to Real-time 3D Modeling.“. LP Soares, C Ménier, B Raffin, JL Roch. 2007. moais.imag.fr EGPGV. 12 cites.
- “Progress in cryptology—AFRICACRYPT 2008“. S Vaudenay. 2008. Springer First international conference on cryptology in Africa …. 12 cites.
- “Blockchain contract: A complete consensus using blockchain“. H Watanabe, S Fujimura, A Nakadaira…. 2015. ieeexplore.ieee.org … (GCCE), 2015 IEEE …. 12 cites.
- “Cryptocurrency and the Problem of Intermediation“. C Harwick. 2015. papers.ssrn.com . 12 cites.
- “Anti-vamming trust enforcement in peer-to-peer voip networks“. N Banerjee, S Saklikar, S Saha. 2006. dl.acm.org … of the 2006 international conference on …. 12 cites.
- “Route bazaar: Automatic interdomain contract negotiation“. I Castro, A Panda, B Raghavan, S Shenker, S Gorinsky. 2015. usenix.org . 12 cites.
- “Harvesting verifiable challenges from oblivious online sources“. JA Halderman, B Waters. 2007. dl.acm.org Proceedings of the 14th ACM conference on …. 12 cites.
- “Teaching Spam and Spyware at the University of C@ 1g4ry.“. J Aycock. 2006. academia.edu CEAS. 12 cites.
- “The Next Generation of E-Verify: Getting Employment Verification Right“. DM Meissner, MR Rosenblum. 2009. ww.migrationinformation.net . 12 cites.
- “SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam“. H Tu, A Doupé, Z Zhao, GJ Ahn. 2016. ieeexplore.ieee.org Security and Privacy (SP) …. 12 cites.
- “Negative influences of the disability compensation system: perspectives for the clinician“. JL Seres, RI Newman. 1983. thieme-connect.com Seminars in Neurology. 12 cites.
- “Formal verification of smart contracts: Short paper“. K Bhargavan, A Delignat-Lavaud, C Fournet…. 2016. dl.acm.org Proceedings of the …. 12 cites.
- “A cultural analysis of information technology offshore outsourcing: an exercise in multi-sited ethnography of virtual work“. T Eaton. 2011. digitalcommons.wayne.edu . 12 cites.
- “Controlled virtual resource access to mitigate economic denial of sustainability (edos) attacks against cloud infrastructures“. ZA Baig, F Binbeshr. 2013. ieeexplore.ieee.org … and Big Data (CloudCom-Asia), 2013 …. 12 cites.
- “Blockchain thinking: The brain as a decentralized autonomous corporation [commentary]“. M Swan. 2015. ieeexplore.ieee.org IEEE Technology and Society Magazine. 12 cites.
- “Experimental evaluations of expert and non-expert computer users’ mental models of security risks“. LJ Camp, F Asgharpour, D Liu…. 2007. researchgate.net Proceedings of WEIS …. 12 cites.
- “Denial of service: prevention, modelling and detection“. J Smith. 2007. eprints.qut.edu.au . 12 cites.
- “Smart contract templates: foundations, design landscape and research directions“. CD Clack, VA Bakshi, L Braine. 2016. arxiv.org arXiv preprint arXiv:1608.00771. 12 cites.
- “CORDON–a taxonomy of internet censorship resistance strategies“. T Elahi, I Goldberg. 2012. pdfs.semanticscholar.org University of Waterloo CACR. 12 cites.
- “Bitcoin’s security model revisited“. Y Sompolinsky, A Zohar. 2016. arxiv.org arXiv preprint arXiv:1605.09193. 12 cites.
- “Solidus: An incentive-compatible cryptocurrency based on permissionless Byzantine consensus“. I Abraham, D Malkhi, K Nayak, L Ren…. 2016. arxiv.org arXiv preprint arXiv …. 12 cites.
- “Mirage: Towards deployable DDoS defense for web applications“. P Mittal, D Kim, YC Hu, M Caesar. 2011. arxiv.org arXiv preprint arXiv:1110.1060. 12 cites.
- “Managerial challenges of publicly funded principal investigators“. JA Cunningham, P O’Reilly, C O’Kane…. 2015. inderscienceonline.com International …. 12 cites.
- “Bitcoin and the future of digital payments“. WJ Luther. 2015. papers.ssrn.com Browser Download This Paper. 12 cites.
- “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies“. M Apostolaki, A Zohar…. 2016. pdfs.semanticscholar.org arXiv preprint arXiv …. 12 cites.
- “Discovering bitcoin’s public topology and influential nodes“. A Miller, J Litton, A Pachulski, N Gupta, D Levin…. 2015. allquantor.at et al.. 12 cites.
- “Do you get what you pay for? using proof-of-work functions to verify performance assertions in the cloud“. F Koeppe, J Schneider. 2010. ieeexplore.ieee.org Cloud Computing Technology and …. 11 cites.
- “Performance comparison of executing fast transactions in bitcoin network using verifiable code execution“. P Singh, BR Chandavarkar, S Arora…. 2013. ieeexplore.ieee.org … (ADCONS), 2013 2nd …. 11 cites.
- “Is Bitcoin the Only Cryptocurrency in the Town? Economics of Cryptocurrency and Friedrich A. Hayek“. M Iwamura, Y Kitamura, T Matsumoto. 2014. papers.ssrn.com . 11 cites.
- “A novel DDoS attack defending framework with minimized bilateral damages“. Y Chen, WS Ku, K Sakai…. 2010. ieeexplore.ieee.org … Conference (CCNC), 2010 …. 11 cites.
- “Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.“. H Narasimhan, V Varadarajan, CP Rangan. 2010. Springer ISPEC. 11 cites.
- “When cryptocurrencies mine their own business“. J Teutsch, S Jain, P Saxena. 2016. Springer … on Financial Cryptography and Data Security. 11 cites.
- “The blockchain and kudos: A distributed system for educational record, reputation and reward“. M Sharples, J Domingue. 2016. Springer European Conference on Technology …. 11 cites.
- “Blockchain challenges and opportunities: A survey“. Z Zheng, S Xie, HN Dai, H Wang. 2016. hongning.org Work Pap. 11 cites.
- “Why buy when you can rent?“. J Bonneau. 2016. Springer … Conference on Financial Cryptography and Data …. 11 cites.
- “Blockchain and its coming impact on financial services“. K Fanning, DP Centers. 2016. Wiley Online Library Journal of Corporate Accounting & …. 11 cites.
- “twister-a P2P microblogging platform“. M Freitas. 2013. arxiv.org arXiv preprint arXiv:1312.7152. 11 cites.
- “A secure distance-based RFID identification protocol with an off-line back-end database“. P Peris-Lopez, A Orfila, E Palomar…. 2012. Springer Personal and Ubiquitous …. 11 cites.
- “A bit of a problem: national and extraterritorial regulation of virtual currency in the age of financial disintermediation“. I Pflaum, E Hateley. 2013. HeinOnline Geo. J. Int’l L.. 11 cites.
- “Ledgers and Law in the Blockchain“. Q DuPont, B Maurer. 2015. iqdupont.com Kings Review (23 June 2015) http://kingsreview …. 11 cites.
- “Notes on a displaced womanhood: Albanian refugee women in Southern Italy“. DL Zinn, A Rivera. 1995. scholarworks.dlib.indiana.edu Anthropology of East Europe …. 11 cites.
- “To bit or not to bit?[Bitcoin cryptocurrency]“. C Evans-Pughe, A Novikov, V Vitaliev. 2014. IET Engineering & Technology. 11 cites.
- “Beyond bitcoin enabling smart government using blockchain technology“. S Ølnes. 2016. Springer … Conference on Electronic Government and the …. 11 cites.
- “Homomorphic payment addresses and the pay-to-contract protocol“. I Gerhardt, T Hanke. 2012. arxiv.org arXiv preprint arXiv:1212.3257. 11 cites.
- “Augur: a decentralized, open-source platform for prediction markets“. J Peterson, J Krug. 2015. arxiv.org arXiv preprint arXiv:1501.01042. 11 cites.
- “How to Build Time-Lock Encryption.“. T Jager. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 11 cites.
- “Game of detections: how are security vulnerabilities discovered in the wild?“. M Hafiz, M Fang. 2016. Springer Empirical Software Engineering. 11 cites.
- “Pay as you browse: microcomputations as micropayments in web-based services“. GO Karame, A Francillon, S Čapkun. 2011. dl.acm.org Proceedings of the 20th …. 11 cites.
- “The honeynet quarantine: reducing collateral damage caused by early intrusion response“. B Todtmann, S Riebach…. 2007. ieeexplore.ieee.org Networking, 2007. ICN’07 …. 11 cites.
- “The other side of the coin: User experiences with bitcoin security and privacy“. K Krombholz, A Judmayer, M Gusenbauer…. 2016. Springer … Conference on Financial …. 11 cites.
- “DDoS attacks in service clouds“. S Alqahtani, RF Gamble. 2015. ieeexplore.ieee.org System Sciences (HICSS), 2015 48th …. 11 cites.
- “Exponential Memory-Bound Functions for Proof of Work Protocols.“. F Coelho. 2005. cri.ensmp.fr IACR Cryptology ePrint Archive. 10 cites.
- “Proof-of-work as anonymous micropayment: Rewarding a Tor relay“. A Biryukov, I Pustogarov. 2015. Springer … on Financial Cryptography and Data Security. 10 cites.
- “Preventing network denial of service attacks using an accumulated proof-of-work approach“. M Baugher. 2009. Google Patents US Patent 7,600,255. 10 cites.
- “kapow webmail: Effective disincentives against spam“. W Feng. 2010. Citeseer In Proc. of 7th CEAS. 10 cites.
- “Blockchain contract: Securing a blockchain applied to smart contracts“. H Watanabe, S Fujimura, A Nakadaira…. 2016. ieeexplore.ieee.org … (ICCE), 2016 IEEE …. 10 cites.
- “Secure business process modelling of SOA applications using” UML-SOA-Sec“. MQ Saleem, J Jaafar, MF Hassan. 2012. ijicic.org International Journal of Innovative …. 10 cites.
- “Denial-of-service resistance in key establishment“. J Smith, S Tritilanunt, C Boyd…. 2007. inderscienceonline.com … Journal of Wireless …. 10 cites.
- “A protocol for secure content distribution in pure p2p networks“. E Palomar, JM Estevez-Tapiador…. 2006. ieeexplore.ieee.org Database and Expert …. 10 cites.
- “Making currency inexpensive with iOwe“. D Levin, A Schulman, K LaCurts…. 2011. pdfs.semanticscholar.org Proceedings of the …. 10 cites.
- “Profit-driven abuses of virtual currencies“. DY Huang. 2013. pdfs.semanticscholar.org University of California, San Diego. 10 cites.
- “Trustworthy routing with the AODV protocol“. AA Pirzada, A Datta, C Mcdonald. 2004. ieeexplore.ieee.org … Conference, 2004. INCC …. 10 cites.
- “A taxonomy of cloud attack consequences and mitigation strategies: The Role of Access Control and Privileged Access Management“. KS Tep, B Martini, R Hunt…. 2015. ieeexplore.ieee.org Trustcom/BigDataSE/ISPA …. 10 cites.
- “Finding and counting cliques and independent sets in r-uniform hypergraphs“. R Yuster. 2006. Elsevier Information Processing Letters. 10 cites.
- “Towards a more democratic mining in bitcoins“. G Paul, P Sarkar, S Mukherjee. 2014. Springer International Conference on Information …. 10 cites.
- “Bitcoin Developer Reference“. K Okupski. 2014. enetium.com Availabl e at http://enetium. com/resources/Bitcoin. pdf. 10 cites.
- “A cloudlet-based multi-lateral resource exchange framework for mobile users“. Y Wu, L Ying. 2015. ieeexplore.ieee.org Computer Communications (INFOCOM), 2015 …. 10 cites.
- “Hiding transaction amounts and balances in bitcoin“. E Androulaki, GO Karame. 2014. Springer International Conference on Trust and …. 10 cites.
- “Certified bitcoins“. G Ateniese, A Faonio, B Magri…. 2014. Springer … Conference on Applied …. 10 cites.
- “Pseudonymous secure computation from time-lock puzzles“. J Katz, A Miller, E Shi. 2014. ai2-s2-pdfs.s3.amazonaws.com . 10 cites.
- “Towards an Agenda for Information Systems Research on Digital Currencies and Bitcoin“. GM Giaglis, KN Kypriotaki. 2014. Springer International Conference on Business …. 10 cites.
- “Disrupting governance: The new institutional economics of distributed ledger technology“. S Davidson, P De Filippi, J Potts. 2016. papers.ssrn.com . 10 cites.
- “What is bitcoin?“. D Hobson. 2013. dl.acm.org XRDS: Crossroads, The ACM Magazine for Students. 10 cites.
- “Publishing without publishers: a decentralized approach to dissemination, retrieval, and archiving of data“. T Kuhn, C Chichester, M Krauthammer…. 2015. Springer International Semantic …. 10 cites.
- “20 Professional domains: Writing as creation of economic value“. EM Jakobs, C Spinuzzi. 2014. books.google.com Handbook of writing and text production. 10 cites.
- “Privacy-aware architecture for sharing web histories“. A Tsow, C Viecco, LJ Camp. 2007. pdfs.semanticscholar.org IBM Systems Journal. 10 cites.
- “CPV: Delay-based location verification for the Internet“. AR Abdou, A Matrawy…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 10 cites.
- “Peer-to-peer security“. A Friedman, LJ Camp. 2005. pdfs.semanticscholar.org The Handbook of Information …. 10 cites.
- “mod kapow: Protecting the web with transparent proof-of-work“. E Kaiser, W Feng. 2008. ieeexplore.ieee.org INFOCOM Workshops 2008, IEEE. 9 cites.
- “The hashcash proof-of-work function“. A Back. 2003. Draft-Hashcash-back-00, Internet-Draft Created,(Jun …. 9 cites.
- “Worker’s compensation law and the compensability of mental injuries.“. KJ Merrikin, TD Overcast, BD Sales. 1982. psycnet.apa.org Health Psychology. 9 cites.
- “Issues in initializing security“. N Asokan, L Tarkkala. 2005. ieeexplore.ieee.org … , 2005. Proceedings of the Fifth IEEE …. 9 cites.
- “Attribute-based Credentials for Trust“. K Rannenberg, J Camenisch, A Sabouri. 2015. Springer Identity in the Information …. 9 cites.
- “How well can congestion pricing neutralize denial of service attacks?“. A Vulimiri, GA Agha, PB Godfrey…. 2012. dl.acm.org ACM SIGMETRICS …. 9 cites.
- “Introduction to the Special Issue on “Data management in vehicular networks”“. T Delot, S Ilarri. 2012. Pergamon . 9 cites.
- “Professional Certification: A Study of Significance.“. JM Ulmer. 2010. atmae.org Journal of industrial technology. 9 cites.
- “Retricoin: Bitcoin based on compact proofs of retrievability“. B Sengupta, S Bag, S Ruj, K Sakurai. 2016. dl.acm.org Proceedings of the 17th …. 9 cites.
- “Identity loan: The moral economy of migrant document exchange in California’s Central Valley“. S Horton. 2015. Wiley Online Library American Ethnologist. 9 cites.
- “A p2p content authentication protocol based on byzantine agreement“. E Palomar, J Estevez-Tapiador…. 2006. Springer Emerging Trends in …. 9 cites.
- “An analysis of the Bitcoin electronic cash system“. D Drainville. 2012. pdfs.semanticscholar.org … Waterloo, ON, Canada, Canada, Tech. Rep. 9 cites.
- “Using rhythmic nonces for puzzle-based dos resistance“. EM Chan, CA Gunter, S Jahid, E Peryshkin…. 2008. dl.acm.org Proceedings of the 2nd …. 9 cites.
- “Blockstack: Design and implementation of a global naming system with blockchains“. M Ali, J Nelson, R Shea, MJ Freedman. 2016. the-blockchain.com Last visited on. 9 cites.
- “Bitcoin clients“. R Skudnov. 2012. theseus.fi . 9 cites.
- “The blockchain-based digital content distribution system“. J Kishigami, S Fujimura, H Watanabe…. 2015. ieeexplore.ieee.org Big Data and Cloud …. 9 cites.
- “On trustworthiness of cpu usage metering and accounting“. M Liu, X Ding. 2010. ieeexplore.ieee.org … ), 2010 IEEE 30th International Conference on. 9 cites.
- “Double Spending Protection for E-Cash Based on Risk Management.“. P Everaere, I Simplot-Ryl, I Traoré. 2010. Springer ISC. 9 cites.
- “A Blockchain-Based Approach to Health Information Exchange Networks“. K Peterson, R Deeduvanu, P Kanjamala, K Boles. 2016. colleaga.org . 9 cites.
- “Increasing anonymity in Bitcoin“. A Saxena, J Misra, A Dhar. 2014. Springer … on Financial Cryptography and Data Security. 9 cites.
- “On non-parallelizable deterministic client puzzle scheme with batch verification modes“. Q Tang, A Jeckmans. 2010. doc.utwente.nl . 9 cites.
- “Blockchain platform for industrial Internet of Things“. A Bahga, VK Madisetti. 2016. file.scirp.org J. Softw. Eng. Appl. 9 cites.
- “A review of techniques to counter spam and spit“. A Nakulas, L Ekonomou, S Kourtesi, GP Fotis…. 2009. Springer Proceedings of the …. 9 cites.
- “On the Security and Scalability of Bitcoin’s Blockchain“. G Karame. 2016. dl.acm.org Proceedings of the 2016 ACM SIGSAC Conference on …. 9 cites.
- “A PRELIMINARY REPORT ON THE SO‐CALLED “BANNERSTONES”“. JL Baer. 1921. Wiley Online Library American Anthropologist. 9 cites.
- “The blockchain phenomenon“. J Mattila. 2016. researchgate.net … The Blockchain Phenomenon'(Berkeley Roundtable of …. 9 cites.
- “A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology“. J Herbert, A Litchfield. 2015. aut.researchgateway.ac.nz Proceedings of the 38th …. 9 cites.
- “Bitcoin‐Based Decentralized Carbon Emissions Trading Infrastructure Model“. E Al Kawasmi, E Arnautovic…. 2015. Wiley Online Library Systems …. 9 cites.
- “Scripting smart contracts for distributed ledger technology.“. PL Seijas, SJ Thompson…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …. 9 cites.
- “Towards a novel privacy-preserving access control model based on blockchain technology in IoT“. A Ouaddah, AA Elkalam, AA Ouahman. 2017. Springer Europe and MENA Cooperation …. 9 cites.
- “Offline submission with rsa time-lock puzzles“. YI Jerschow, M Mauve. 2010. ieeexplore.ieee.org Computer and Information Technology …. 9 cites.
- “Verification methods and apparatus for use in providing application services to mobile communication devices“. A Sherkin, WD Franco. 2013. Google Patents US Patent 8,386,773. 9 cites.
- “Depth-robust graphs and their cumulative memory complexity“. J Alwen, J Blocki, K Pietrzak. 2017. Springer … International Conference on the Theory and …. 9 cites.
- “An Empirical Study of Textual Key-Fingerprint Representations.“. S Dechand, D Schürmann, K Busse, Y Acar…. 2016. usenix.org USENIX Security …. 9 cites.
- “一种认证协议防御拒绝服务攻击的设计方法“. 卫剑钒, 陈钟, 段云所, 王立福. 2005. 电子学报. 9 cites.
- “Distributed consensus from proof of stake is impossible“. A Poelstra. 2014. download.wpsoftware.net . 8 cites.
- “A Provably Secure Proof-of-Stake Blockchain Protocol.“. A Kiayias, I Konstantinou, A Russell, B David…. 2016. allquantor.at IACR Cryptology …. 8 cites.
- “The economics of information security and privacy“. R Böhme. 2013. Springer . 8 cites.
- “Bitdeposit: Deterring attacks and abuses of cloud computing services through economic measures“. J Szefer, RB Lee. 2013. ieeexplore.ieee.org Cluster, Cloud and Grid Computing (CCGrid) …. 8 cites.
- “Installation of an Application Module and a Temporary Certificate“. SK Agrawal, T Foucher, WO Pereira…. 2006. Google Patents US Patent App. 11 …. 8 cites.
- “Interest cash: an application-based countermeasure against interest flooding for dynamic content in named data networking“. Z Li, J Bi. 2014. dl.acm.org Proceedings of The Ninth International Conference on …. 8 cites.
- “Feedback based Reputation on top of the Bitcoin Blockchain“. D Carboni. 2015. arxiv.org arXiv preprint arXiv:1502.01504. 8 cites.
- “Tailored security: Building nonrepudiable security service-level agreements“. T Takahashi, J Kannisto, J Harju…. 2013. ieeexplore.ieee.org IEEE Vehicular …. 8 cites.
- “The case for network witnesses“. W Feng, T Schluessler. 2008. ieeexplore.ieee.org … , 2008. NPSec 2008. 4th Workshop on. 8 cites.
- “ZombieCoin: powering next-generation botnets with bitcoin“. ST Ali, P McCorry, PHJ Lee, F Hao. 2015. Springer International Conference on Financial …. 8 cites.
- “The bitcoin backbone protocol with chains of variable difficulty“. J Garay, A Kiayias, N Leonardos. 2017. Springer Annual International Cryptology …. 8 cites.
- “Strengthening password-based authentication protocols against online dictionary attacks“. P Wang, Y Kim, V Kher, T Kwon. 2005. Springer International Conference on Applied …. 8 cites.
- “A tale of twin tech: Bitcoin and the www“. D Folkinshteyn, MM Lennon, T Reilly. 2015. papers.ssrn.com . 8 cites.
- “A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture“. P Singh, S Manickam…. 2014. ieeexplore.ieee.org … , Infocom Technologies and …. 8 cites.
- “Useful password hashing: how to waste computing cycles with style“. M Dürmuth. 2013. dl.acm.org Proceedings of the 2013 workshop on New security …. 8 cites.
- “The lone parents pilots: a qualitative evaluation of quarterly work focused interviews (12+), work search premium and in work credit“. K Ray, S Vegeris, S Brooks, V Campbell-Barr…. 2007. eprints.wmin.ac.uk . 8 cites.
- “How to vote privately using bitcoin“. Z Zhao, THH Chan. 2015. Springer International Conference on Information and …. 8 cites.
- “The Revolution will (not) be Decentralized: Blockchains“. R O’Dwyer. 2015. the-blockchain.com Commons Transition. 8 cites.
- “Digitalisation in payments: From interoperability to centralised models?“. U Milkau, J Bott. 2015. ingentaconnect.com Journal of Payments Strategy & Systems. 8 cites.
- “Bitcoin and modern alchemy: in code we trust“. J Simser. 2015. emeraldinsight.com Journal of Financial Crime. 8 cites.
- “Denial of Service Elusion (DoSE): Keeping clients connected for less“. P Wood, C Gutierrez, S Bagchi. 2015. ieeexplore.ieee.org Reliable Distributed Systems …. 8 cites.
- “Strategies and heuristics for novice instructional designers as they work with faculty content experts in a university setting“. M Liu, C Kishi, S Rhodes. 2007. igi-global.com … design: Case studies in communities of …. 8 cites.
- “Further applications of the blockchain“. G Foroglou, AL Tsilidou. 2015. researchgate.net 12th Student Conference on Managerial …. 8 cites.
- “Reconciliation and Conciliation: The Irreconcilable Dilemma of the 1965’Equal’Wage Case for Aboriginal Station Workers“. T Anthony. 2007. JSTOR Labour History. 8 cites.
- “A faster Bitcoin network“. C Stathakopoulou, C Decker…. 2015. pub.tik.ee.ethz.ch Tech. rep., ETH, Zurich …. 8 cites.
- “Protocol engineering for protection against Denial-of-Service attacks“. S Tritilanunt. 2009. eprints.qut.edu.au . 8 cites.
- “Cryptocash, cryptocurrencies, and cryptocontracts“. N Koblitz, AJ Menezes. 2016. Springer Designs, Codes and Cryptography. 8 cites.
- “Optimal Hackback“. JP Kesan, R Majuca. 2009. HeinOnline Chi.-Kent L. Rev.. 8 cites.
- “Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption.“. A Lysyanskaya, A Segal. 2010. cs.brown.edu IACR Cryptology ePrint Archive. 8 cites.
- “Economic Analysis of Cryptocurrency Backed Money Laundering.“. C Brenig, R Accorsi, G Müller. 2015. aisel.aisnet.org ECIS. 8 cites.
- “Standing on the Shoulders of Giants: Are ERP success factors relevant for EDRMS Implementation?“. TL Nguyen, P Swatman, B Fraunholz. 2008. aisel.aisnet.org BLED 2008 Proceedings. 8 cites.
- “Blockchain application and outlook in the banking industry“. Y Guo, C Liang. 2016. Springer Financial Innovation. 8 cites.
- “Social trust of virtual identities“. JM Seigneur. 2009. Springer Computing with Social Trust. 8 cites.
- “Blockchain-based secure firmware update for embedded devices in an Internet of Things environment“. B Lee, JH Lee. 2017. Springer The Journal of Supercomputing. 8 cites.
- “An empirical analysis of smart contracts: platforms, applications, and design patterns“. M Bartoletti, L Pompianu. 2017. arxiv.org arXiv preprint arXiv:1703.06322. 8 cites.
- “Helping ticketmaster: Changing the economics of ticket robots with geographic proof-of-work“. E Kaiser, W Feng. 2010. ieeexplore.ieee.org INFOCOM IEEE Conference on Computer …. 7 cites.
- “Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin“. M Bastiaan. 2015. fmt.cs.utwente.nl … -of-two-phase-proof-of-work-in-bitcoin. pdf. 7 cites.
- “Countermeasures against sybil attacks in wsn based on proofs-of-work“. M Klonowski, MB Koza. 2013. dl.acm.org Proceedings of the sixth ACM conference on …. 7 cites.
- “Proof of stake velocity: Building the social currency of the digital age“. L Ren. 2014. coss.io Self-published white paper. 7 cites.
- “Blockchain Technology: What is it good for?“. SH Ammous. 2016. papers.ssrn.com Browser Download This Paper. 7 cites.
- “Spam, phishing, and the looming challenge of big botnets“. R Hemmingsen, J Aycock, M Jacobson Jr. 2007. prism.ucalgary.ca . 7 cites.
- “Addressing Security issues in Cloud Computing“. R Dubey, MA Jamshed, X Wang, RK Batalla. 0. Technical Report, Carnegie Mellon …. 7 cites.
- “In blocks [security bitcoin]“. D Bradbury. 2015. ieeexplore.ieee.org Engineering & Technology. 7 cites.
- “Business Data Communications and Networking: A Research Perspective: A Research Perspective“. J Gutierrez. 2006. books.google.com . 7 cites.
- “Towards reference architecture for cryptocurrencies: Bitcoin architectural analysis“. I Alqassem, D Svetinovic. 2014. ieeexplore.ieee.org … IEEE and Cyber, Physical and Social …. 7 cites.
- “Trend of centralization in Bitcoin’s distributed network“. A Beikverdi, JS Song. 2015. ieeexplore.ieee.org Software Engineering, Artificial …. 7 cites.
- “Work experience in PAIS–concepts, measurements and potentials“. S Kabicher-Fuchs, S Rinderle-Ma. 2012. Springer Advanced Information Systems …. 7 cites.
- “P2P economies“. E Peserico. 2006. conferences.sigcomm.org Proceedings of the ACM Special Interest …. 7 cites.
- “An analysis of the cryptocurrency industry“. R Farell. 2015. repository.upenn.edu . 7 cites.
- “Rational zero: Economic security for zerocoin with everlasting anonymity“. C Garman, M Green, I Miers, AD Rubin. 2014. Springer International Conference on …. 7 cites.
- “Purely P2P crypto-currency with finite mini-blockchain“. JD Bruce. 2013. pdfs.semanticscholar.org . 7 cites.
- “Identification and control of work-related diseases: report of a WHO expert committee [meeting held in Geneva from 28 November to 2 December 1983]“. World Health Organization. 1985. apps.who.int . 7 cites.
- “Blockchain Double Bubble or Double Trouble?“. J Umeh. 2016. academic.oup.com ITNOW. 7 cites.
- “Contribution to the study of multiple-valued bent functions“. C Moraga, M Stankovic, RS Stankovic…. 2013. ieeexplore.ieee.org Multiple-Valued Logic …. 7 cites.
- “Identifying and Characterizing Sybils in the Tor Network.“. P Winter, R Ensafi, K Loesing, N Feamster. 2016. usenix.org USENIX Security …. 7 cites.
- “Overview of business innovations and research opportunities in blockchain and introduction to the special issue“. JL Zhao, S Fan, J Yan. 2016. jfin-swufe.springeropen.com Financial Innovation. 7 cites.
- “Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.“. B Groza, B Warinschi. 2012. Springer ISC. 7 cites.
- “Sybil-resistant pseudonymization and pseudonym change without trusted third parties“. M Florian, J Walter, I Baumgart. 2015. dl.acm.org Proceedings of the 14th ACM Workshop …. 7 cites.
- “Cost-based and time-based analysis of DoS-resistance in HIP“. S Tritilanunt, C Boyd, E Foo, JMG Nieto. 2007. dl.acm.org Proceedings of the thirtieth …. 7 cites.
- “An Analysis of Bitcoin Exchange Rates“. JB Smith. 2016. papers.ssrn.com Browser Download This Paper. 7 cites.
- “HTTPreject: handling overload situations without losing the contact to the user“. J Schneider, S Koch. 2010. ieeexplore.ieee.org Computer Network Defense (EC2ND) …. 7 cites.
- “Making contribution-aware p2p systems robust to collusion attacks using bandwidth puzzles“. MK Reiter, V Sekar, Z Zhang. 2008. reports-archive.adm.cs.cmu.edu … Report CMU-CS …. 7 cites.
- “Darkcoin: PeertoPeer CryptoCurrency with Anonymous Blockchain Transactions and an Improved ProofofWork System“. E Duffield, K Hagan. 2014. pdfs.semanticscholar.org Mar-2014 [Online]. Available: https …. 7 cites.
- “On the Memory-Hardness of Data-Independent Password-Hashing Functions.“. J Alwen, P Gazi, C Kamath, K Klein…. 2016. pdfs.semanticscholar.org IACR Cryptology …. 7 cites.
- “New kids on the block: an analysis of modern blockchains“. L Anderson, R Holz, A Ponomarev, P Rimba…. 2016. arxiv.org arXiv preprint arXiv …. 7 cites.
- “The merits of a meritocracy in open source software ecosystems“. E Eckhardt, E Kaats, S Jansen, C Alves. 2014. dl.acm.org Proceedings of the 2014 …. 7 cites.
- “Blockchain temporality: smart contract time specifiability with blocktime“. M Swan. 2016. Springer International symposium on rules and rule markup …. 7 cites.
- “Blockchain in internet of things: challenges and solutions“. A Dorri, SS Kanhere, R Jurdak. 2016. arxiv.org arXiv preprint arXiv:1608.05187. 7 cites.
- “Exploring miner evolution in bitcoin network“. L Wang, Y Liu. 2015. Springer International Conference on Passive and Active …. 7 cites.
- “Redactable blockchain–or–rewriting history in bitcoin and friends“. G Ateniese, B Magri, D Venturi…. 2017. ieeexplore.ieee.org Security and Privacy …. 7 cites.
- “Can we make email secure?“. D Bradbury. 2014. Elsevier Network Security. 7 cites.
- “A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data“. A Ekblaw, A Azaria, JD Halamka…. 2016. healthit.gov … of IEEE Open & Big Data …. 7 cites.
- “Transparency overlays and applications“. M Chase, S Meiklejohn. 2016. dl.acm.org Proceedings of the 2016 ACM SIGSAC …. 7 cites.
- “Refund attacks on Bitcoin’s Payment Protocol“. P McCorry, SF Shahandashti, F Hao. 2016. Springer International Conference on …. 7 cites.
- “Dynamic common law and technological change: the classification of Bitcoin“. S Bayern. 2014. HeinOnline Wash. & Lee L. Rev. Online. 7 cites.
- “Introduction to bitcoin“. LP Nian, DLK Chuen. 2015. books.google.com Handbook of Digital Currency: Bitcoin …. 7 cites.
- “Preventing spam in publish/subscribe“. S Tarkoma. 2006. ieeexplore.ieee.org … Workshops, 2006. ICDCS Workshops 2006. 26th …. 7 cites.
- “AnonRep: Towards Tracking-Resistant Anonymous Reputation.“. E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford. 2016. usenix.org NSDI. 7 cites.
- “The invisible politics of bitcoin: governance crisis of a decentralized infrastructure“. P De Filippi, B Loveluck. 2016. papers.ssrn.com . 7 cites.
- “Low-Back Pain Disorders as Occupational Diseases in the Czech Republic and 22 European Countries: Comparison of National Systems, Related Diagnoses and …“. A Lastovková, M Nakládalová…. 2015. search.proquest.com … European journal of …. 7 cites.
- “Emergence of FinTech and the LASIC principles“. DKC Lee, EGS Teo. 2015. papers.ssrn.com . 7 cites.
- “Can’t Buy Me Love: Funding Marriage Promotion Versus Listening to Real Needs in Breaking the Cycle of Poverty“. A Parker. 2008. HeinOnline S. Cal. Rev. L. & Soc. Just.. 7 cites.
- “Can’t Buy Me Love: Funding Marriage Promotion Versus Listening to Real Needs in Breaking the Cycle of Poverty“. A Parker. 2008. HeinOnline S. Cal. Rev. L. & Soc. Just.. 7 cites.
- “Security for medical sensor networks in mobile health systems“. I Nikolaevskiy, D Korzun…. 2014. ieeexplore.ieee.org World of Wireless, Mobile …. 7 cites.
- “Free-riding prevention in super-peer desktop grids“. P Merz, F Kolter, M Priebe. 2008. ieeexplore.ieee.org Computing in the Global …. 7 cites.
- “Congestion games with multisets of resources and applications in synthesis“. G Avni, O Kupferman, T Tamir. 2015. drops.dagstuhl.de LIPIcs-Leibniz International …. 7 cites.
- “Российский туризм в «новой реальности»: постановка проблемы“. ЕА Джанджугазова. 2015. cyberleninka.ru Российские регионы: взгляд в будущее. 7 cites.
- “О подходах в международном регулировании криптовалют (Bitcoin) в отдельных иностранных юрисдикциях“. ВА Кузнецов, АВ Якубов. 2016. cbr.ru Деньги и кредит. 7 cites.
- “Cuckoo Cycle: a memory bound graph-theoretic proof-of-work“. J Tromp. 2015. Springer … Conference on Financial Cryptography and Data …. 6 cites.
- “Overcoming reputation and proof-of-work systems in botnets“. A White, A Tickle, A Clark. 2010. ieeexplore.ieee.org Network and System Security (NSS) …. 6 cites.
- “Lazy Susan: dumb waiting as proof of work“. J Crowcroft, T Deegan, C Kreibich, R Mortier, N Weaver. 2007. cl.cam.ac.uk . 6 cites.
- “Proof of Luck: An efficient Blockchain consensus protocol“. M Milutinovic, W He, H Wu, M Kanwal. 2016. dl.acm.org … of the 1st Workshop on System …. 6 cites.
- “Identifying Legitimate Clients under Distributed Denial-of-Service Attacks“. S Simpson, AT Lindsay…. 2010. ieeexplore.ieee.org Network and System …. 6 cites.
- “Blockchain for the Internet of Things: A systematic literature review“. M Conoscenti, A Vetrò, JC De Martin. 2016. porto.polito.it . 6 cites.
- “Understanding work disability systems and intervening upstream“. E MacEachen. 2013. Springer Handbook of work disability. 6 cites.
- “Blind signatures for bitcoin transaction anonymity“. W Ladd. 2012. pdfs.semanticscholar.org . 6 cites.
- “Proofs of Space-Time and Rational Proofs of Storage.“. T Moran, I Orlov. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 6 cites.
- “Extending existing blockchains with virtualchain“. J Nelson, M Ali, R Shea…. 2016. zurich.ibm.com Workshop on Distributed …. 6 cites.
- “Work Value“. JR Kerr. 1964. journals.sagepub.com Journal of Industrial Relations. 6 cites.
- “CAD-coin versus Fedcoin“. R Garratt. 2016. r3cev.com R3 Report. 6 cites.
- “Work “Only a Woman Can DO”: The Women’s Division of the Canadian Department of Immigration and Colonization, 1920–1937“. R Mancuso. 2005. Taylor & Francis American Review of Canadian Studies. 6 cites.
- “Understanding Bitcoins: facts and questions“. BS Albuquerque, MC Callado. 2015. SciELO Brasil Revista Brasileira de Economia. 6 cites.
- “There are two sides to every coin—even to the bitcoin, a virtual currency“. MA Arias, Y Shin. 2013. stlouisfed.org The Regional Economist. 6 cites.
- “Quantum bitcoin: An anonymous and distributed currency secured by the no-cloning theorem of quantum mechanics“. J Jogenfors. 2016. arxiv.org arXiv preprint arXiv:1604.01383. 6 cites.
- “Binary tree based public-key management for mobile ad hoc networks“. G Kambourakis, E Konstantinou…. 2008. ieeexplore.ieee.org … Systems. 2008. ISWCS’ …. 6 cites.
- “OnionDNS: A seizure-resistant top-level domain“. N Scaife, H Carter, P Traynor. 2015. ieeexplore.ieee.org Communications and Network …. 6 cites.
- “32. Accounting in Peer-to-Peer-Systems“. NC Liebau, V Darlagiannis, O Heckmann…. 2005. Springer Peer-to-Peer Systems …. 6 cites.
- “A biologically inspired method of spam detection“. P Gardner-Stephen. 2009. ieeexplore.ieee.org … Systems Application, 2009. DEXA’09. 20th …. 6 cites.
- “A Survey of anonymous blacklisting systems“. R Henry, I Goldberg. 2010. pdfs.semanticscholar.org University of Waterloo, Centre for …. 6 cites.
- “Financial Cryptography and Data Security“. J Clark, A Essex. 2016. Springer . 6 cites.
- “Safety analysis of Bitcoin improvement proposals“. E Anceaume, T Lajoie-Mazenc…. 2016. ieeexplore.ieee.org … (NCA), 2016 IEEE …. 6 cites.
- “Pressure from the inside: The subnational politics of immigration“. Á García, K Griesbach, J Andrade…. 2011. academia.edu … , Rafael Alarcón y …. 6 cites.
- “The community behavior of spammers“. F Li, H Mo-Han, G Pawel. 2011. olsonet.com . 6 cites.
- “Bitcoin mining technology“. ND Bhaskar, DLEEK Chuen. 2015. books.google.com Handbook of Digital Currency …. 6 cites.
- “Secure communication via shared knowledge and a salted hash in ad-hoc environments“. AD Kent, LM Liebrock. 2011. ieeexplore.ieee.org Computer Software and Applications …. 6 cites.
- “Bitcoin covenants“. M Möser, I Eyal, EG Sirer. 2016. Springer … on Financial Cryptography and Data Security. 6 cites.
- “Validation of application behavior on a virtual time integrated network emulation testbed“. Y Zheng, D Jin, DM Nicol. 2012. dl.acm.org Proceedings of the Winter Simulation …. 6 cites.
- “Blockchain-based architectures for the internet of things: a survey“. M Atzori. 2016. papers.ssrn.com . 6 cites.
- “Cryptocurrencies as distributed community experiments“. M Tarasiewicz, A Newman. 2015. books.google.com Handbook of digital currency. 6 cites.
- “The economics of the bitcoin system“. GH Popescu. 2014. ceeol.com Psychosociological Issues in Human Resource …. 6 cites.
- “Could bitcoin be a financial solution for developing economies“. AG Clegg. 2014. cs.bham.ac.uk University of Birmingham. 6 cites.
- “Algorand: Scaling byzantine agreements for cryptocurrencies“. Y Gilad, R Hemo, S Micali, G Vlachos…. 2017. people.csail.mit.edu In Proceedings of the …. 6 cites.
- “Challenges and opportunities associated with a bitcoin-based transaction rating system“. D Vandervort. 2014. Springer … Conference on Financial Cryptography and Data …. 6 cites.
- “Using network traffic to infer hardware state: A kernel-level investigation“. L Watkins, WH Robinson, R Beyah. 2015. dl.acm.org ACM Transactions on Embedded …. 6 cites.
- “Throttling DDoS attacks using discrete logarithm problem“. A Darapureddi, R Mohandas…. 2010. ieeexplore.ieee.org … ), Proceedings of the …. 6 cites.
- “System and methods for protecting against denial of service attacks“. WC Feng. 2012. Google Patents US Patent 8,171,562. 6 cites.
- “Distributing trusted third parties“. A Küpçü. 2013. dl.acm.org ACM SIGACT News. 6 cites.
- “Dependable connection setup for network capabilities“. SB Lee, VD Gligor, A Perrig. 2010. ieeexplore.ieee.org Dependable Systems and …. 6 cites.
- “Balloon hashing: A memory-hard function providing provable protection against sequential attacks“. D Boneh, H Corrigan-Gibbs, S Schechter. 2016. Springer International Conference on …. 6 cites.
- “Explicit optimal binary pebbling for one-way hash chain reversal“. B Schoenmakers. 2016. Springer … Conference on Financial Cryptography and Data …. 6 cites.
- “Market design for trading with blockchain technology“. K Malinova, A Park. 2016. blockchain.cs.ucl.ac.uk Unpublished manuscript, University of …. 6 cites.
- “Modeling and Simulation of the Economics of Mining in the Bitcoin Market“. L Cocco, M Marchesi. 2016. journals.plos.org PloS one. 6 cites.
- “Immigration Reform Fuels Employment Discrimination“. N Prescott. 2006. HeinOnline Drake L. Rev.. 6 cites.
- “Beyond Bitcoin-Part I: A critical look at blockchain-based systems.“. P Forte, D Romano, G Schmid. 2015. academia.edu IACR Cryptology ePrint Archive. 6 cites.
- “Privacy in bitcoin transactions: new challenges from blockchain scalability solutions“. J Herrera-Joancomartí, C Pérez-Solà. 2016. Springer Modeling Decisions for Artificial …. 6 cites.
- “The sleepy model of consensus“. R Pass, E Shi. 2016. eprint.iacr.org . 6 cites.
- “6lowdtn: Ipv6-enabled delay-tolerant wsns for contiki“. L Bruno, M Franceschinis, C Pastrone…. 2011. ieeexplore.ieee.org … Computing in Sensor …. 6 cites.
- “John MacCulloch, blackguard, thief and high priest, reassessed“. DA Cumming. 1985. euppublishing.com Archives of Natural History. 6 cites.
- “The memory-hard Argon2 password hash and proof-of-work function“. A Biryukov, D Dinu, D Khovratovich…. 2016. Internet-Draft draft-irtf-cfrg-argon2-00 … . 5 cites.
- “Primecoin: Cryptocurrency with prime number proof-of-work, July 2013“. S King. 2013. URL https://www. primecoin. org/static/primecoin-paper …. 5 cites.
- “Primecoin: cryptocurrency with prime number proof-of-work (2013)“. S King. 2013. . 5 cites.
- “Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System“. MD Sleiman, AP Lauf…. 2015. ieeexplore.ieee.org Cyberworlds (CW), 2015 …. 5 cites.
- “Some preliminary findings on the meaning of work in Ghana: A research note“. BB Puplampu. 1997. journals.co.za IFE PsychologIA: An International Journal. 5 cites.
- “Healthcare transaction validation via blockchain proof-of-work, systems and methods“. NJ Witchey. 2015. Google Patents US Patent App. 14/711,740. 5 cites.
- “The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example“. C Natoli, V Gramoli. 2016. arxiv.org arXiv preprint arXiv:1612.09426. 5 cites.
- “2-hop blockchain: Combining proof-of-work and proof-of-stake securely“. T Duong, L Fan, HS Zhou. 2016. eprint.iacr.org . 5 cites.
- “Proof of space from stacked expanders“. L Ren, S Devadas. 2016. Springer Theory of Cryptography Conference. 5 cites.
- “Bitcoin & Gresham’s Law-the economic inevitability of Collapse“. P Güring, I Grigg. 2011. pdfs.semanticscholar.org October–December. http://iang. org …. 5 cites.
- “On the danger of private blockchains“. V Gramoli. 2016. allquantor.at … Cryptocurrencies and Consensus Ledgers (DCCL’16). 5 cites.
- “Mitigation of economic distributed denial of sustainability (eddos) in cloud computing“. MN Kumar, R Korra, P Sujatha…. 2011. researchgate.net In Proc. of the Intl’Conf. on …. 5 cites.
- ““A treatise on altcoins“. A Poelstra. 2014. pdfs.semanticscholar.org . 5 cites.
- “Bayesian analysis of secure P2P sharing protocols“. E Palomar, A Alcaide, JM Estevez-Tapiador…. 2007. Springer … Conferences” On the …. 5 cites.
- “Bitcoin Protocol: Model of ‘Cryptographic Proof’Based Global Crypto-Currency & Electronic Payments System“. Y Malhotra. 2013. papers.ssrn.com . 5 cites.
- “SECURIST: Co-ordinating the development of a Strategic Research Agenda for Security and Dependability R&D“. JJ Clarke, WM Fitzgerald. 2005. ieeexplore.ieee.org … , 2005. CCST’05. 39th Annual 2005 …. 5 cites.
- “Compensation for Work-Related Illness in Arkansas“. RB Leflar. 1988. HeinOnline Ark. L. Rev.. 5 cites.
- “Latency-hiding work stealing: Scheduling interacting parallel computations with work stealing“. SK Muller, UA Acar. 2016. dl.acm.org Proceedings of the 28th ACM Symposium on …. 5 cites.
- “Oblivious printing of secret messages in a multi-party setting“. A Essex, U Hengartner. 2012. Springer … Conference on Financial Cryptography and Data …. 5 cites.
- “Trustworthy routing with the TORA protocol“. AA Pirzada, A Datta, C McDonald. 2004. researchgate.net Proceedings of the AusCERT …. 5 cites.
- “Is Bitcoin the “Paris Hilton” of the Currency World? Or Are the Early Investors onto Something That Will Make Them Rich?“. A Chowdhury. 2016. iijournals.com The Journal of Investing. 5 cites.
- “Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing“. M Shah, AS Shah. 2016. researchgate.net International Journal of Grid and Distributed …. 5 cites.
- “The Bitcoin Protocol as Law, and the Politics of a Stateless Currency“. S Jeong. 2013. papers.ssrn.com Browser Download This Paper. 5 cites.
- “Employers on the Fence: A Guide to the Immigratory Workplace“. N Prescott. 2006. HeinOnline Campbell L. Rev.. 5 cites.
- “On the correlation intractability of obfuscated pseudorandom functions“. R Canetti, Y Chen, L Reyzin. 2016. Springer Theory of Cryptography Conference. 5 cites.
- “Lightweight protection of group content distribution“. P Szalachowski, A Perrig. 2015. dl.acm.org Proceedings of the 1st ACM Workshop on IoT …. 5 cites.
- “Dak roads, dak runners, and the reordering of communication networks“. C Joshi. 2012. cambridge.org International Review of Social History. 5 cites.
- “Pseudonymous broadcast and secure computation from cryptographic puzzles“. J Katz, A Miller, E Shi. 0. allquantor.at. 5 cites.
- “Secure Incentive-Based Architecture for Vehicular Cloud“. K Lim, IM Abumuhfouz, D Manivannan. 2015. Springer International Conference on Ad …. 5 cites.
- “Centmail: Rate limiting via certified micro-donations“. S Goel, J Hofman, J Langford, DM Pennock…. 2009. researchgate.net Proceedings of …. 5 cites.
- “Confluence of the economic recession and immigration laws in the lives of Latino immigrant workers in the United States“. C Menjívar, ME Enchautegui. 2015. Springer Immigrant Vulnerability and Resilience. 5 cites.
- “Protecting Tor from botnet abuse in the long term“. N Hopper. 2013. pdfs.semanticscholar.org . 5 cites.
- “Cross-country analysis of spambots“. V Garg, T Koster, LJ Camp. 2013. Springer EURASIP Journal on Information Security. 5 cites.
- “Bitcoin-The Political’Virtual’of an Intangible Material Currency.“. MA Jansen. 2012. dspace.library.uu.nl . 5 cites.
- “The No-Match Letter Rule: A Mismatch between the Department of Homeland Security and Social Security Administration in Worksite Immigration Law Enforcement“. M Gibek, J Shteierman. 2007. HeinOnline Hofstra Lab. & Emp. LJ. 5 cites.
- “Bypassing network flooding attacks using fastpass“. D Wendlant, DG Andersen, A Perrig. 2006. cs.cmu.edu . 5 cites.
- “Accelerating bitcoin’s transaction processing“. Y Sompolinsky, A Zohar. 2013. eprint.iacr.org Fast Money Grows on Trees, Not Chains. 5 cites.
- “Ring confidential transactions“. S Noether, A Mackenzie. 2016. ledgerjournal.org Ledger. 5 cites.
- “Decentralized Large-Scale Electricity Consumption Shifting by Prosumer Cooperatives.“. C Akasiadis, G Chalkiadakis. 2016. books.google.com ECAI. 5 cites.
- “The influence of maternal health literacy and child’s age on participation in social welfare programs“. S Pati, E Siewert, AT Wong, SK Bhatt…. 2014. Springer Maternal and child …. 5 cites.
- “Overview of e-mail SPAM elimination and its efficiency“. T Sochor. 2014. ieeexplore.ieee.org Research Challenges in Information Science (RCIS) …. 5 cites.
- “Can predictive computation reach the level of anticipatory computing“. M Nadin. 2014. nadin.ws Int. J. Appl. Res. Inf. Technol. Comput. 5 cites.
- “The Sleepy Model of Consensus.“. I Bentov, R Pass, E Shi. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 5 cites.
- “Higher education and graduate employment: the importance of occupational specificity in Germany and Britain“. K Leuze. 2011. books.google.com Converging worlds of welfare. 5 cites.
- “A critical discourse analysis of the malaysian smart schools (mss) conceptual blueprint and implications to implementation“. L Kean-Wah, TS Ming. 2010. researchgate.net … Journal of Language Society, Society and …. 5 cites.
- “The origin, classification and utility of Bitcoin“. P Šurda. 2014. papers.ssrn.com . 5 cites.
- “The use of block chain technology in different application domains“. JS Czepluch, NZ Lollike, SO Malone. 2015. lollike.org The IT University of Copenhagen …. 5 cites.
- “Cryptocurrencies and bitcoin: Charting the research landscape“. M Morisse. 2015. aisel.aisnet.org . 5 cites.
- “Ring SIgnature Confidential Transactions for Monero.“. S Noether. 2015. eprint.iacr.org IACR Cryptology ePrint Archive. 5 cites.
- “Bitcoin block withholding attack: Analysis and mitigation“. S Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org IEEE Transactions on Information …. 5 cites.
- “Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R Osborne, P Pacifico. 2016. eprints.mdx.ac.uk . 5 cites.
- “Rep on the block: A next generation reputation system based on the blockchain“. R Dennis, G Owen. 2015. ieeexplore.ieee.org Internet Technology and Secured …. 5 cites.
- “The Efficient Dual Receiver Cryptosystem and Its Applications.“. T Diament, HK Lee, AD Keromytis, M Yung. 2011. cs.columbia.edu IJ Network Security. 5 cites.
- “Cryptocurrency value formation: an empirical analysis leading to a cost of production model for valuing bitcoin“. A Hayes. 2016. papers.ssrn.com . 5 cites.
- “A Taxonomy of Blockchain-Based Systems for Architecture Design“. X Xu, I Weber, M Staples, L Zhu, J Bosch…. 2017. ieeexplore.ieee.org … (ICSA), 2017 IEEE …. 5 cites.
- “Privacy-awareness in blockchain-based PKI“. L Axon. 2015. ora.ox.ac.uk . 5 cites.
- “Medical Record System Using Blockchain, Big Data and Tokenization“. PTS Liu. 2016. Springer Information and Communications Security. 5 cites.
- “Fraud detections for online businesses: a perspective from blockchain technology“. Y Cai, D Zhu. 2016. Springer Financial Innovation. 5 cites.
- “Improving the efficiency of spam filtering through cache architecture“. A Khanal, BS Motlagh, T Kocak. 2007. ieeexplore.ieee.org Modeling, Analysis, and …. 5 cites.
- “Workers’ Compensation for Disease in Virginia: The Exception Swallows the Rule“. EV Scott. 1985. HeinOnline U. Rich. L. Rev.. 5 cites.
- “Distributed immutabilization of secure logs“. J Cucurull, J Puiggalí. 2016. Springer International Workshop on Security and Trust …. 5 cites.
- “Mitigating denial of service attack using proof of work and Token Bucket Algorithm“. AK Pandey, CP Rangan. 2011. ieeexplore.ieee.org Students’ Technology Symposium …. 4 cites.
- “A novel proof of work model based on pattern matching to prevent DoS attack“. A Ordi, H Mousavi, B Shanmugam, MR Abbasy…. 2011. Springer … Conference on Digital …. 4 cites.
- “Mitigating denial of service attack using proof of work and token bucket algorithm“. SKJ Chen, A Somani. 2011. Proceedings of the 2006 workshop on Dependability …. 4 cites.
- ““the proof-of-work chain is a solution to the byzantine generals’ problem“. S Nakamoto. 2008. The Cryptography Mailing List, https://www. mailarchive …. 4 cites.
- “Momentum–a memory-hard proof-of-work via finding birthday collisions, 2014“. D Lorimer. 2014. . 4 cites.
- “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies“. M Borge, E Kokoris-Kogias, P Jovanovic…. 2017. ieeexplore.ieee.org Security and Privacy …. 4 cites.
- “Egalitarian computing“. ABD Khovratovich. 2015. usenix.org . 4 cites.
- “TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.“. A Chepurnoy, T Duong, L Fan, HS Zhou. 2017. eprint.iacr.org IACR Cryptology ePrint …. 4 cites.
- “Proofs of communication and its application for fighting spam“. M Klonowski, T Strumiński. 2008. Springer SOFSEM 2008: Theory and Practice of …. 4 cites.
- “Proofs of Proofs of Work with Sublinear Complexity“. A Kiayias, N Lamprou, AP Stouka. 2016. Springer International Conference on Financial …. 4 cites.
- “Model-based Security Engineering of SOA Systems Using Modified” UML-SOA-Sec”“. MQ Saleem, JB Jaafar…. 2012. The International Association for … Advances in …. 4 cites.
- “International certification study: UK and Ireland“. J Stejskal. 2002. cetra.com The ATA Chronicle, May. 4 cites.
- “Proof of Space from Stacked Bipartite Graphs.“. L Ren, S Devadas. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 4 cites.
- “Cooperation in decentralised networks“. M Rogers, S Bhatti. 2005. pdfs.semanticscholar.org London Communications Symposium …. 4 cites.
- “Combating spam and denial-of-service attacks with trusted puzzle solvers“. P Tsang, S Smith. 2008. Springer Information Security Practice and Experience. 4 cites.
- “Technical basis of digital currencies“. S Sprankel. 2013. coderblog.de . 4 cites.
- “A new proof-of-work mechanism for bitcoin“. N Shi. 2016. jfin-swufe.springeropen.com Financial Innovation. 4 cites.
- “Formal verification of smart contracts“. K Bhargavan, A Delignat-Lavaud…. 2016. antoine.delignat-lavaud.fr Proceedings of the …. 4 cites.
- “Asian immigrant women fight domestic violence“. DL Jang. 1998. … lives: multicultural perspectives. Mountain View, CA …. 4 cites.
- “The bitcoin transaction graph—anonymity“. MS Ortega. 2013. cv.uoc.edu Master’ s thesis, Universitat Oberta de Catalunya. 4 cites.
- “DEVELOPMENTS IN BANKING AND FINANCIAL LAW: 2013: XI. Bitcoin: The Legal Implications of a Novel Currency“. J Burleson. 2013. litigation-essentials.lexisnexis.com Rev. Banking & Fin. L.. 4 cites.
- “Concerning charting“. M Busche. 1928. JSTOR The American Journal of Nursing. 4 cites.
- “Reputation scoring system using an economic trust model: a distributed approach to evaluate trusted third parties on the internet“. M Vyshegorodtsev, D Miyamoto…. 2013. ieeexplore.ieee.org … (WAINA), 2013 27th …. 4 cites.
- “Time-release Protocol from Bitcoin and Witness Encryption for SAT.“. J Liu, F Garcia, M Ryan. 2015. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 4 cites.
- “The effects of anti-spam methods on spam mail“. E Reshef, E Solan. 2006. pdfs.semanticscholar.org 3rd Conference on Email and Anti …. 4 cites.
- “A Framework for the Model Driven Development of Secure Web Services Composition“. MQ Saleem, JB Jaafar…. 2012. pdfs.semanticscholar.org International Journal of …. 4 cites.
- “Smart Contracts–Blockchains in the Wings“. T Bocek, B Stiller. 2018. Springer Digital Marketplaces Unleashed. 4 cites.
- “Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA)“. WJ Blackert, RL Hom, AK Castner, RM Jokerst…. 2004. dtic.mil . 4 cites.
- “The new architecture of P2P-botnet“. D Sun, X Li, W Liu, J Wu. 2010. ieeexplore.ieee.org Cybercrime and Trustworthy …. 4 cites.
- “Colored coins: Bitcoin, blockchain, and land administration“. A Anand, M McKibbin, F Pichel. 2016. ubitquity.io … World Bank Conference on Land and …. 4 cites.
- “Issues in designing a Bitcoin-like community currency“. D Vandervort, D Gaucas, R St Jacques. 2015. Springer International Conference on …. 4 cites.
- “CheR: Cheating resilience in the cloud via smart resource allocation“. F Lombardi, F Martinelli, D Sgandurra. 2014. Springer Foundations and Practice of …. 4 cites.
- “Proofs of Useful Work.“. M Ball, A Rosen, M Sabin…. 2017. eprint.iacr.org IACR Cryptology ePrint …. 4 cites.
- “Multiple-use transferable e-cash“. P Sarkar. 2013. search.proquest.com International journal of computer applications. 4 cites.
- “Applicability of distributed ledger technology to capital market infrastructure“. A Santo, I Minowa, G Hosaka, S Hayakawa…. 2016. finextra.com … Exchange Group, JPX …. 4 cites.
- “Toward de-anonymizing bitcoin by mapping users location“. J Dupont, AC Squicciarini. 2015. dl.acm.org Proceedings of the 5th ACM Conference on …. 4 cites.
- “Authenticated key exchange over bitcoin“. P McCorry, SF Shahandashti, D Clarke…. 2015. Springer … Conference on Research …. 4 cites.
- “The economics of distributed ledger technology for securities settlement“. E Benos, R Garratt, P Gurrola-Perez. 2017. papers.ssrn.com . 4 cites.
- “Spam detection in social bookmarking websites“. M Poorgholami, M Jalali, S Rahati…. 2013. ieeexplore.ieee.org … and Service Science …. 4 cites.
- “incentive-Centered design for security“. JK MacKie-Mason. 2009. ieeexplore.ieee.org IEEE Security & Privacy. 4 cites.
- “Workplace Searches by Public Employers and the Fourth Amendment“. PR Koster. 2007. JSTOR The Urban Lawyer. 4 cites.
- “Workers’ Compensation and Occupational Disease“. DB LaPlante, R Opp. 1982. HeinOnline Mont. L. Rev.. 4 cites.
- “State of Housing Microfinance in Africa“. M Kihato. 2013. housingfinanceafrica.org Centre for Affordable Housing Finance in Africa. 4 cites.
- “A novel wlan client puzzle against dos attack based on pattern matching“. A Ordi, M Zamani, N Bashah Idris…. 2015. hindawi.com Mathematical …. 4 cites.
- “Location verification on the internet: Towards enforcing location-aware access policies over internet clients“. ARM Abdou, A Matrawy…. 2014. ieeexplore.ieee.org … and Network Security …. 4 cites.
- “ZeroBlock: Preventing Selfish Mining in Bitcoin.“. S Solat, M Potop-Butucaru. 2016. pdfs.semanticscholar.org arXiv preprint arXiv …. 4 cites.
- “Trail Building During Complex Search Tasks.“. S Franken, U Norbisrath. 2014. books.google.com Mensch & Computer. 4 cites.
- “Extractable witness encryption and timed-release encryption from bitcoin“. J Liu, SA Kakvi, B Warinschi. 2015. pdfs.semanticscholar.org . 4 cites.
- “Public Verification of Private Effort.“. G Alberini, T Moran, A Rosen. 2015. books.google.com TCC (2). 4 cites.
- “Bitcoin: Free Money Or Fraud?“. K Schurman. 2011. books.google.com . 4 cites.
- “Digital Currencies and Distributed Ledgers“. V Morabito. 2016. Springer The Future of Digital Business Innovation. 4 cites.
- “An Endorsement-based Mobile Payment System for a Disaster Area“. B Ojetunde, N Shibata, J Gao…. 2015. ieeexplore.ieee.org … Information Networking and …. 4 cites.
- “Bringing secure Bitcoin transactions to your smartphone“. D Frey, MX Makkes, PL Roman, F Taïani…. 2016. dl.acm.org Proceedings of the 15th …. 4 cites.
- “Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.“. M Chase, R Ostrovsky, I Visconti. 2015. microsoft.com EUROCRYPT (2). 4 cites.
- “Automation and disruption in stolen payment card markets“. T Peacock, A Friedman. 2010. weis2014.econinfosec.org Criminal Justice Studies. 4 cites.
- “Economic denial of sustainability mitigation in cloud computing“. M Ficco, M Rak. 2016. Springer Organizational Innovation and Change. 4 cites.
- “Bitcoin risk analysis“. M Kiran, M Stanett. 2015. nemode.ac.uk NEMODE Policy Paper. 4 cites.
- “High-performance capabilities for 1-hop containment of network attacks“. T Wolf, S Natarajan, KT Vasudevan. 2013. dl.acm.org IEEE/ACM Transactions on …. 4 cites.
- “SOK: Making sense of censorship resistance systems“. S Khattak, T Elahi, L Simon, CM Swanson…. 2016. degruyter.com … on Privacy Enhancing …. 4 cites.
- “Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks“. ZA Baig, SM Sait, F Binbeshr. 2016. Elsevier Computer Networks. 4 cites.
- “A Secure, Efficient, and Transparent Network Architecture for Bitcoin“. AP Ozisik, G Andresen, GD Bissias, A Houmansadr…. 2016. pdfs.semanticscholar.org . 4 cites.
- “Smart Contracts Make Bitcoin Mining Pools Vulnerable.“. Y Velner, J Teutsch, L Luu. 2017. people.cs.uchicago.edu IACR Cryptology ePrint Archive. 4 cites.
- “Fair overload handling using proof-of-work functions“. S Golze, G Muhl. 2006. ieeexplore.ieee.org Applications and the Internet, 2006. SAINT …. 3 cites.
- “ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.“. S Biedermann, NP Karvelas, S Katzenbeisser, T Strufe…. 2014. Springer SOFSEM. 3 cites.
- “Proof-of-Work” proves not to work; version 0.2, Sept. 2004“. B Laurie, R Clayton. 0. . 3 cites.
- “Antispam Systems Using Proof of Work Postage Stamps and Digital Signatures“. E Johanssen. 2001. Sep . 3 cites.
- “Cryptocurrencies without Proof of Work (2014)“. I Bentov, A Gabizon, A Mizrahi. 2014. arXiv preprint arXiv:1406.5694. 3 cites.
- “Bitcoin“. S Nakamoto. 2008. eecs.umich.edu A Peer-to-Peer Electronic Cash System. 3 cites.
- “A System for Distributed Minting and Management of Persistent Identifiers“. Ł Bolikowski, A Nowiński, W Sylwestrzak. 2015. ijdc.net International Journal of Digital …. 3 cites.
- “An efficient distributed currency“. B Laurie. 2011. links.org Practice. 3 cites.
- “Bitcoin cooperative proof-of-stake“. SL Reed. 2014. arxiv.org arXiv preprint arXiv:1405.5741. 3 cites.
- “CSCL theories“. H Lin, R Pass. 1996. Citeseer . 3 cites.
- “DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.“. E Wustrow, B VanderSloot. 2016. usenix.org WOOT. 3 cites.
- “Solutions“. KHTSO Solid. 1987. img1.wsimg.com Chemistry Letters. 3 cites.
- “Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011 …“. H Cherifi, JM Zain, E El-Qawasmeh. 2011. books.google.com . 3 cites.
- “Establishment of a trusted relationship between unknown communication parties“. L Tarkkala, N Asokan. 2012. Google Patents US Patent 8,132,005. 3 cites.
- “The Bitcoin transaction system“. LA de la Porte. 2012. cs.uu.nl Utrecht, Netherlands. 3 cites.
- “The Alaska Workers’ Compensation Law: Fact-Finding, Appellate Review, and the Presumption of Compensability“. A Larson, J Lewis. 1985. HeinOnline Alaska L. Rev.. 3 cites.
- “NREGA: Challenges in implementation“. T Sood. 2006. InfoChange Features. http://www. infochangeindia. org …. 3 cites.
- “Marker addresses: Adding identification information to Bitcoin transactions to leverage existing trust relationships.“. J Vornberger. 2012. cs.emis.de GI-Jahrestagung. 3 cites.
- “A Comparison of Trust Models.“. M Sel. 2015. Springer ISSE. 3 cites.
- “Examining the DoS resistance of HIP“. S Tritilanunt, C Boyd, E Foo, JMG Nieto. 2006. Springer OTM Confederated International …. 3 cites.
- “An architectural assessment of bitcoin: using the systems modeling language“. N Roth. 2015. Elsevier Procedia Computer Science. 3 cites.
- “Inexpensive Email Addresses An Email Spam-Combating System.“. A Yegenian, T Dimitriou. 2010. Springer SecureComm. 3 cites.
- “Judicial Review of Workmen’s Compensation Cases“. JT Haferman. 1975. HeinOnline Workmen’s Comp. L. Rev.. 3 cites.
- “Model-based security engineering of SOA system using security intent DSL“. MQ Saleem, J Jaafar, MF Hassan. 2011. sdiwc.net International Journal of New Computer …. 3 cites.
- “Regularisation programmes in Greece“. A Levinson. 2005. mighealth.net . 3 cites.
- “Fawkescoin“. J Bonneau, A Miller. 2014. Springer Cambridge International Workshop on Security …. 3 cites.
- “Money burning and implementation“. J Hartline, T Roughgarden. 2007. researchgate.net . 3 cites.
- “Making bitcoin exchanges transparent“. C Decker, J Guthrie, J Seidel, R Wattenhofer. 2015. Springer European Symposium on …. 3 cites.
- “Re-traffic pricing for fighting against DDoS“. YY Shen, FQ Fan, WX Xie, LF Mo. 2008. ieeexplore.ieee.org … , Control, and Management …. 3 cites.
- “Future of Bitcoin & Statistical Probabilistic Quantitative Methods: Global Financial Regulation (Interview: Hong Kong Institute of CPAs)“. Y Malhotra. 2014. finrm.org Regulatory Compliance Report. 2014d. Global Risk …. 3 cites.
- “New approach to mitigating distributed service flooding attacks“. M Abliz, T Znati. 2012. people.cs.pitt.edu … of IARIA 7th International Conference on …. 3 cites.
- “On the use of key assignment schemes in authentication protocols“. J Alderman, J Crampton. 2013. Springer … Conference on Network and System Security. 3 cites.
- “Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions“. X Boyen, C Carr, T Haines. 2016. eprint.iacr.org . 3 cites.
- “Covert Communication in VANETS using Internet Protocol Header Bit“. K Manchanda, A Singh. 2015. search.proquest.com International Journal of Computer …. 3 cites.
- “Bitcoin protocol specification“. K Okupski. 0. pdfs.semanticscholar.org. 3 cites.
- “Tort Immunity Revisited: What Is the Present Test for Statutory Employer“. JM Church. 1993. HeinOnline La. L. Rev.. 3 cites.
- “Progress Reports Improve Students’ Course Completion Rate and Achievement in Math Computer-Assisted Instruction.“. RB Clariana, LJ Smith. 1989. ERIC . 3 cites.
- “Crypto currencies: core information technology and information system fundamentals enabling currency without borders“. A Serapiglia, CP Serapiglia, J McIntyre. 2015. isedj.org Information Systems Education …. 3 cites.
- “Enclaves of Rights: Workplace Enforcement, Union Contracts, and the Uneven Regulatory Geography of Immigration Policy“. V Parks. 2014. Taylor & Francis Annals of the Association of American Geographers. 3 cites.
- “Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model“. KK Oo, KZ Ye, H Tun, KZ Lin, EM Portnov. 2016. Springer Genetic and Evolutionary …. 3 cites.
- “Bitcoins: Made in China“. T Swanson. 2014. ofnumbers.com Bitcoin Magazine. 3 cites.
- “Blockchains Consensus Protocols in the Wild“. C Cachin, M Vukolić. 2017. arxiv.org arXiv preprint arXiv:1707.01873. 3 cites.
- “Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure“. N Emmadi, H Narumanchi. 2017. dl.acm.org … of the 18th International Conference on …. 3 cites.
- “Legitimizing Bitcoin: Policy Recommendations“. T Alcorn, A Eagle, E Sherbondy. 2014. groups.csail.mit.edu . 3 cites.
- “Personalized PageRank solution paths“. K Kloster, DF Gleich. 2015. math.purdue.edu arXiv preprint arXiv:1503.00322. 3 cites.
- “Cryptographic approaches to denial-of-service resistance“. C Boyd, J Gonzalez-Nieto, L Kuppusamy…. 2011. Springer An Investigation into the …. 3 cites.
- “Systems-compatible incentives“. D Levin, N Spring…. 2009. ieeexplore.ieee.org Game Theory for Networks …. 3 cites.
- “Chain interoperability“. V Buterin. 2016. r3cev.com . 3 cites.
- “Training of pathologists in countries belonging to the European Economic Community.“. MG Rinsler. 1977. ncbi.nlm.nih.gov Journal of clinical pathology. 3 cites.
- “Bitcoin and decentralized trust protocols“. R Pérez-Marco. 2016. arxiv.org arXiv preprint arXiv:1601.05254. 3 cites.
- “The EARWORM Password Hashing Algorithm“. D Franke. 2014. password-hashing.net . 3 cites.
- “Banking on Bitcoin: Applying Anti-Money Laundering and Money Transmitter Laws“. KL Penrose. 2013. HeinOnline NC Banking Inst.. 3 cites.
- “NeTS—FIND: Enabling Defense and Deterrence through Private Attribution“. AC Snoeren, Y Kohno, S Savage…. 2007. researchgate.net FIND-Funded pro …. 3 cites.
- “4. OATH OF HYPOCRITES: FAKE MEDICAL COLLEGES“. AK Menon, MG Radhakrishnan, S David…. 2005. medind.nic.in Australian Health …. 3 cites.
- “Digital Banking Manifesto: The End of Banks?“. A Lipton, D Shrier, A Pentland. 2016. getsmarter.com . 3 cites.
- “Detecting fraudulent activity in a cloud using privacy-friendly data aggregates“. M Solanas, J Hernandez-Castro, D Dutta. 2014. arxiv.org arXiv preprint arXiv:1411.6721. 3 cites.
- “Double spend races“. C Grunspan, R Pérez-Marco. 2017. arxiv.org arXiv preprint arXiv:1702.02867. 3 cites.
- “Modeling and verification of the bitcoin protocol“. K Chaudhary, A Fehnker, J Van De Pol…. 2015. arxiv.org arXiv preprint arXiv …. 3 cites.
- “Supporting the evaluation of complex search tasks with the SearchTrails tool“. S Franken, U Norbisrath. 2014. dl.acm.org … of 24th Annual International Conference on …. 3 cites.
- “Blockchains and the Logic of Accountability: Keynote Address“. M Herlihy, M Moir. 2016. dl.acm.org Proceedings of the 31st Annual ACM/IEEE …. 3 cites.
- “Query-Complexity Amplification for Random Oracles.“. G Demay, P Gazi, U Maurer, B Tackmann. 2015. Springer ICITS. 3 cites.
- “Controllable growth and electrostatic properties of Bernal stacked bilayer MoS2“. S Hao, B Yang, Y Gao. 2016. aip.scitation.org Journal of Applied Physics. 3 cites.
- “Tezos: A Self-Amending Crypto-Ledger Position Paper“. LM Goodman. 2014. tezos.com . 3 cites.
- “What’s So Different about Blockchain?—Blockchain is a Probabilistic State Machine“. K Saito, H Yamada. 2016. ieeexplore.ieee.org Distributed Computing Systems …. 3 cites.
- “Security implications of blockchain cloud with analysis of block withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …. 3 cites.
- “Applications of smart-contracts and smart-property utilizing blockchains“. E Hillbom, T Tillström. 2016. publications.lib.chalmers.se . 3 cites.
- “A first econometric analysis of the CRIX family“. S Chen, CYH Chen, WK Härdle, TM Lee, B Ong. 2016. papers.ssrn.com . 3 cites.
- “Towards scalable and private industrial blockchains“. W Li, A Sforzin, S Fedorov, GO Karame. 2017. dl.acm.org Proceedings of the ACM …. 3 cites.
- “Scalable Byzantine Consensus via Hardware-assisted Secret Sharing“. J Liu, W Li, GO Karame, N Asokan. 2016. arxiv.org arXiv preprint arXiv:1612.04997. 3 cites.
- “Криптовалюта: особенности создания и внедрения“. МВ Вотинов, ИВ Мартьянова…. 2015. colloquium-publishing.ru НОВЫЙ …. 3 cites.
- “Abstract and overview proof of work can work“. D Liu, LJ Camp. 2006. Citeseer . 2 cites.
- “Momentum-a memory-hard proof-of-work via finding birthday collisions“. D Larimer. 0. hashcash.org. 2 cites.
- “How to Configure Proof-of-Work Functions to Stop Spam.“. S Golze, G Mühl, T Weis, K Betriebssysteme. 2005. pdfs.semanticscholar.org Sicherheit. 2 cites.
- “Alternatives for Proof of Work, Part 2: Proof of Activity, Proof of Burn, Proof of Capacity, and Byzantine Generals“. R Paterrson. 2015. Abgerufen am . 2 cites.
- “Bitcoin: Proof of Work“. Z Ramzan. 2013. … /bitcoin/v/bitcoin-proof-of-work . 2 cites.
- “Long-range attacks: The serious problem with adaptive proof of work“. V Buterin. 2014. … problem-with-adaptive-proof-of-work … . 2 cites.
- “Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake, 2014“. I Bentov, C Lee, A Mizrahi, M Rosenfeld. 2014. Preprint. 2 cites.
- “When proof of work works“. D Liu, LJ Camp. 2006. papers.ssrn.com . 2 cites.
- “A proof of work stealing for dedicated multiprocessors“. UA Acar, SK Muller. 2016. Technical Report CMU-CS-16-114 … . 2 cites.
- “The sum of all chains—let’s converge!, 2015. Presentation for Coinscrum and Proof of Work“. I Grigg. 0. . 2 cites.
- “SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections“. Y Sompolinsky, Y Lewenberg, A Zohar. 2016. . 2 cites.
- “De Fuentes, Almudena Alcaide,” Hindering false event dissemination with VANETS with proof-of-work mechanisms”, Department of Computer Science“. E Palomar, M Jose. 2014. Elsevier . 2 cites.
- “Gridcoin: Crypto-currency using berkeley open infrastructure network computing grid as a proof of work“. R Halford. 2014. . 2 cites.
- “Hashcash Proof-of-Work System“. A Black. 1997. . 2 cites.
- “Designing proof of human-work puzzles for cryptocurrency and beyond“. J Blocki, HS Zhou. 2016. Springer Theory of Cryptography Conference. 2 cites.
- “Security Concerns and Issues for Bitcoin“. CA Vyas, M Lunagaria. 2014. Citeseer the proceedings of National Conference cum …. 2 cites.
- “Best jobs for ex-offenders“. RL Krannich. 2016. dl.pgu.ac.ir . 2 cites.
- “Systems and methods for authenticating requests from a client running trialware through a proof of work protocol“. Z Ramzan, W Bogorad, V Seshadri, V Antonov…. 2013. Google Patents US Patent …. 2 cites.
- “Proofs of work for blockchain protocols“. JA Garay, A Kiayias, G Panagiotakos. 2017. pdfs.semanticscholar.org . 2 cites.
- “Hashimoto: I/O bound proof of work. 2014“. T Dryja. 0. URL {https://mirrorx. com/files/hashimoto. pdf}. 2 cites.
- “A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database“. L Aniello, R Baldoni, E Gaetani, F Lombardi…. 2017. eprints.soton.ac.uk . 2 cites.
- “Accountability in P2P Democracy“. M Kelaskar. 0. World of Practical Peers, Powerpoint presentation …. 2 cites.
- “On decentralizing prediction markets and order books“. J Bonneau, EW Felten, J Clark, A Miller, JA Kroll…. 2014. . 2 cites.
- “Review of CryptoNote white paper“. S Noether. 2014. bravenewcoin.com … http://monero. cc/downloads/whitepaper_review. pdf …. 2 cites.
- “Bitcoin: An Empirical Study of Cryptocurrency“. E Rosen, E Wengrowski, GD Clark, X Gao. 2014. ericwengrowski.com . 2 cites.
- “Reputation Sensitive Message Passing in Content Addressable Networks“. E Buchmann, K Böhm…. 2003. Univ., Fak. für Informatik . 2 cites.
- “Connecting the Blockchain to the Sun to Save the Planet“. LP Johnson, A Isam, N Gogerty, J Zitoli. 2015. papers.ssrn.com . 2 cites.
- “System and methods of determining computational puzzle difficulty for challenge-response authentication“. WC Feng, E Kaiser. 2011. Google Patents US Patent App. 13/050,123. 2 cites.
- “Moving to the UK as a GP: The process explained“. R Hays. 2007. search.proquest.com Australian family physician. 2 cites.
- “System for providing trusted user access of computer systems“. S Marinov, K Miller. 2014. Google Patents US Patent 8,793,778. 2 cites.
- “Computers and Internet: Are All Modern Currencies Not Virtual?–The Bitcoin Phenomenon“. D Flint. 2014. kluwerlawonline.com Business Law Review. 2 cites.
- “Application of Machine Learning Algorithms for Bitcoin Automated Trading“. K Żbikowski. 2016. Springer Machine Intelligence and Big Data in Industry. 2 cites.
- “An overview of blockchain technology: Architecture, consensus, and future trends“. Z Zheng, S Xie, H Dai, X Chen…. 2017. ieeexplore.ieee.org Big Data (BigData …. 2 cites.
- “The Dual Nature of Bitcoin as Payment Network and Money“. P Tasca. 2016. papers.ssrn.com Browser Download This Paper. 2 cites.
- “A study of electronic cash paradigm“. DE Saputra, SH Supangkat. 2014. ieeexplore.ieee.org Information Technology Systems …. 2 cites.
- “Blockchain Technologies: The Foreseeable Impact on Society and Industry“. T Aste, P Tasca, T Di Matteo. 2017. ieeexplore.ieee.org Computer. 2 cites.
- “Accountable security mechanism based on security service level agreement“. T Takahashi, J Kannisto, J Harju…. 2013. ieeexplore.ieee.org … (ISCC), 2013 IEEE …. 2 cites.
- “Electronic Contract Signing Without Using Trusted Third Party“. Z Wan, RH Deng, D Lee. 2015. Springer … Conference on Network and System Security. 2 cites.
- “The Determination of a Secondary Wage“. RJ O’Dea. 1968. journals.sagepub.com Journal of Industrial Relations. 2 cites.
- “Sex Worker Rights Organizing as Social Movement Unionism: Responding to the Criminalization of Work“. CA Jackson. 2013. digitalscholarship.unlv.edu . 2 cites.
- “Bitcoin“. M Betancourt. 2013. mmduvic.ca CTheory. 2 cites.
- “Indistinguishable proofs of work or knowledge“. F Baldimtsi, A Kiayias, T Zacharias, B Zhang. 2016. Springer Advances in Cryptology …. 2 cites.
- “Latency-hiding work stealing“. SK Muller, UA Acar. 2015. reports-archive.adm.cs.cmu.edu Proceedings of the twenty …. 2 cites.
- “What’s new in computers“. PCP Bhatt. 2014. Springer Resonance. 2 cites.
- “Blockchain Technology as s Support Infrastructure in e-Government“. S Ølnes, A Jansen. 2017. Springer International Conference on Electronic Government. 2 cites.
- “Beyond Bitcoin-Part II: Blockchain-based systems without mining.“. P Forte, D Romano, G Schmid. 2016. eprint.iacr.org IACR Cryptology ePrint Archive. 2 cites.
- “Legal Needs and Barriers: The Case for Supporting Representation of Aliens“. R Irwin. 1993. HeinOnline Clearinghouse Rev.. 2 cites.
- “Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network“. J Hirshman, Y Huang, S Macke. 2013. pdfs.semanticscholar.org . 2 cites.
- “The Compensability of Chronic Stress: A Policy Dilemma for the Ontario Workers’ Compensation Board“. SED Shortt. 1995. JSTOR Canadian Public Policy/Analyse de Politiques. 2 cites.
- “Formalising the Bitcoin protocol“. WJB Beukema. 2014. referaat.cs.utwente.nl Availabl e at http://referaat. cs. utwente. nl …. 2 cites.
- “Does the Velocity of Bitcoins Effect the Price Level of Bitcoin“. MJ DeLeo, W Stull. 2014. academia.edu Temple University. 2 cites.
- “Secure peer-to-peer trading for multiplayer games“. C GauthierDickey, C Ritzdorf. 2012. ieeexplore.ieee.org Network and Systems Support …. 2 cites.
- “Comments to the New York department of financial services on the proposed virtual currency regulatory framework“. J Brito, E Dourado. 2014. mercatus.org Public Interest Comment, Mercatus Center …. 2 cites.
- “Real world privacy expectations in VANETs real world privacy expectations in VANETs“. M Feiri, J Petit, F Kargl. 2014. doc.utwente.nl . 2 cites.
- “Bitcoin–The Miner’s Dilemma“. I Eyal. 2015. papers.ssrn.com . 2 cites.
- “Fair anonymity for the Tor network“. J Diaz, D Arroyo, FB Rodriguez. 2014. arxiv.org arXiv preprint arXiv:1412.4707. 2 cites.
- “WHAT IS BITCOIN?“. RA Glantz. 2014. panteracapital.com . 2 cites.
- “On the Phase Space of Block-Hiding Strategies.“. A Shomer. 2014. eprint.iacr.org IACR Cryptology ePrint Archive. 2 cites.
- “Literature survey of performance benchmarking approaches of BPEL engines“. C Röck, S Harrer. 2014. opus4.kobv.de . 2 cites.
- “Leveraging bitcoin blockchain technology to modernize security perfection under the uniform commercial code“. DS Gerstl. 2016. Springer International Conference of Software Business. 2 cites.
- “Consulates and Polonia Social Organizations“. B Heydenkorn. 1985. Canadian Polish Research Institute A Community in Transition: the …. 2 cites.
- “The Balance Attack or Why Forkable Blockchains Are Ill-Suited for Consortium“. C Natoli, V Gramoli. 2017. ieeexplore.ieee.org … Systems and Networks (DSN), 2017 47th …. 2 cites.
- “Optimized Execution of Business Processes on Blockchain“. L García-Bañuelos, A Ponomarev, M Dumas…. 2017. Springer … Conference on Business …. 2 cites.
- “Forthcoming“. YY Hsieh, JP Vergne, S Wang. 0. researchgate.net Public interest (t-1). 2 cites.
- “Algorand“. J Chen, S Micali. 2016. adsabs.harvard.edu arXiv preprint arXiv:1607.01341. 2 cites.
- “Economics of Competing Crypto Currencies: Monetary Policy, Miner Reward and Historical Evolution“. Y Zhang, G Song. 2014. nicolascourtois.com . 2 cites.
- “Blockchains and electronic health records“. B Yuan, W Lin, C McDonnell. 2016. mcdonnell.mit.edu Mcdonnell. mit. edu. 2 cites.
- “D4. 4-Design of Social Digital Currency“. D Roio, M Sachy, S Lucarelli, B Lietaer, F Bria. 2015. aisberg.unibg.it . 2 cites.
- “Addressing spam e-mail using hashcast“. K Curran, JS Honan. 2005. igi-global.com … Journal of Business Data Communications and …. 2 cites.
- “Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques“. PS Bawa, S Manickam. 2015. researchgate.net Journal of Computer Science. 2 cites.
- “How a finely tuned system of checks and balances has been effectively dismantled“. D Cadman. 2014. cis.org Center for Immigration Studies. 2 cites.
- “Factom ledger by consensus“. P Snow, B Deery, P Kirby, D Johnston. 2015. bravenewcoin.com . 2 cites.
- “Digitalizing the Malaysian classroom: Barriers, insights and feasibility“. LS Yin. 2013. Jurnal Pengajian Media Malaysia. 2 cites.
- “Getting Off the Ground: The Case of Bitcoin“. WJ Luther. 2017. papers.ssrn.com . 2 cites.
- “Practical Aspects of the Bitcoin System“. AKGC Sorge. 2013. arxiv.org arXiv preprint arXiv:1308.6760. 2 cites.
- “A simple yet efficient approach to combat transaction malleability in bitcoin“. U Rajput, F Abbas, R Hussain, H Eun, H Oh. 2014. Springer International Workshop on …. 2 cites.
- “Building Character: How to Grant Actors Limited Copyright Protection for Performances without Creating a New Special of Copyrighted Work“. M Kawabata. 2014. HeinOnline Tex. Rev. Ent. & Sports L.. 2 cites.
- “Discovering the social organization of school library work“. J Crispin. 2009. mospace.umsystem.edu . 2 cites.
- “Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments“. J Schneider, N Fleischhacker, D Schröder…. 2016. dl.acm.org Proceedings of the 2016 …. 2 cites.
- “Monitoring wildlife conservation using networked RFID for secure positioning“. F Yang, F Zhang, J Wang, DS Hailu. 2012. Springer Communications and Information …. 2 cites.
- “Being dissimilar: Religious dissimilarity, gender dissimilarity, value dissimilarity and job satisfaction“. I Ullah, M Usman, AS Niazi, M Farooq…. 2012. researchgate.net … and Business Review. 2 cites.
- “Privacy in overlay-based smart traffic systems“. M Florian, I Baumgart. 2013. ieeexplore.ieee.org Local Computer Networks Workshops …. 2 cites.
- “Distributed Bitcoin Account Management“. X Zhou, Q Wu, B Qin, X Huang…. 2016. ieeexplore.ieee.org Trustcom/BigDataSE/I …. 2 cites.
- “Business processes secured by immutable audit trails on the blockchain“. P Snow, B Deery, J Lu, D Johnston, P Kirby…. 2014. bcventures.net . 2 cites.
- “‘As relevant as banning polo in Greenland’: the absence of ethnographic insight into country sports in the UK“. S Hillyard. 2007. journals.sagepub.com Qualitative Research. 2 cites.
- “A case study on education networks and brokerage“. G Martin, O Bohl, AW Scheer…. 2007. igi-global.com Cases on Global E …. 2 cites.
- “MI: Cross-layer malleable identity“. SH Khor, A Nakao. 2011. ieeexplore.ieee.org Communications (ICC), 2011 IEEE …. 2 cites.
- “Labor Politics and Organizing Strategies in Immigrant‐Owned SMEs: The Case of the Confédération Générale du Travail and Chinese Migrant Workers in France“. YH Chuang. 2014. Wiley Online Library WorkingUSA. 2 cites.
- “Future of Payment Platforms“. SB Youssefzadeh. 2014. digitalcommons.calpoly.edu . 2 cites.
- “Virtual currencies and distributed ledger technology: What is new under the sun and what is hyped repackaging?“. H Leinonen. 2016. ingentaconnect.com Journal of Payments Strategy & Systems. 2 cites.
- “The Economics of the Blockchain: A study of its engineering and transaction services marketplace“. D Bargar. 2016. search.proquest.com . 2 cites.
- “Bitcoin: The Trade of Digital Signatures“. S Hazratjee. 2015. HeinOnline T. Marshall L. Rev.. 2 cites.
- “Notes on Scalable Blockchain Protocols (verson 0.3)“. V Buterin, J Coleman, M Wampler-Doty. 2015. pdfs.semanticscholar.org . 2 cites.
- “4P: Performant private peer-to-peer file sharing“. N Zeilemaker, J Pouwelse…. 2014. ieeexplore.ieee.org Peer-to-Peer Computing …. 2 cites.
- “Kudos: A Peer-to-Peer Discussion System Based on Social Voting“. L Matteis. 0. the-blockchain.com. 2 cites.
- “Bitcoin: Main Trends and Perspectives“. NE Egorova, KA Torzhevsky. 2016. journalrepository.org British Journal of Economics …. 2 cites.
- “Bitcoin: Main Trends and Perspectives“. NE Egorova, KA Torzhevsky. 2016. journalrepository.org British Journal of Economics …. 2 cites.
- “Adding Up the Bits and Pieces: How Big An Effect Will Bitcoin and Crypto Currency Exert on Remote and Interactive Gambling?“. M Owens, AA Lavitch. 2013. online.liebertpub.com Gaming Law Review and Economics. 2 cites.
- “Towards a framework for the evaluation and design of distributed ledger technologies in banking and payments“. J Bott, U Milkau. 2016. ingentaconnect.com Journal of Payments Strategy & Systems. 2 cites.
- “A probabilistic analysis of the nxt forging algorithm“. S Popov. 2016. ledgerjournal.org Ledger. 2 cites.
- “Advancing Egalitarianism“. G Wood, A Buchanan. 2015. books.google.com … of Digital Currency. Academic Press, San …. 2 cites.
- “On Bitcoin Security in the Presence of Broken Cryptographic Primitives“. I Giechaskiel, C Cremers, KB Rasmussen. 2016. Springer European Symposium on …. 2 cites.
- “Unclassified worked flints“. H Stopes. 1900. JSTOR Journal of the Anthropological Institute of Great Britain …. 2 cites.
- “Deterrence to Hiring Illegal Immigrant Workers: Will the New Employer Sanction Provisions Work“. SE Steele. 2007. HeinOnline Ga. J. Int’l & Comp. L.. 2 cites.
- “Work stress in the banking industries of Australia and South Africa: Drivers of stress and legislative responses to the issue“. A Bunn, R Guthrie, N Smit. 2013. search.informit.com.au International Journal of …. 2 cites.
- “Analýza virtuální měny Bitcoin“. P HUŘŤÁK. 2013. theses.cz . 2 cites.
- “Блокчейн как коммуникационная основа формирования цифровой экономики: преимущества и проблемы“. ММ Пряников, АВ Чугунов. 2017. cyberleninka.ru International Journal of Open …. 2 cites.
- “Heritage documentation for conservation: partnership in learning“. M Santana Quintero, B Blake, R Eppich…. 2008. lirias.kuleuven.be The Spirit of …. 2 cites.
- “Bitcoin pour remplacer les devises?“. FR Velde. 2015. cairn.info Revue d’économie financière. 2 cites.
- “Правовой Режим валюты нового поколения“. ЕЮ Моисеева, АА Рубан. 2015. elibrary.ru Достижения вузовской науки. 2 cites.
- “MEMCOIN2: A Hybrid Proof of Work/Proof of Stake Cryptocurrency with Democratic Control“. A Mackenzie. 2010. Technical Report. http://mc2 … . 1 cites.
- “Alternatives for proof of work, part 1: Proof of stake“. R Patterson. 2015. … /proof-of-stake-proof-of-work-comparison/[cited 13.10 …. 1 cites.
- “The economics of proof-of-work“. D Liu. 2007. HeinOnline ISJLP. 1 cites.
- “The decrits consensus algorithm: Decentralized agreement without proof of work“. R Pfeiffer. 2014. arxiv.org arXiv preprint arXiv:1411.1101. 1 cites.
- “The bitcoin mining game: On the optimality of honesty in proof-of-work consensus mechanism“. J Beccuti, C Jaag. 2017. allquantor.at . 1 cites.
- “Memcoin2: a hybrid proof of work/proof of stake cryptocurrency“. A Mackenzie. 2014. decred.org . 1 cites.
- “Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem (Full version)“. A Biryukov, D Khovratovich. 0. cryptolux.org. 1 cites.
- “Proof of stake: Definite. an implementation of constant staking rewards to promote increased network activity“. M Croteau, E Litranab. 2014. August . 1 cites.
- “A network-dependent rewarding system: proof-of-mining“. J Lao. 2014. arxiv.org arXiv preprint arXiv:1409.7948. 1 cites.
- “Building a bitcoin miner on an FPGA“. S Oliveira, F Soares, G Flach, M Johann…. 2012. inf.ufrgs.br XXVII SIM—South …. 1 cites.
- “Legal aspects of work-related mental illness and disorder“. S Adler, R Atlas. 2004. search.proquest.com The Israel journal of psychiatry and related …. 1 cites.
- “BLOCKCHAIN TIME AND HEISENBERG UNCERTAINTY PRINCIPLE“. R Pérez-Marco. 2016. hal.archives-ouvertes.fr . 1 cites.
- “Barter to bitcoin: the changing visage of transactions“. D Awasthi. 2015. elkjournals.com Elk Asia Pacific Journal of Finance and Risk …. 1 cites.
- “Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. researchgate.net Proceedings of the International …. 1 cites.
- “Using Block Chain for Peer-to-Peer Proof-of-Location“. G Brambilla, M Amoretti, F Zanichelli. 2016. arxiv.org arXiv preprint arXiv:1607.00174. 1 cites.
- “Lottery Protocol for Cryptocurrency“. J Kume, M Abe, T Okamoto. 2015. ai.soc.i.kyoto-u.ac.jp SCIS2015. 1 cites.
- “Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions.“. X Boyen, C Carr, T Haines. 2016. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
- “Efficient algorithms for broadcast and consensus based on proofs of work“. L Eckey, S Faust, J Loss. 2017. eprint.iacr.org . 1 cites.
- “Defeating DDoS Attack By Using Software Puzzle Scheme“. AB Kudupudi, MA Kumar. 2017. ijseat.com IJSEAT. 1 cites.
- “Survey of consensus protocols on blockchain applications“. LS Sankar, M Sindhu…. 2017. ieeexplore.ieee.org … (ICACCS), 2017 4th …. 1 cites.
- “Double-spend Attack Models with Time Advantange for Bitcoin“. C Pinzón, C Rocha. 2016. Elsevier Electronic Notes in Theoretical Computer Science. 1 cites.
- “Oligarchic Control of Business-to-Business Blockchains“. LN Lundbaek, M Huth. 2017. ieeexplore.ieee.org Security and Privacy Workshops …. 1 cites.
- “RB-PoW: A reputation based approach tocryptographic mitigation of denial-of-serviceattacks“. F LILKAER, C TELJSTEDT. 2013. diva-portal.org . 1 cites.
- “Further applications of the blockchain“. AL Tsilidou, G Foroglou. 2015. inpluslab.sysu.edu.cn . 1 cites.
- “The Disadvantages of the Sanctions Provisions“. A Hernandez. 1989. HeinOnline In Defense of the Alien. 1 cites.
- “A theory for lightweight cryptocurrency ledgers“. B White. 2015. . 1 cites.
- “Metacaptcha: A metamorphic throttling service for the web“. A Dua, T Bui, T Le, N Huynh…. 2014. ieeexplore.ieee.org Network Protocols (ICNP) …. 1 cites.
- “States, Federal Welfare Reform and Immigrants: The Challenges of the First Year“. S Steisel, A Morse. 1997. HeinOnline In Defense of the Alien. 1 cites.
- “Subchains Facilitate On-chain Scaling and Fast Transaction Verification“. P Rizun. 2016. bitcoinunlimited.info . 1 cites.
- “Traversing Bitcoin’s P2P network: insights into the structure of a decentralised currency“. S Feld, M Schönfeld, M Werner. 2016. inderscienceonline.com International Journal of …. 1 cites.
- “Explaining the relationship between organizational commitment, organizational health and employee creativity of the Social Security Organization“. S Salajeghe, A Movagharzade. 2016. ijhcs.com International Journal of Humanities and …. 1 cites.
- “Research issues regarding the Bitcoin and Alternative Coins digital currencies“. A Pîrjan, DM Petrosanu, M Huth…. 2015. search.proquest.com Journal of Information …. 1 cites.
- “Handling bitcoin conflicts through a glimpse of structure“. T Lajoie-Mazenc, R Ludinard…. 2017. dl.acm.org Proceedings of the …. 1 cites.
- “Transaction locking and masternode consensus: A mechanism for mitigating double spending attacks“. E Duffield, H Schinzel, F Gutierrez. 2014. dashpay.cz . 1 cites.
- “The State of Cryptocurrencies, Their Issues and Policy Interactions“. R Subramanian, T Chino. 2015. scholarworks.lib.csusb.edu Journal of International …. 1 cites.
- “Short Paper: Service-Oriented Sharding for Blockchains“. AE Gencer, R van Renesse, EG Sirer. 2017. fc17.ifca.ai Financial Cryptography and Data …. 1 cites.
- “Method and apparatus for the limitation of the mining of blocks on a block chain“. DR Ferrin. 2016. Google Patents US Patent App. 14/987,842. 1 cites.
- “Cryptocurrencies and the Anonymous Nature of Transactions on the Internet“. EA Casale. 2015. ir.library.oregonstate.edu . 1 cites.
- “Sending Message into a Definite Future: Non-Parallelizable Case“. W Mao. 2000. pdfs.semanticscholar.org . 1 cites.
- “Authority Printed Upon Emptiness“. K O’Hara. 2015. ieeexplore.ieee.org IEEE Internet Computing. 1 cites.
- “SPAM control using CPU Timestamps“. S Jagannath, R Mohandas. 2013. search.proquest.com International Journal of …. 1 cites.
- “A study of digital currency cryptography for business marketing and finance security“. TH Kim. 2016. jse.or.kr Asia-pacific Journal of Multimedia Services Convergent …. 1 cites.
- “An Introduction to the Blockchain and Its Implications for Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical Reference Services Quarterly. 1 cites.
- “Customization of quality models in software projects to enhance the business value“. V Suma, BR Shubhamangala…. 2013. ieeexplore.ieee.org … Conference (IACC), 2013 …. 1 cites.
- “Privacy with Secondary Use of Personal Information“. S Wohlgemuth, K Takaragi…. 2016. researchgate.net MKWI Research-in …. 1 cites.
- “Disposable E-mail adresses“. AM Yegenian. 2009. . 1 cites.
- “Netcoin: A Traceable P2P Electronic Cash System“. H Tewari, EO Nuallain. 2015. ieeexplore.ieee.org Web Services (ICWS), 2015 IEEE …. 1 cites.
- “Eventually Returning to Strong Consistency.“. M Vukolic. 2016. pdfs.semanticscholar.org IEEE Data Eng. Bull.. 1 cites.
- “The Bitcoin Phenomenon Analysis“. B Tomaš, I Švogor. 2015. domino.fov.uni-mb.si 28th Bled eConference. 1 cites.
- “Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging“. Z Chen, Y Zhu. 2017. ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE …. 1 cites.
- “The future of money and further applications of the blockchain“. R Adams, G Parry, P Godsiff, P Ward. 2017. Wiley Online Library Strategic Change. 1 cites.
- “A model for collaborative blockchain-based video delivery relying on advanced network services chains“. N Herbaut, N Negru. 2017. ieeexplore.ieee.org IEEE Communications Magazine. 1 cites.
- “The cross-section of crypto-currencies as financial assets: An overview“. H Elendner, S Trimborn, B Ong, TM Lee. 2016. econstor.eu . 1 cites.
- “BlockNDN: A bitcoin blockchain decentralized system over named data networking“. T Jin, X Zhang, Y Liu, K Lei. 2017. ieeexplore.ieee.org Ubiquitous and Future Networks …. 1 cites.
- “Theory Beyond the Codes“. M Betancourt. 2013. ctheory.net Ctheory< retrieved from http://ctheory. net/articles. aspx. 1 cites.
- “DOUBLE SPENDING PREVENTION IN BITCOINS NETWORK“. M Kadam, P Jha, S Jaiswal. 2015. ijcea.com International Journal of Computer …. 1 cites.
- “Fully Anonymous Transferable Ecash.“. H Tewari, A Hughes. 2016. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
- “Trusted Timestamp in Cryptocurrency Block Chain“. J Klusácek. 2014. eeict.feec.vutbr.cz Student EEICT. 1 cites.
- “An anonymous distributed electronic voting system using Zerocoin“. Y Takabatake, D Kotani, Y Okabe. 2016. repository.kulib.kyoto-u.ac.jp . 1 cites.
- “On offline payments with bitcoin“. A Dmitrienko, D Noack, AR Sadeghi…. 2014. Springer … Conference on Financial …. 1 cites.
- “Digital Immolation“. J Bonneau. 2010. Springer Cambridge International Workshop on Security …. 1 cites.
- “Yet another note on block withholding attack on bitcoin mining pools“. S Bag, K Sakurai. 2016. Springer International Conference on Information Security. 1 cites.
- “Overcoming Limits of Blockchain for IoT Applications“. F Buccafurri, G Lax, S Nicolazzo…. 2017. researchgate.net Proceedings of the 12th …. 1 cites.
- “Detecting the presence of a vmm through side-effect analysis 15-712 project final report“. J Franklin, M Luk, JM McCune. 2005. ra.adm.cs.cmu.edu Selected Project Reports, Fall …. 1 cites.
- “Augmenting a webmail application with cryptographic puzzles to deflect spam“. M Cristea, B Groza. 2011. ieeexplore.ieee.org … , Mobility and Security (NTMS), 2011 4th …. 1 cites.
- “Providing better confidentiality and authentication on the Internet using Namecoin and MinimaLT“. F Jacobs. 2014. arxiv.org arXiv preprint arXiv:1407.6453. 1 cites.
- “Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business“. J Sidhu. 2017. ieeexplore.ieee.org … Communication and Networks (ICCCN), 2017 26th …. 1 cites.
- “Of strategies and structures: Motif-based fingerprinting analysis of online reputation networks“. M Wichtlhuber, S Bücker, R Kluge…. 2016. ieeexplore.ieee.org … (LCN), 2016 IEEE …. 1 cites.
- “Introduction to Parallel Computing“. M Skuhersky. 0. mit.edu. 1 cites.
- “Quantos somos? The second national population census of Mozambique“. G Harrison. 1998. Taylor & Francis . 1 cites.
- “Ripple Protocol Consensus Algorithm Review“. P Todd. 2015. docshare04.docshare.tips . 1 cites.
- “A Bitcoin system with no mining and no history transactions: Build a compact Bitcoin system“. X Qian. 2014. arxiv.org arXiv preprint arXiv:1404.4275. 1 cites.
- “Risk based authentication“. NA Allen. 2015. Google Patents US Patent 9,202,038. 1 cites.
- “Secure and Trustable Electronic Medical Records Sharing using Blockchain“. A Dubovitskaya, Z Xu, S Ryu, M Schumacher…. 2017. arxiv.org arXiv preprint arXiv …. 1 cites.
- “Record Forms in the Syracuse Health Demonstration“. GC Ruhland, IF Thompson. 1926. ajph.aphapublications.org American Journal of Public …. 1 cites.
- “Methodology to measure a front end ASIC for physic experiment“. F Druillole. 2003. ieeexplore.ieee.org Nuclear Science Symposium Conference Record …. 1 cites.
- “Lastregelung von Web Services mittels Proof-of-Work Funktionen.“. S Golze, G Mühl, MC Jaeger. 2005. pdfs.semanticscholar.org KiVS Kurzbeiträge und …. 1 cites.
- “Fairness in Überlastsituationen mittels Proof-Of-Work Funktionen“. S Golze. 2009. depositonce.tu-berlin.de . 1 cites.
- “Postęp w technologii systemów kryptowalutowych“. W Nowakowski. 2015. yadda.icm.edu.pl Elektronika: konstrukcje, technologie …. 1 cites.
- “Avaliação da segurança de protocolos criptográficos usados em moedas virtuais“. VHG Moia, MAA Henriques. 0. VII Sétimo Encontro dos Alunos e Docentes do …. 1 cites.
- “Bitcoins y el problema de los generales bizantinos“. C Pérez Solà, J Herrera Joancomartí. 2014. rua.ua.es . 1 cites.
- “Децентрализованные сервисы“. МВ Шпеко. 2014. elibrary.ru … системы и технологии в образовании, науке и …. 1 cites.
- “Proof-of-Work“. J SVENSSON, J ZEECK. 0. csc.kth.se. 0 cites.
———————————————————-
(Featured Image: ‘Bitcoin Mining: Mine Like a Professional Miner‘ by Herbert Sim)