Log in / Register
Home arrow Business & Finance arrow Bitcoin and Blockchain Security


[1] The number of daily confirmed bitcoin transactions. available from https:


[2] Understanding bitcoin’s growth in 2015. available from https://blog.

[3] Goldman Sachs. Eta goldman sachs merchant acquirer and iso survey: Spring 2015. available from Merchant-Acquirer-and-ISO-Survey-Spring2015.pdf.

[4] Realtime, safe and easy with coinbox. available from

[5] Conify: Blockchain payments. available from

[6] Coinkite: bitcoin wallet with multi-signature bank-grade security. available from

[7] Bitpay: A bitcoin payment processor. available from

[8] Revel ipad point-of-sale software. available from http://revelsystems.


[9] Paystand: 0% business payments. available from http://www.

[10] Xbterminal: Bitcoin pos system. available from

[11] Danny Bradbury. How credit card fraud sank one bitcoin exchange. available from http:


[12] Coinbase: Bitcoin wallet. available from

[13] Fastest and easiest way to buy and sell bitcoins. available from

[14] Electrum: Bitcoin wallet. available from

[15] Ripple: Instant, certain, low-cost international payments. available from https:


[16] What is a ripple gateway? available from center/gateways/.

[17] Ripple popular gateways. available from


[18] Multi-currency wallet that actually works. available from https://

[19] 2014. The 6 Biggest Bitcoin Heists in History, available from 6-biggest-bitcoin-heists-in-history-1531881137.

[20] List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses, available from https://

[21] Arthur Gervais, Ghassan Karame, Srdjan Capkun, and Vedran Capkun. Is Bitcoin a Decentralized Currency? IEEE Security and Privacy Magazine, 2014, May/June issue 2014, 2014.

[22] Bitcoin paper wallet generator, 2014. available from https://bitcoinpaperwallet.


[23] Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, and Moti Yung. Poster: On offline payments with bitcoin. In FC’2014: Financial Cryptography and Data Security Conference, 2014.

[24] Building a Secure System using TrustZone Technology. http://infocenter. 0 0 94 92C_trustzone_security_whitepaper.pdf, 2009.

[25] Software Guard Extensions Programming Reference.

sites/default/files/329298-001.pdf, 2013.

[26] Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, and Srdjan Capkun. Securing cloud data in the new attacker model. IACR Cryptology ePrint Archive, 2014:556, 2014.

[27] A. Shamir. How to Share a Secret? In Communications of the ACM, pages 612-613, 1979.

[28] H. Krawczyk. Secret Sharing Made Short. In International Conference on Advances in Cryptology, 1993.

[29] Amos Beimel. Secret-sharing schemes: A survey. In Third, International Workshop on Coding and Cryptology (IWCC), pages 11-46, 2011.

[30] Mining pool: Shared maximum pps. available from index.php/Shared_Maximum_PPS.

[31] Mining pool: Equalized shared maximum pay per share. available from https:


[32] Mining pool: Pay on target. available from

[33] Mining pool: Proportional. available from wiki/Mining_pool#Proportional.

[34] Mining pool: Pay-per-last-n-shares. available from https://en.

[35] Mining pool: Score. available from


[36] Mining pool: Double geometric method. available from https://

[37] Mining pool: Bitcoin pooled mining. available from https://en.

[38] Multipool: A bitcoin, litecoin, and altcoin mining pool. available from https:


[39] Bitcoin Wiki, available from

[40] Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, pages 692-705, New York, 2015. ACM.

[41] Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. IACR Cryptology ePrint Archive, 2015:578, 2015.

[42] Ittay Eyal and Emin Gun Sirer. Majority is not enough: Bitcoin mining is vulnerable. CoRR, abs/1311.0243, 2013.

[43] Bitcoin miners ditch pool over fears of 51% attack. available from http://www.

[44] Andrew Miller, Ahmed Kosba, Jonathan Katz, and Elaine Shi. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, pages 680-691, New York, 2015. ACM.

[45] William Chambers. The breakdown: How big is real-money gaming? available from


[46] The breakdown: How big is real-money gaming? available from http://www.

[47] Provably fair. available from

[48] Satoshidice. available from

[49] [Bitcoin-development] Revisiting the BIPS process, a proposal, available from https:

// This email address is being protected from spam bots, you need Javascript enabled to view it / msg02 982.html.

[50] Mike Hearn. The resolution of the Bitcoin experiment, 2016. available from


[51] Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. Double-spending fast payments in Bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS ’12, pages 906-917, New York, 2012. ACM.

[52] Bitcoin market cap, 2015. available from


Found a mistake? Please highlight the word and press Shift + Enter  
< Prev   CONTENTS   Next >
Business & Finance
Computer Science
Language & Literature
Political science