-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathreferences.bib
More file actions
102 lines (88 loc) · 2.85 KB
/
references.bib
File metadata and controls
102 lines (88 loc) · 2.85 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
@article{nakamoto2008bitcoin,
title={Bitcoin: A Peer-to-Peer Electronic Cash System},
author={Nakamoto, Satoshi},
year={2008},
}
@inproceedings{chaum1982blind,
title={Blind Signatures for Untraceable Payments},
author={Chaum, David},
booktitle={Advances in Cryptology (CRYPTO)},
year={1982},
}
@inproceedings{dingledine2004tor,
title={Tor: The Second-Generation Onion Router},
author={Dingledine, Roger and Mathewson, Nick and Syverson, Paul},
booktitle={USENIX Security Symposium},
year={2004},
}
@inproceedings{maymounkov2002kademlia,
title={Kademlia: A Peer-to-Peer Information System Based on the XOR Metric},
author={Maymounkov, Petar and Mazieres, David},
booktitle={International Workshop on Peer-to-Peer Systems (IPTPS)},
year={2002},
}
@inproceedings{danezis2009sphinx,
title={Sphinx: A Compact and Provably Secure Mix Format},
author={Danezis, George and Goldberg, Ian},
booktitle={IEEE Symposium on Security and Privacy},
year={2009},
}
@inproceedings{chaum1988untraceable,
title={Untraceable Electronic Cash},
author={Chaum, David and Fiat, Amos and Naor, Moni},
booktitle={Advances in Cryptology (CRYPTO)},
year={1988},
}
@article{poon2016lightning,
title={The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments},
author={Poon, Joseph and Dryja, Thaddeus},
year={2016},
}
@misc{cashu2026,
title={Cashu NUT-00 through NUT-17 Specifications},
author={{cashubtc}},
howpublished={cashubtc/nuts repository},
year={2026},
note={Accessed February 2026},
}
@misc{privacypass,
title={Private Token Issuance and Redemption},
author={{Privacy Pass Working Group}},
howpublished={IETF documents},
year={2024},
}
@inproceedings{narayanan2012feasibility,
title={On the Feasibility of Internet-Scale Author Identification},
author={Narayanan, Arvind and others},
booktitle={IEEE Symposium on Security and Privacy},
year={2012},
}
@article{koppel2009computational,
title={Computational Methods in Authorship Attribution},
author={Koppel, Moshe and Schler, Jonathan and Argamon, Shlomo},
journal={Journal of the American Society for Information Science and Technology},
year={2009},
}
@inproceedings{dwork1992pricing,
title={Pricing via Processing or Combatting Junk Mail},
author={Dwork, Cynthia and Naor, Moni},
booktitle={Advances in Cryptology (CRYPTO)},
year={1992},
}
@inproceedings{gentry2009fhe,
title={Fully Homomorphic Encryption Using Ideal Lattices},
author={Gentry, Craig},
booktitle={ACM Symposium on Theory of Computing (STOC)},
year={2009},
}
@inproceedings{yao1986generate,
title={How to Generate and Exchange Secrets},
author={Yao, Andrew Chi-Chih},
booktitle={IEEE Symposium on Foundations of Computer Science (FOCS)},
year={1986},
}
@misc{bittensor2021,
title={Bittensor: A Peer-to-Peer Intelligence Market},
author={{Bittensor Foundation}},
year={2021},
}