Abstract is missing.
- How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?Dorit Ron, Adi Shamir. 3-15 [doi]
- Towards Risk Scoring of Bitcoin TransactionsMalte Möser, Rainer Böhme, Dominic Breuker. 16-32 [doi]
- Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating SystemDavid Vandervort. 33-42 [doi]
- Bitcoin: A First Legal Analysis - With Reference to German and US-American LawFranziska Boehm, Paulina Pesch. 43-54 [doi]
- Empirical Analysis of Denial-of-Service Attacks in the Bitcoin EcosystemMarie Vasek, Micah Thornton, Tyler Moore. 57-71 [doi]
- Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining PoolsBenjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore. 72-86 [doi]
- The Bitcoin P2P NetworkJoan Antoni Donet Donet, Cristina Pérez-Solà, Jordi Herrera-Joancomartí. 87-102 [doi]
- Fair Two-Party Computations via Bitcoin DepositsMarcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek. 105-121 [doi]
- Increasing Anonymity in BitcoinAmitabh Saxena, Janardan Misra, Aritra Dhar. 122-139 [doi]
- Rational Zero: Economic Security for Zerocoin with Everlasting AnonymityChristina Garman, Matthew Green 0001, Ian Miers, Aviel D. Rubin. 140-155 [doi]
- On Offline Payments with Bitcoin (Poster Abstract)Alexandra Dmitrienko, David Noack, Ahmad-Reza Sadeghi, Moti Yung. 159-160 [doi]
- One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract)Ethan Heilman. 161-162 [doi]
- From Bitcoin to the Brixton Pound: History and Prospects for Alternative Currencies (Poster Abstract)Garrick Hileman. 163-165 [doi]
- High-Speed Fully Homomorphic Encryption Over the IntegersXiaolin Cao, Ciara Moore, Máire O'Neill, Neil Hanley, Elizabeth O'Sullivan. 169-180 [doi]
- Practical and Privacy-Preserving Policy Compliance for Outsourced DataGiovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, Rebecca N. Wright. 181-194 [doi]
- Bandwidth Efficient PIR from NTRUYarkin Doröz, Berk Sunar, Ghaith Hammouri. 195-207 [doi]
- Toward Practical Homomorphic Evaluation of Block Ciphers Using PrinceYarkin Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar. 208-220 [doi]
- A Scalable Implementation of Fully Homomorphic Encryption Built on NTRUKurt Rohloff, David Bruce Cousins. 221-234 [doi]
- Restructuring the NSA Metadata ProgramSeny Kamara. 235-247 [doi]