下载 >  区块链 >  比特币 > An Analysis of Anonymity in the Bitcoin System.pdf

An Analysis of Anonymity in the Bitcoin System.pdf 评分:

Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a com- plicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one- to-many mapping between users and public-keys and associate information external to the system with t he users. Bitcoin tries to prevent this attack by storing the mapping of a user to his or her public-keys on that user’s node only and by allowing each user to generate as many public-keys as required. In this chapter we consider the topological structure of two networks derived from Bitcoin’s public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these struc- tures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.
...展开详情收缩
2019-10-09 上传大小:2.48MB
立即下载
分享
收藏 举报
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.pdf

Over the last 4 years, Bitcoin, a decentralized P2P crypto- currency, has gained widespread attention. The ability to create pseudo- anonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of an

立即下载
Handbook of Research on Wireless Security.pdf

Preface .............................................................................................................................................xxxii Acknowledgment ...........................................................................................................................xxxiv

立即下载
Anonymity Gateway v2.5 注册版(KG)+注册key 隐藏IP 清楚上网信息

Anonymity Gateway 是一款网络安全软件,可以清除你浏览过的网页信息,隐藏IP地址。

立即下载
G:\BT\CRC.Press.-.Algorithms.and.Theory.of.Computation.Handbook.Volume.II.Second.Edition.2009.Retail.Ebook-ATTiCA

Algorithms and Theory of Computation Handbook, Second Edition: Special Topics and Techniques provides an up-to-date compendium of fundamental computer science topics and techniques. It also illustrates how the topics and techniques come together to deliver efficient solutions to important practical

立即下载
Advances of DNA Computing in Cryptography

Advances of DNA Computing in Cryptography by:Suyel Namasudra and Ganesh Chandra Deka ISBN-10 书号: 0815385323 ISBN-13 书号: 9780815385325 Edition 版本: 1 出版日期: 2018-09-10 pages 页数: (197) Contents Preface Editors Authors Contributors 1:Introduction of DNA Computing in Cryptography Suyel Namasudra and Gane

立即下载
L-diversityPrivacy beyond k-anonymity

Machanavajjhala A,Gehrke J,Kifer D. L-diversity:Privacy beyond k-anonymity[A].Piscataway,NJ:IEEE 2006.专业期刊文献,介绍k匿名,l多样性必读文献之一,仅供学习专用,请勿商用。

立即下载
Anonymity 4 Proxy本地代理服务器

它是个特殊的本地代理服务器,用来管理匿名代理服务器的数据库,对于希望匿名浏览的用户来说很合适。

立即下载
(α,k)-anonymityAn enhanced k-anonymity model for privacy

K-匿名可以在数据发布前对数据进行处理,能以不超过1/ k 的概率标识元组所属的个体,降低了隐私泄漏的风险。若一个数据表满足K-匿名,且每个等价类中的敏感属性至少有L个值,则称其满足L-多样性原则。L-多样性避免了一个等价类中敏感属性取值单一的情况,使得隐私泄露风险不超过1/L。

立即下载
Security in Computing Systems 2009

Security in Computing Systems xx Table of Contents 2.3 3.2.4 Computing3.13.23.32.2.7 Confidentiality ..........................................................................43 2.2.8 Non-Observability ....................................................................44 2.2.9 Anonymity ........

立即下载
An Improved Algorithm for Tor Circuit Scheduling

Tor is a popular anonymity-preserving network, consisting of routers run by volunteers all around the world. It pro- tects Internet users' privacy by relaying their network trac through a series of routers, thus concealing the linkage be- tween the sender and the recipient. Despite the advantage of

立即下载
Network Security: Private Communication in a Public World, Second Edition

Network Security: Private Communication in a Public World, Second Edition By Charlie Kaufman, Radia Perlman, Mike Speciner ............................................... Publisher: Prentice Hall Pub Date: April 22, 2002 Print ISBN-10: 0-13-046019-2 Print ISBN-13: 978-0-13-046019-6 Web ISBN-1

立即下载
netWindows_0.3.0_pre2

RELEASE NOTES: README.txt,v 1.5 2003/02/22 06:21:57 russcoon Exp $_______________________________________________________________________________0.3.0 pre2OVERVIEW: netWindows 0.3 pre2 is fairly close to a release canidate for the 0.3 final release. What‘s included in this release: * the netWindows

立即下载
比特币去匿名

Bitcoin is the most popular of a collection of cryptocurriences that have risen to prominence in recent years, promising a de-centralized approach to currency. A belief in transaction anonymity has accompanied, and often propelled, this growth, especially among users who desire privacy. In this pape

立即下载
Linux Basics for Hackers (2018.12出版,EPUB格式)

If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools

立即下载
Ethical and Secure Computing: A Concise Module, 2nd Edition

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science) By 作者: Joseph Migga Kizza ISBN-10 书号: 3030039366 ISBN-13 书号: 9783030039363 Edition 版本: 2nd ed. 2019 出版日期: 2019-01-02 pages 页数: (285 ) $49.99 This engaging textbook highlights the essential need for a strong et

立即下载
a4proxy.exe

Anonymity 4 Proxy 安装文件

立即下载
Linux Basics for Hackers

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you’re getting sta

立即下载
Google Hacking for Penetration Testers

Product Description A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I kn

立即下载
FxPro cTrader外汇模拟交易软件

FxPro cTrader(http://www.fxpro.cn/)是一个功能强大且用户友好的交易平台,它采用经过验证的成熟技术,可帮助客户的外汇交易达到更高水平。全球活跃的交易商都非常喜欢 ECN 交易的益处。FxPro 非常高兴能够为客户提供一个平台,这里汇集了卓越功能以及来自多家全球银行的滚动报价。 FxPro(www.fxpro.cn)的交易软件,每个交易平台提供了丰富的外汇图表,专业独立的技术分析,精密平台管理和超过100项 trading instruments,如外汇,现货金属(金,银) ,差价合约,期货和股票。 FxPro 提供了一种先进的交易解决方案 - 用户友好

立即下载
uni-app前后端实战课悦读全套视频教程源码资源

uni-app前后端实战课悦读全套视频教程源码资源http://pan.baidu.com/s/1uC7M8N2fyKnUjwoPsZNLzw内含提取码

立即下载

热点文章

公告

下载码下载
做任务获取下载码
取消 提交下载码
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
输入下载码
为了良好体验,不建议使用迅雷下载
img

An Analysis of Anonymity in the Bitcoin System.pdf

会员到期时间: 剩余下载个数: 剩余C币: 剩余积分:0
为了良好体验,不建议使用迅雷下载
VIP下载
您今日下载次数已达上限(为了良好下载体验及使用,每位用户24小时之内最多可下载20个资源)

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
为了良好体验,不建议使用迅雷下载
确认下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
为了良好体验,不建议使用迅雷下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
为了良好体验,不建议使用迅雷下载
确认下载
下载
您还未下载过该资源
无法举报自己的资源

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

  • 举报人:
  • 被举报人:
  • *类型:
    • *投诉人姓名:
    • *投诉人联系方式:
    • *版权证明:
  • *详细原因: