Cryptocurrency: Most Cited Blockchain Forensic Analysis Publications
https://blockchainlibrary.org/2017/11/most-cited-blockchain-forensic-analysi... https://steemit.com/@blockchainlib/ Most Cited Blockchain Forensic Analysis Publications Last updated November 4th, 2017. “Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system“. P Resnick, R Zeckhauser. 2002. emeraldinsight.com The Economics of the Internet and …. 2072 cites. “Bitcoin and beyond: A technical survey on decentralized digital currencies“. F Tschorsch, B Scheuermann. 2016. ieeexplore.ieee.org IEEE Communications Surveys …. 80 cites. “Protocols for secure electronic commerce“. MH Sherif. 2016. books.google.com . 70 cites. “Cutting the gordian knot: A look under the hood of ransomware attacks“. A Kharraz, W Robertson, D Balzarotti, L Bilge…. 2015. Springer … on Detection of …. 57 cites. “Bitiodine: Extracting intelligence from the bitcoin network“. M Spagnuolo, F Maggi, S Zanero. 2014. Springer International Conference on Financial …. 52 cites. “Virtual currencies; Bitcoin & what now after Liberty Reserve, Silk Road, and Mt. Gox?“. LJ Trautman. 2014. papers.ssrn.com . 49 cites. “Mobile security technology“. US Patent 9,014,661. 2015. Google Patents. 48 cites. “Beyond Bitcoin: Issues in Regulating Blockchain Tranactions“. TI Kiviat. 2015. HeinOnline Duke LJ. 41 cites. “A learned representation for artistic style“. V Dumoulin, J Shlens, M Kudlur, A Behboodi…. 2016. arxiv.org arXiv preprint arXiv …. 40 cites. “Corporate governance and blockchains“. D Yermack. 2017. academic.oup.com Review of Finance. 40 cites. “Information management systems on construction projects: case reviews“. N Craig, J Sommerville. 2006. emeraldinsight.com Records Management Journal. 37 cites. “What will be the next records management orthodoxy?“. J Lappin. 2010. emeraldinsight.com Records Management Journal. 37 cites. “Bitcoin: under the hood“. A Zohar. 2015. dl.acm.org Communications of the ACM. 28 cites. “Keeping authorities” honest or bust” with decentralized witness cosigning“. E Syta, I Tamas, D Visher, DI Wolinsky…. 2016. ieeexplore.ieee.org Security and Privacy …. 26 cites. “Recordkeeping informatics: re-figuring a discipline in crisis with a single minded approach“. F Upward, B Reed, G Oliver…. 2013. emeraldinsight.com Records Management …. 25 cites. “Medrec: Using blockchain for medical data access and permission management“. A Azaria, A Ekblaw, T Vieira…. 2016. ieeexplore.ieee.org Open and Big Data (OBD …. 24 cites. “Near zero Bitcoin transaction fees cannot last forever“. K Kaskaloglu. 2014. sdiwc.net … Conference on Digital Security and Forensics …. 23 cites. “Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial Cryptography and Data …. 23 cites. “Daemon“. D Suarez. 2017. books.google.com . 16 cites. “Development of RMJ: A mirror of the development of the profession and discipline of records management“. J McLeod, C Hare. 2010. emeraldinsight.com Records Management Journal. 16 cites. “Security protocols and evidence: Where many payment systems fail“. SJ Murdoch, R Anderson. 2014. Springer … on Financial Cryptography and Data Security. 16 cites. “A survey of P2P Network security“. L Washbourne. 2015. arxiv.org arXiv preprint arXiv:1504.01358. 15 cites. “Blockchains and Bitcoin: Regulatory responses to cryptocurrencies“. A Guadamuz, C Marsden. 2015. papers.ssrn.com . 15 cites. “New Private Monies: A Bit-Part Player?“. K Dowd. 2014. papers.ssrn.com . 14 cites. “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage“. Y Yu, MH Au, G Ateniese, X Huang…. 2017. ieeexplore.ieee.org … Forensics and …. 13 cites. “Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on Dependable …. 13 cites. “On the security of key extraction from measuring physical quantities“. M Edman, A Kiayias, Q Tang…. 2016. ieeexplore.ieee.org … on Information Forensics …. 12 cites. “Diplomatics of born digital documents–considering documentary form in a digital environment“. C Rogers. 2015. emeraldinsight.com Records Management Journal. 11 cites. “Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network“. P Moreno-Sanchez, MB Zafar, A Kate. 2016. degruyter.com Proceedings on Privacy …. 11 cites. “On the properties of non-media digital watermarking: a review of state of the art techniques“. AS Panah, R Van Schyndel, T Sellis, E Bertino. 2016. ieeexplore.ieee.org IEEE Access. 11 cites. “Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications“. TM Fernández-Caramés, P Fraga-Lamas…. 2016. mdpi.com Sensors. 11 cites. “A trustless privacy-preserving reputation system“. A Schaub, R Bazin, O Hasan, L Brunie. 2016. Springer IFIP International Information …. 10 cites. “Cyberspace and cybersecurity“. G Kostopoulos. 2017. books.google.com . 10 cites. “Electronic Currency: The Potential Risks to National Security and Methods to Minimize Them“. GN Vovchenko, NE Tishchenko, VT Epifanova…. 2017. ersj.eu European Research …. 9 cites. “Tackling the wicked problem of ERM: using the Cynefin framework as a lens“. S Childs, J McLeod. 2013. emeraldinsight.com Records Management Journal. 9 cites. “Virtual Currencies: Bitcoin & What Now after Liberty Reserve, Silk Road, and Mt. Gox“. L Trautman. 2013. HeinOnline Rich. JL & Tech.. 9 cites. “Bitcoin and the uniform commercial code“. JL Schroeder. 2015. HeinOnline U. Miami Bus. L. Rev.. 8 cites. “BitIodine: extracting intelligence from the Bitcoin network“. M Spagnuolo. 2013. politesi.polimi.it . 8 cites. “Cryptocurrency-Based Law“. M Abramaowicz. 2016. HeinOnline Ariz. L. Rev.. 8 cites. “P2P Mixing and Unlinkable Bitcoin Transactions.“. T Ruffing, P Moreno-Sanchez…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …. 8 cites. “Sovereign money: Beyond reserve banking“. J Huber. 2016. books.google.com . 8 cites. “A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data“. A Ekblaw, A Azaria, JD Halamka…. 2016. healthit.gov … of IEEE Open & Big Data …. 7 cites. “A dangerous trend of cybercrime: ransomware growing challenge“. DPB Pathak, YM Nanded. 2016. ijarcet.org … Journal of Advanced Research in Computer …. 7 cites. “A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering“. Z Zhu, G Qi, Y Chai, Y Chen. 2016. mdpi.com Future Internet. 7 cites. “A Wearable Revolution: Is the smartwatch the next small big thing?“. M Kracheel, W Bronzi, H Kazemi. 2014. publications.uni.lu IT ONE Magazine 2014. 7 cites. “Cryptocurrencies: The Next Generation of Terrorist Financing?“. AE Brill, L Keene. 2014. papers.ssrn.com . 7 cites. “The Unreasonable Effectiveness of Address Clustering“. M Harrigan, C Fretter. 2016. ieeexplore.ieee.org … Cloud and Big Data Computing, Internet …. 7 cites. “An Empirical Analysis of Linkability in the Monero Blockchain“. A Miller, M Möser, K Lee, A Narayanan. 2017. arxiv.org arXiv preprint arXiv:1704.04299. 6 cites. “Apple Pay, Bitcoin, and Consumers: The ABCs of Future Public Payments Law“. ME Burge. 2015. papers.ssrn.com . 6 cites. “Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin“. K Liao, Z Zhao, A Doupé, GJ Ahn. 2016. ieeexplore.ieee.org Electronic Crime Research …. 6 cites. “Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments.“. E Gaetani, L Aniello, R Baldoni, F Lombardi…. 2017. ceur-ws.org ITASEC. 6 cites. “Cryptocurrencies and business ethics“. C Dierksmeier, P Seele. 2016. Springer Journal of Business Ethics. 6 cites. “Cryptocurrency: how bitcoin and digital money are challenging the global economic order“. P Vigna, MJ Casey. 2015. Random House . 6 cites. “International accounting standards and accounting quality in code-law countries: The case of Egypt“. IES Ebaid. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 6 cites. “Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation“. PP Jayaraman, X Yang, A Yavari…. 2017. Elsevier Future Generation …. 6 cites. “Bitcoin block withholding attack: Analysis and mitigation“. S Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org … on Information Forensics and …. 5 cites. “Bitcoin-based fair payments for outsourcing computations of fog devices“. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier Future Generation Computer …. 5 cites. “Entering the matrix: the challenge of regulating Radical Leveling Technologies“. JJ Snow. 2015. calhoun.nps.edu . 5 cites. “Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R Osborne, P Pacifico. 2016. eprints.mdx.ac.uk . 5 cites. “Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability“. X Liang, S Shetty, D Tosh, C Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …. 5 cites. “The implications of economic cybercrime for policing“. M Levi, A Doig, R Gundur, D Wall, ML Williams. 2016. orca.cf.ac.uk . 5 cites. “Tomorrow’s Inheritance: The Frontiers of Estate Planning Formalism“. D Horton. 2017. HeinOnline BCL Rev.. 5 cites. ““Justice delayed is justice denied” Records management and the travesty of justice in South Africa“. M Ngoepe, S Makhubela. 2015. emeraldinsight.com Records Management Journal. 4 cites. “A New Framework for a Novel Lattice: 3D Printers, DNA Fabricators, and the Perils in Regulating the Raw Materials of the Next Era of Revolution, Renaissance, and …“. P Jensen-Haxel. 2015. HeinOnline Wake Forest JL & Pol’y. 4 cites. “Optimizing Governed Blockchains for Financial Process Authentications“. LN Lundbaek, AC D’Iddio, M Huth. 2016. arxiv.org arXiv preprint arXiv:1612.00407. 4 cites. “Security of Electronic Payment Systems: A Comprehensive Survey“. S Solat. 2017. arxiv.org arXiv preprint arXiv:1701.04556. 4 cites. “The Decision to Produce Altcoins: Miners’ Arbitrage in Cryptocurrency Markets“. A Hayes. 2015. papers.ssrn.com Browser Download This Paper. 4 cites. “Towards automated threat intelligence fusion“. A Modi, Z Sun, A Panwar, T Khairnar…. 2016. ieeexplore.ieee.org … (CIC), 2016 IEEE …. 4 cites. “A review of existing and emerging digital technologies to combat the global trade in fake medicines“. TK Mackey, G Nayyar. 2017. Taylor & Francis Expert Opinion on Drug Safety. 3 cites. “A Survey on Security and Privacy Issues of Bitcoin“. M Conti, C Lal, S Ruj. 2017. arxiv.org arXiv preprint arXiv:1706.00916. 3 cites. “A Traceability Analysis of Monero’s Blockchain.“. A Kumar, C Fischer, S Tople, P Saxena. 2017. eprint.iacr.org IACR Cryptology ePrint …. 3 cites. “Decentralizing authorities into scalable strongest-link cothorities“. E Syta, I Tamas, D Visher…. 2015. pdfs.semanticscholar.org CoRR, abs …. 3 cites. “Electronic Voting Service Using Block-Chain“. K Lee, JI James, TG Ejeta…. 2016. search.proquest.com … Journal of Digital Forensics …. 3 cites. “Investment funds, shadow banking and systemic risk“. E Bengtsson. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 3 cites. “Money“. J Huber. 2017. Springer Sovereign Money. 3 cites. “Radical Technologies: The Design of Everyday Life“. A Greenfield. 2017. books.google.com . 3 cites. “Security implications of blockchain cloud with analysis of block withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …. 3 cites. “The Board’s Responsibility for Crisis Governance“. LJ Trautman. 2016. HeinOnline Hastings Bus. LJ. 3 cites. “The Scandal of Money: Why Wall Street Recovers But the Economy Never Does“. G Gilder. 2016. books.google.com . 3 cites. “The use of crypto-currencies in funding violent jihad“. ASM Irwin, ASM Irwin, G Milad…. 2016. emeraldinsight.com Journal of Money …. 3 cites. “The WPA-Lancet Psychiatry Commission on the Future of psychiatry“. D Bhugra, A Tasman, S Pathare, S Priebe, S Smith…. 2017. Elsevier The Lancet …. 3 cites. “Using crime data in academic research: issues of comparability and integrity“. A Ludwig, M Marshall. 2015. emeraldinsight.com Records Management Journal. 3 cites. “Why Won’t Johnny Encrypt?“. H Orman. 2015. ieeexplore.ieee.org IEEE Internet Computing. 3 cites. “A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.“. R Bazin, A Schaub, O Hasan…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …. 2 cites. “A Probabilistic Nanopayment Scheme for Golem“. P Bylica, L Glen, P Janiuk, A Skrzypcaz, A Zawlocki. 2015. golemproject.net . 2 cites. “Analysis of the Cryptocurrency Marketplace“. A Heid. 2013. hackmiami.org Retrieved February. 2 cites. “BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments“. Q Xia, EB Sifah, A Smahi, S Amofa, X Zhang. 2017. mdpi.com Information. 2 cites. “Cyber Guerilla“. J Van Haaster, R Gevers, M Sprengers. 2016. books.google.com . 2 cites. “Cybersecurity problems in a typical hospital (and probably in all of them)“. H Thimbleby. 2017. cronfa.swan.ac.uk . 2 cites. “Developing a comprehensive information security framework for mHealth: a detailed analysis“. N Vithanwattana, G Mapp, C George. 2017. Springer Journal of Reliable Intelligent …. 2 cites. “Digital Forensics: Threatscape and Best Practices“. J Sammons. 2015. books.google.com . 2 cites. “Knowledge discovery from within: An examination of records management and electronic records management syllabi“. DC Force, DC Force, J Zhang…. 2016. emeraldinsight.com Records Management …. 2 cites. “Peer-to-peer law, built on Bitcoin“. MB Abramowicz. 2015. scholarship.law.gwu.edu . 2 cites. “Publics and counterpublics on the front page of the internet: The cultural practices, technological affordances, hybrid economics and politics of reddit’s public …“. NJ Springer. 2015. search.proquest.com . 2 cites. “Real-time digital signatures for time-critical networks“. AA Yavuz, A Mudgerikar, A Singla…. 2017. ieeexplore.ieee.org … Forensics and …. 2 cites. “Research Ideas for Artificial Intelligence in Auditing: The Formalization of Audit and Workforce Supplementation“. H Issa, T Sun, MA Vasarhelyi. 2016. aaajournals.org Journal of Emerging Technologies …. 2 cites. “Rich Credentials for Remote Identity Proofing“. K Lewison, F Corella. 2016. pomcor.com . 2 cites. “Scaling SPADE to “Big Provenance”“. A Gehani, H Kazmi, H Irshad. 2016. usenix.org … of the 8th USENIX Conference on Theory …. 2 cites. “Scoping: Exploring a collective R&D process for entrepreneurs, microenterprises, and SMEs“. S COULSON, M WOODS. 2016. discovery.dundee.ac.uk the Proceedings of the 20th DMI …. 2 cites. “Silicon to syringe: Cryptomarkets and disruptive innovation in opioid supply chains“. M Gilbert, N Dasgupta. 2017. Elsevier International Journal of Drug Policy. 2 cites. “Social Palimpsests–Clouding the Lens of the Personal Panopticon“. N SHADBOLT. 2014. books.google.com … Yearbook 2014: Social Networks and Social …. 2 cites. “Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks“. J Dilley, A Poelstra, J Wilkins, M Piekarska…. 2016. arxiv.org arXiv preprint arXiv …. 2 cites. “Sustainability of bitcoin and blockchains“. H Vranken. 2017. Elsevier Current Opinion in Environmental Sustainability. 2 cites. “Systems and methods for executing cryptographically secure transactions using voice and natural language processing“. MS Meadows. 2015. Google Patents US Patent App. 14/668,882. 2 cites. “The Alpha Engine: Designing an Automated Trading Algorithm“. A Golub, J Glattfelder, RB Olsen. 2017. papers.ssrn.com . 2 cites. “The Anthropocene, resilience and post-colonial computation“. D McQuillan. 2017. Taylor & Francis Resilience. 2 cites. “the Deep Web“. V Ciancaglini, M Balduzzi, R McArdle, M Rösler. 2015. trendmicro.nl Trend Micro. 2 cites. “The economics of crypto-democracy“. DWE Allen, C Berg, AM Lane, J Potts. 2017. papers.ssrn.com . 2 cites. “Towards self-sovereign identity using blockchain technology“. DS Baars. 2016. essay.utwente.nl . 2 cites. “Trust Implications of DDoS Protection in Online Elections“. C Culnane, M Eldridge, A Essex, V Teague. 2017. Springer … Joint Conference on …. 2 cites. “Virtual currencies and the implications for US anti-money laundering regulations“. BA Pamplin. 2014. search.proquest.com . 2 cites. “What happened to global banking after the crisis?“. D Schoenmaker, D Schoenmaker. 2017. emeraldinsight.com Journal of Financial …. 2 cites. “A forensic look at Bitcoin cryptocurrency“. MD Doran. 2014. search.proquest.com . 1 cites. “An Analysis of Attacks on Blockchain Consensus“. G Bissias, BN Levine, AP Ozisik…. 2016. arxiv.org arXiv preprint arXiv …. 1 cites. “An Efficient E2E Verifiable E-voting System without Setup Assumptions“. A Kiayias, T Zacharias, B Zhang. 2017. ieeexplore.ieee.org IEEE Security & Privacy. 1 cites. “An Introduction to the Blockchain and Its Implications for Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical Reference Services Quarterly. 1 cites. “Anonymity Properties of the Bitcoin P2P Network“. G Fanti, P Viswanath. 2017. arxiv.org arXiv preprint arXiv:1703.08761. 1 cites. “As technology goes democratic, nations lose military control“. B FitzGerald, J Parziale. 2017. Taylor & Francis Bulletin of the Atomic Scientists. 1 cites. “Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks“. C Wressnegger, K Freeman, F Yamaguchi…. 2017. dl.acm.org … of the 2017 ACM on Asia …. 1 cites. “Autonomous Weapon Systems and Strategic Stability“. J Altmann, F Sauer. 2017. iiss.tandfonline.com Survival. 1 cites. “BITCOIN COMO ALTERNATIVA TRANSVERSAL DE INTERCAMBIO MONETARIO EN LA ECONOMÍA DIGITAL“. ZJP Cárdenas, MAV Avellaneda…. 2015. revistas.udistrital.edu.co Redes de …. 1 cites. “Bitcoin, the Law and Emerging Public Policy: Towards a 21st Century Regulatory Scheme“. GM Karch. 2014. HeinOnline Fla. A & M UL Rev.. 1 cites. “Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)“. ST Ali. 2015. Springer Cambridge International Workshop on Security …. 1 cites. “BitIodine: Extracting Intelligence from the Bitcoin Network“. F Maggi, S Zanero, M Spagnuolo. 2014. . 1 cites. “Cloud as a Service: Understanding the Service Innovation Ecosystem“. E Castro-Leon, R Harmon. 2016. books.google.com . 1 cites. “Conflict of Laws Cross to Public International Laws: The Conflicting Models in the Conceptualisation of Disability Rights Under International Humanitarian Law and …“. I Mugabi. 2015. papers.ssrn.com . 1 cites. “Cyberinsurance Value Generator or Cost Burden?“. SK Ishaq, C CISA. 2016. isaca.org . 1 cites. “Data Analytics and Big Data: Opportunity or Threat for the Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos, C Wong. 2016. papers.ssrn.com . 1 cites. “Dealer, Hacker, Lawyer, Spy. Modern Techniques and Legal Boundaries of Counter-cybercrime Operations“. K Bojarski. 2015. academia.edu The European Review of Organised Crime. 1 cites. “Digital diplomatics and forensics: going forward on a global basis“. FB Cohen. 2015. emeraldinsight.com Records Management Journal. 1 cites. “Digital diplomatics and measurement of electronic public data qualities: What lessons should be learned?“. B Makhlouf Shabou. 2015. emeraldinsight.com Records Management Journal. 1 cites. “Digital Preservation: From Possible to Practical“. G Dingwall. 2017. books.google.com Currents of Archival Thinking. 1 cites. “Disrupting Agents, Distributing Agency“. CHP Zuckerman. 2017. books.google.com Distributed Agency. 1 cites. “How companies achieve balance between technology enabled innovation and cyber-security“. NNN Nelson. 2016. dspace.mit.edu . 1 cites. “Incentivizing blockchain forks via whale transactions“. K Liao, J Katz. 2017. cs.umd.edu Bitcoin Workshop. 1 cites. “Information Security and Privacy“. JK Liu, R Steinfeld. 2007. Springer . 1 cites. “Macroprudential policy–closing the financial stability gap“. S Fahr, S Fahr, J Fell, J Fell. 2017. emeraldinsight.com Journal of Financial Regulation …. 1 cites. “MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain“. Q Xia, EB Sifah, KO Asamoah, J Gao, X Du…. 2017. ieeexplore.ieee.org IEEE …. 1 cites. “MOBILE SECURITY TECHNOLOGY“. C Decharms. 2016. freepatentsonline.com US Patent 20,160,192,166. 1 cites. “NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users“. A Fu, S Yu, Y Zhang, H Wang…. 2017. ieeexplore.ieee.org IEEE Transactions on Big …. 1 cites. “Object-oriented diplomatics: Using archival diplomatics in software application development to support authenticity of digital records“. A Jansen. 2015. emeraldinsight.com Records Management Journal. 1 cites. “P2P Mixing and Unlinkable P2P Transactions“. P Moreno-Sanchez, T Ruffing, A Kate. 2016. pdfs.semanticscholar.org Draft, June. 1 cites. “Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging“. Z Chen, Y Zhu. 2017. ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE …. 1 cites. “Preserving the Archival Bond in Distributed Ledgers: A Data Model and Syntax“. VL Lemieux, M Sporny. 2017. dl.acm.org … of the 26th International Conference on World …. 1 cites. “Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts“. F Knirsch, A Unterweger, G Eibl, D Engel. 2018. Springer Sustainable Cloud and Energy …. 1 cites. “Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. researchgate.net Proceedings of the International …. 1 cites. “Revisiting the effect of regulation, supervision and risk on banking performance: Evidence from European banks based on PSTR model“. H Rachdi, F Ben Bouheni. 2016. emeraldinsight.com Journal of Financial Regulation and …. 1 cites. “Securing Claim Data via Block-Chains for a Peer to Peer Platform“. W Slavin. 2016. Google Patents US Patent App. 15/004,702. 1 cites. “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes“. MA Ferrag, L Maglaras, A Argyriou…. 2017. arxiv.org arXiv preprint arXiv …. 1 cites. “Short selling and the development of anti-shorting laws in the UK“. A Mohamad. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 1 cites. “Software independence revisited“. RL Rivest, M Virza. 2017. people.csail.mit.edu … -World Electronic Voting: Design, Analysis …. 1 cites. “Solving Modern Crime in Financial Markets: Analytics and Case Studies“. MC Frunza. 2015. books.google.com . 1 cites. “System and method for data management structure using auditable delta records in a distributed environment“. S Grefen, A Jaehde, D Mackie. 2016. Google Patents US Patent App. 15/367,873. 1 cites. “The 21st Century Case for Gold: A New Information Theory of Money“. G Gilder. 2016. thescienceexperience.org . 1 cites. “The Adoption Process of Cryptocurrencies-Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective“. HF Spenkelink. 2014. essay.utwente.nl . 1 cites. “The Challenge of Bitcoin Pseudo-Anonymity to Computer Forensics“. EJ Imwinkelried, J Luu. 2015. papers.ssrn.com . 1 cites. “The crowdjury, a crowdsourced justice system for the collaboration era“. F Ast, A Sewrjugin. 2015. weusecoins.com . 1 cites. “The measurement and regulation of shadow banking in Ireland“. J Stewart, J Stewart, C Doyle…. 2017. emeraldinsight.com Journal of Financial …. 1 cites. “The New Market Manipulation“. TCW Lin. 2016. HeinOnline Emory LJ. 1 cites. “The Tao of open source intelligence“. S Bertram. 2015. books.google.com . 1 cites. “Time intervals as a Behavioral Biometric“. JV Monaco. 2015. researchgate.net . 1 cites. “Towards an internet of trust: issues and solutions for identification and authentication in the internet of things“. M Signorini. 2015. tdx.cat . 1 cites. “Tracking digital footprints: anonymity within the bitcoin system“. P Reynolds, P Reynolds, ASM Irwin…. 2017. emeraldinsight.com Journal of Money …. 1 cites. “Uncoupling the relationship between corruption and money laundering crimes“. N Mugarura. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance. 1 cites. “Virtual Currencies and Fundamental Rights“. C Rueckert. 2016. papers.ssrn.com Browser Download This Paper. 1 cites. “Visualization and Data Provenance Trends in Decision Support for Cybersecurity“. J Garae, RKL Ko. 2017. Springer Data Analytics and Decision Support for Cybersecurity. 1 cites. “When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies“. S Goldfeder, H Kalodner, D Reisman…. 2017. arxiv.org arXiv preprint arXiv …. 1 cites. “Точки экономического и инновационного роста: модель организации эффективного функционирования региона“. ДД Буркальцева. 2017. cyberleninka.ru МИР (Модернизация. Инновации. Развитие). 1 cites. ““SMART” CONTRACT MARKETS: TRADING DERIVATIVES CONTRACTS ON THE BLOCKCHAIN“. TI KIVIAT. 2015. pdfs.semanticscholar.org . 0 cites. “11th USENIX Symposium on Networked Systems Design and Implementation“. S IX. 2016. enigma.usenix.org . 0 cites. “12 Social media’s impact on intellectual property rights“. D Collopy. 2017. books.google.com Handbook of Research on Counterfeiting and Illicit …. 0 cites. “3TH1CS: A reinvention of ethics in the digital age?“. P Otto, E Gräf. 2017. iRights Media . 0 cites. “4.25 Chromatic index/edge coloring“. M Lewenstein, S Pettie…. 2017. vesta.informatik.rwth-aachen.de … and Hardness in …. 0 cites. “4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy …“. PH Jones, KM Dye. 2016. dtic.mil . 0 cites. “4-D printing (four-dimensional printing)“. A Rajey. 0. tngconsultores.com. 0 cites. “A Bibliography of O’Reilly & Associates and O’Reilly Media. Inc. Publishers“. NHF Beebe. 2017. 155.101.98.136 . 0 cites. “A blockchain future to Internet of Things security: A position paper“. M Banerjee, J Lee, KKR Choo. 2017. Elsevier Digital Communications and Networks. 0 cites. “A Block-Chain Implemented Voting System“. F Caiazzo, M Chow. 2016. cs.tufts.edu . 0 cites. “A Comprehensive Insight towards Research Direction in Information Propagation“. N Kayarvizhy. 0. researchgate.net. 0 cites. “A conceptual framework for the Basel accords-based regulation“. J Mohammed Ahmed. 2016. emeraldinsight.com Journal of Financial Regulation and …. 0 cites. “A Cross-Sectional Overview of Cryptoasset Governance and Implications for Investors“. N Carter. 0. coinmetrics.io. 0 cites. “A Distributed Public Key Infrastructure for the Web Backed by a Blockchain“. B Fredriksson. 2017. diva-portal.org . 0 cites. “A Distributed X. 509 Public Key Infrastructure Backed by a Blockchain“. B Fredriksson. 2017. helix.stormhub.org . 0 cites. “A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS“. C Zhao, Y Guan. 2015. Springer IFIP International Conference on Digital Forensics. 0 cites. “A novel method to authenticate in website using CAPTCHA‐based validation“. SK Krishnamoorthy…. 2016. Wiley Online Library Security and …. 0 cites. “A platform for end-to-end mobile application infrastructure analytics using system log correlation“. V Ramakrishna, N Rajput…. 2017. ieeexplore.ieee.org IBM Journal of …. 0 cites. “A proposal to improve the authentication process in m-health environments“. FD Guillén-Gámez, I García-Magariño…. 2017. ieeexplore.ieee.org IEEE …. 0 cites. “A restful e-health interoperability platform: case of Nairobi County health facilities“. DK Rono. 2016. su-plus.strathmore.edu . 0 cites. “A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications“. S Rostampour, N Bagheri, M Hosseinzadeh…. 2017. Springer The Journal of …. 0 cites. “A study of Bitcoin as a currency for email-based micro-transactions“. B Eriksson. 2016. diva-portal.org . 0 cites. “A Survey on FinTech“. K Gai, M Qiu, X Sun. 2017. Elsevier Journal of Network and Computer Applications. 0 cites. “A Text-Independent Speaker Authentication System for Mobile Devices“. F Thullier, B Bouchard, BAJ Menelas. 2017. mdpi.com Cryptography. 0 cites. “Adaptation 12 strategies of cybercriminals to interventions from public and private sectors“. F Jansen, J van Lenthe. 2016. books.google.com Cybercrime Through an Interdisciplinary …. 0 cites. “Advance Program“. P MobiApps, E SNAMS, ABA SITA. 2016. ficloud.org . 0 cites. “Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30-February 1, 2017, Revised Selected Papers“. G Peterson, S Shenoi. 2017. books.google.com . 0 cites. “Advances in Internetworking, Data & Web Technologies: The 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT …“. L Barolli, M Zhang, XA Wang. 2017. books.google.com . 0 cites. “Algorithmic governance: Developing a research agenda through the power of collective intelligence“. J Danaher, MJ Hogan, C Noone…. 2017. journals.sagepub.com Big Data & …. 0 cites. “Alumni US“. JP Mitrovic. 2010. alumnius.net The Center for Leadership Studies Network at the …. 0 cites. “Amazon Cloud Journal“. PR Newswire. 0. amazon.ulitzer.com. 0 cites. “American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road“. N Bilton. 2017. books.google.com . 0 cites. “American Kingpin: The Epic Hunt for the Criminal Mastermind behind the Silk Road Drugs Empire“. N Bilton. 2017. Random House . 0 cites. “An Analysis of Energy and Hardware Impacts on the Bitcoin Mining Network“. J LEE, Y KIM. 0. jakehlee.com. 0 cites. “An approach for initiating interventions for bank recovery“. CAE Goodhart, CAE Goodhart…. 2017. emeraldinsight.com Journal of Financial …. 0 cites. “An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“. K Markantonakis. 2017. books.google.com Trust, Privacy and Security in Digital Business …. 0 cites. “An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“. C Shepherd, FAP Petitcolas, RN Akram…. 2017. Springer … Conference on Trust …. 0 cites. “An Innovative Merger of Academe and Corporation: A Non-Thesis Distance Computing Masters’ Degree with IBM Open Badging Technologies“. RF Roggio, K Shaik. 2017. search.proquest.com International Conference on Computer …. 0 cites. “Analysis of Bitcoin Transaction Flows to Reveal Usage and Geographic Patterns“. SP Bissessar. 2013. nicolascourtois.com The New York Times. 0 cites. “Analysis of Present Day Election Processes Vis-À-Vis Elections Through Blockchain Technology“. K Hegadekatti. 2017. papers.ssrn.com . 0 cites. “Analysis of the impact of technological advances on financial institutions“. MJ Michalow. 2016. search.proquest.com . 0 cites. “and the Chair of the Applied Economics Department at the Sapir Academic College. His main areas of interest are innovation and high-tech policy, economic growth …“. R Bar-El. 2017. emeraldinsight.com Human Capital and Assets in the Networked World. 0 cites. “Arbitrage and International Trade and Finance“. K Doshi. 2017. qrius.com Science. 0 cites. “Artificial Intelligence and Blockchains in financial services. Potential applications, challenges, and risks“. A Shet Shirodkar. 2017. content.grin.com . 0 cites. “Artificial Intelligence–Fact or Fiction“. KVN Rajesh, KVN Ramesh. 2012. csi-india.org Computing NaNo. 0 cites. “Authenticated Data Redaction with Fine-Grained Control“. J Ma, J Liu, X Huang, Y Xiang…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 0 cites. “Authorization by Documents“. H Sato. 2017. jstage.jst.go.jp Journal of Information Processing. 0 cites. “Automated Workflow Scheduling in Self-Adaptive Clouds: Concepts, Algorithms and Methods“. G Kousalya, P Balakrishnan, CP Raj. 2017. Springer . 0 cites. “Automating the accounts payable process“. M Heusser. 0. tngconsultores.com. 0 cites. “Automating the accounts payable process“. M Heusser. 0. tngconsultores.com. 0 cites. “Backchanneling Quantum Bit (Qubit)’Shuffling’: Quantum Bit (Qubit)’Shuffling’as Added Security by Slipstreaming Q-Morse“. J Ronczka. 2016. ieeexplore.ieee.org Computer Science and Engineering (APWC on …. 0 cites. “Bare Feet Pat The Earth: Hardships, Future And Legislations For The Salt Pan Workers In Kutch“. K Doshi. 2017. qrius.com Science. 0 cites. “Big Data Analytics: Opportunity or Threat for the Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos…. 2017. aaajournals.org Journal of Information …. 0 cites. “Big Data on Ulitzer“. M Walker, K Irwin. 0. bigdata.ulitzer.com. 0 cites. “Big Data Orchestration as a Service Network“. C Esposito, A Castiglione…. 2017. ieeexplore.ieee.org IEEE Communications …. 0 cites. “Bioengineering and biocrime“. V Sutton. 2017. books.google.com The Routledge Handbook of Technology, Crime and …. 0 cites. “Bitcoin as an investment asset: The added value of bitcoin in a global market portfolio“. S Klabbers. 2017. theses.ubn.ru.nl . 0 cites. “Bitcoin forensics: a tutorial“. D Neilson, S Hara, I Mitchell. 2017. Springer … Conference on Global Security, Safety, and …. 0 cites. “Bitcoin regulations and investigations: A proposal for US policies“. JP Fawcett. 2017. search.proquest.com . 0 cites. “Bitcoin: Between Digital Currency and Financial Commodity“. ML Perugini, C Maioli. 2014. papers.ssrn.com . 0 cites. “Bitcoin: Pyramid-scheme Wildfire, New Online Payment Medium, or Future Alternative Currency?“. H Vozak. 0. dspace.cuni.cz. 0 cites. “BITCOIN-BANKING AND TECHNOLOGICAL CHALLENGES“. G Kunjadić. 0. . 0 cites. “BitIodine: Extracting Intelligence from the Bitcoin Network“. D NECSTLab. 2014. books.google.com Financial Cryptography and Data Security: 18th …. 0 cites. “BLOCK CHAIN BASED DATA LOGGING AND INTEGRITY MANAGEMENT SYSTEM FOR CLOUD FORENSICS“. JH Park, JY Park, EN Huh. 0. pdfs.semanticscholar.org. 0 cites. “Blockchain and Distributed Ledgers as Trusted Recordkeeping Systems“. VL Lemieux. 0. researchgate.net. 0 cites. “Blockchain as an Audit-Able Communication Channel“. S Suzuki, J Murai. 2017. ieeexplore.ieee.org Computer Software and Applications …. 0 cites. “Blockchain as an enabler for public mHealth solutions in South Africa“. M WEISS, A BOTHA, M HERSELMAN, G LOOTS. 0. researchgate.net. 0 cites. “Blockchain entrepreneurship opportunity in the practices of the unbanked“. GJ Larios-Hernández. 2017. Elsevier Business Horizons. 0 cites. “Blockchain Explorer: An Analytical Process and Investigation Environment for Bitcoin“. H Kuzuno, C Karam. 0. ieeexplore.ieee.org. 0 cites. “Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security“. M Mylrea, SNG Gourisetti. 2017. ieeexplore.ieee.org Resilience Week (RWS), 2017. 0 cites. “Blockchain for the people: Blockchain technology as the basis for a secure and reliable e-voting system“. M Kovic. 2017. osf.io . 0 cites. “Blockchain or not blockchain, that is the question of the insurance and other sectors“. F Lamberti, V Gatteschi, C Demartini…. 2017. ieeexplore.ieee.org IT …. 0 cites. “Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions“. JH Park, JH Park. 2017. mdpi.com Symmetry. 0 cites. “Blockchain: Emergent Industry Adoption and Implications for Accounting“. J Kokina, R Mancha…. 2017. aaajournals.org Journal of Emerging …. 0 cites. “Blockchain: Vision and Challenges“. G Caglar, YS Hanay. 2016. internetinitiative.ieee.org Newsletter. 0 cites. “Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms“. A Judmayer, N Stifter, K Krombholz…. 2017. morganclaypool.com Synthesis Lectures on …. 0 cites. “BlockSci: Design and applications of a blockchain analysis platform“. H Kalodner, S Goldfeder, A Chator, M Möser…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites. “Bobbies on the net: a police workforce for the digital age“. A Hitchcock, R Holmes, E Sundorph. 2017. reform.uk . 0 cites. “Breaking Data as a Service News“. PR Newswire. 0. daas.ulitzer.com. 0 cites. “Breaking van Gogh: Saint-Rémy, Forgery, and the $95 Million Fake at the Met“. JO Grundvig. 2016. books.google.com . 0 cites. “Buying Votes in the 21st Century: The Potential Use of Bitcoins and Blockchain Technology in Electronic Voting Reform“. B Bogucki. 2017. HeinOnline Asper Rev. Int’l Bus. & Trade L.. 0 cites. “by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o Milestones. 0. tngconsultores.com. 0 cites. “by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o Milestones. 0. tngconsultores.com. 0 cites. “Call for Participants“. JPY Regular, FT Student. 0. jstage.jst.go.jp. 0 cites. “Career Summary“. BM David. 0. bmdavid.com. 0 cites. “CEOs in Technology“. FDA First. 0. ceo.ulitzer.com. 0 cites. “CHANGE HISTORY“. S Martín. 0. truessec.eu. 0 cites. “Changing the Practice of Law Leadership“. K Grady. 0. seytlines.com. 0 cites. “Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime?“. P Amann, A Klayn, G Mounier. 2017. ingentaconnect.com Cyber Security: A Peer …. 0 cites. “Characterization of Counterfeit and Substandard Medicines Using Capillary Electrophoresis“. JSS Rudaz. 2016. chromatographyonline.com . 0 cites. “Child abuse materials as digital goods: Why we should fear new commercial forms“. KV Acar. 2017. econstor.eu . 0 cites. “Chuncan Deng, Cheng Yang, Fangyong Xiao, Dajie Suolang and Wenshan She. Accurate Recognition and Extraction of Massive Device Monitoring Signals Based …“. AR Arban Uka, O Tahan, R Hawchar, F Matar. 0. ieeexplore.ieee.org Algorithms. 0 cites. “Cloud as a Service“. E Castro-Leon, R Harmon. 0. Springer. 0 cites. “Cloud Computing as a Service“. E Castro-Leon, R Harmon. 2016. Springer Cloud as a Service. 0 cites. “Cloud Storage: Background and Related Work“. J Reardon. 2016. Springer Secure Data Deletion. 0 cites. “Command Disaggregation Attack and Mitigation in Industrial Internet of Things“. P Xun, PD Zhu, YF Hu, PS Cui, Y Zhang. 2017. mdpi.com Sensors. 0 cites. “Cómo funciona blockchain: Una explicación infográfica“. E McLaughlin. 0. tngconsultores.com. 0 cites. “Computer Security–ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings“. SN Foley, D Gollmann, E Snekkenes. 2017. books.google.com . 0 cites. “CONNECTING MULTIPLE DEVICES WITH BLOCKCHAIN IN THE INTERNET OF THINGS“. JJ Karst, G Brodar. 0. courses.cs.ut.ee. 0 cites. “Conspiracy Theories and Their Investigator (s), Matthew RX Dentith“. MRX Dentith. 0. social-epistemology.com. 0 cites. “Constructing Narrative in the Contemporary Music Industries“. K Barr. 2017. joebennett.net Presented at IASPM. 0 cites. “Contemplating human-centred security & privacy research: Suggesting future directions“. K Renaud, S Flowerday. 2017. Elsevier Journal of Information Security and Applications. 0 cites. “Contributions to Content Placement, Load-balancing and Caching: System Design and Security“. C Neumann. 2016. hal.inria.fr . 0 cites. “Controlling Cyberspace“. D Lewis. 2017. qrius.com History. 0 cites. “Critical analysis and comparison of data protection techniques for genomics data sets“. D Naro. 2016. upcommons.upc.edu . 0 cites. “CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing“. M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, J Liu. 0. eprint.iacr.org. 0 cites. “Cryptocurrency the new money laundering problem for banking, law enforcement, and the legal system“. T Jacquez. 2016. search.proquest.com . 0 cites. “Cryptographic Key Management in Delay Tolerant Networks: A Survey“. SA Menesidou, V Katos, G Kambourakis. 2017. mdpi.com Future Internet. 0 cites. “Cryptography“. B Buchanan. 2017. books.google.com . 0 cites. “Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing“. A Haouari, Z Mostapha, S Yassir. 2018. igi-global.com Cloud Computing Technologies for …. 0 cites. “Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings“. S Wen, W Wu, A Castiglione. 2017. books.google.com . 0 cites. “Cyber-und Computerkriminalität: Prüfung doloser Handlungen“. A Sowa. 2017. Springer Management der Informationssicherheit. 0 cites. “Cyrilic encryption based image Steganography algorithm“. V Shah. 2017. irjet.net . 0 cites. “D4. 1 Findings on economic modelling of malware as business model“. D Hurley-Smith. 0. . 0 cites. “Damon Liwanu McCoy“. CAD Grunwald, D Sicker. 0. pdfs.semanticscholar.org. 0 cites. “Darknet Forensics“. D Rathod. 0. ijettcs.org future. 0 cites. “Data and the City“. R Kitchin, TP Lauriault, G McArdle. 2017. books.google.com . 0 cites. “Data provenance assurance in the cloud using blockchain“. S Shetty, V Red, C Kamhoua, K Kwiat…. 2017. spiedigitallibrary.org … in Sensors and …. 0 cites. “Decentralized enforcement of document lifecycle constraints“. S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone. 2017. Elsevier Information Systems. 0 cites. “DECIPHERING CRYPTOCURRENCY: SHINING A LIGHT ON THE DEEP DARK WEB“. C DiPiero. 2017. litigation-essentials.lexisnexis.com U. Ill. L. Rev.. 0 cites. “Deep web: Challenges of catching the cyber criminal“. N Williamson. 2014. search.proquest.com . 0 cites. “Defence Against Terrorism Review-DATR“. A Richards. 0. researchgate.net. 0 cites. “Defining cybercrime based on roles of data processing systems“. X Li. 2016. search.informit.com.au Pandora’s Box. 0 cites. “Deliverable D5. 2.1-Conception Exploitation plan“. P Meyer, M Weinrich, S Custic, D Tofan, W Tremmel…. 0. acdc-project.eu. 0 cites. “De-SAG: On the De-anonymization of Structure-Attribute Graph Data“. S Ji, T Wang, J Chen, W Li, P Mittal…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 0 cites. “Developing an adaptive Risk-based access control model for the Internet of Things“. HF Atlam, A Alenezi, RJ Walters, GB Wills, J Daniel. 2017. researchgate.net . 0 cites. “Development of Secure and Reliable Techniques for Data Communication“. A Mileva, P RM Inácio, S Bouyuklieva, N Stojkovic…. 2017. eprints.ugd.edu.mk . 0 cites. “Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis) Used by Carders on Cryptomarkets“. GJ van Hardeveld, C Webber…. 2017. journals.sagepub.com American Behavioral …. 0 cites. “Digital Currencies: Unlocking the Secrets of Crypto-Currencies“. D Peterson. 2017. books.google.com . 0 cites. “Digital Currency: Risks, Rewards and Investigative Techniques“. P Kraus. 2017. search.proquest.com . 0 cites. “Digital Forensic Implications of Collusion Attacks on the Lightning Network“. D Piatkivskyi, S Axelsson, M Nowostawski. 2017. Springer … on Digital Forensics. 0 cites. “Digital forensics: The smart person’s guide“. D Patterson. 0. tngconsultores.com. 0 cites. “Digital forensics: The smart person’s guide“. D Patterson. 0. tngconsultores.com. 0 cites. “Digital image integrity–a survey of protection and verification techniques“. P Korus. 2017. Elsevier Digital Signal Processing. 0 cites. “Digital Watermarking of Non-media data stream (applications)“. A Soltani Panah. 2017. researchbank.rmit.edu.au . 0 cites. “Digital Witness and Privacy in IoT: Anonymous Witnessing Approach“. A Nieto, R Rios, J Lopez. 2017. ieeexplore.ieee.org Trustcom/BigDataSE/ICESS, 2017 …. 0 cites. “Digitaler Tatort, Sicherung und Verfolgung digitaler Spuren“. D Pawlaszczyk. 2017. Springer Forensik in der digitalen Welt: Moderne Methoden der …. 0 cites. “Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things“. M Henze, B Wolters, R Matzutt…. 2017. ieeexplore.ieee.org … /ICESS, 2017 IEEE. 0 cites. “Do vouchers make a difference? A study of vouchers for improving organizational capabilities in firms“. E Magro. 2016. delegia.com EU-SPRI CONFERENCE LUND 2016. 0 cites. “Don’t Dirty Green!“. R Suryaprakash. 2017. qrius.com Science. 0 cites. “ED TECH TRENDS TO WATCH“. HOWABR LED. 0. pdf.101com.com. 0 cites. “Efficient private subset computation“. J Dou, L Gong, S Li, L Ma. 2016. Wiley Online Library Security and Communication …. 0 cites. “Electronic finance–recent developments“. K Dandapani, K Dandapani. 2017. emeraldinsight.com Managerial Finance. 0 cites. “Emergence of Fintech and cybersecurity in a global financial centre: Strategic approach by a regulator“. AW Ng, AW Ng, BKB Kwok…. 2017. emeraldinsight.com Journal of Financial …. 0 cites. “Encyclopedia of Cyber Warfare“. PJ Springer. 2017. books.google.com . 0 cites. “Energy-Efficient Distance-Bounding with Residual Charge Computation“. Y Zhuang, A Yang, GP Hancke…. 2017. ieeexplore.ieee.org IEEE Transactions on …. 0 cites. “Enhancing Breeder Document Long-Term Security Using Blockchain Technology“. N Buchmann, C Rathgeb, H Baier…. 2017. ieeexplore.ieee.org … ), 2017 IEEE 41st …. 0 cites. “Enhancing National Cybersecurity: The Current and Future States of Cybersecurity in the Digital Economy“. T Patterson, E Liebig, R Sapp, B Searcy, D Desai…. 0. nist.gov. 0 cites. “Establishing Governance for Hybrid Cloud and the Internet of Things“. M Wolfe. 2016. books.google.com Handbook of Research on End-to-End Cloud …. 0 cites. “Europe and MENA Cooperation Advances in Information and Communication Technologies“. Á Rocha, M Serrhini, C Felgueiras. 2017. Springer . 0 cites. “Evolution of bitcoin and security risk in bitcoin wallets“. PK Kaushal, A Bagga, R Sobti. 2017. ieeexplore.ieee.org … and Electronics (Comptelix) …. 0 cites. “Examining the forensic artifacts produced by use of bitcoin currency“. LD Jones. 2014. search.proquest.com . 0 cites. “Exploring the Essence of Records Management, Engaging with Experts: Proceedings“. R Barry. 2007. emeraldinsight.com Records Management Journal. 0 cites. “FBI DIRECTOR COMEY NOT QUALIFIED TO DECIDE ON HILLARY EMAILGATE-REWROTE LAW“. U CONFLICT, HISM CLINTON. 0. fbcoverup.com. 0 cites. “FDA News“. PR Newswire. 0. fda.ulitzer.com. 0 cites. “Financial Stability Governance Today: A Job Half Done“. A Large. 0. group30.org. 0 cites. “Forenzní analýza sítě Bitcoin“. PBT DROZDA, V VESELÝ. 2016. itspy.cz . 0 cites. “Four tips for effective software testing“. RF Goldsmith. 0. tngconsultores.com. 0 cites. “From show on blog page“. S Milan, E Treré. 0. data-activism.net. 0 cites. “From SMOG to Fog: A security perspective“. R Rios, R Roman, JA Onieva…. 2017. ieeexplore.ieee.org Fog and Mobile Edge …. 0 cites. “GI-Dagstuhl Seminar 16353 on Aware Machine to Machine Communication“. M Arumaithurai, S Sigg, X Wang. 0. dagstuhl.de. 0 cites. “Governing eMoney: On Bitcoin & Global Governance“. DAL Pope, R Marlin-Bennett. 2016. academia.edu . 0 cites. “Government Activities to Detect, Deter and Disrupt Threats Enumerating from the Dark Web“. NV Denic. 2017. dtic.mil . 0 cites. “Government News“. A This. 0. gov.ulitzer.com. 0 cites. “Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. I Molloy, S Chari, U Finkler, M Wiggerman…. 2016. Springer … Conference on Financial …. 0 cites. “Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. C Jonker, T Habeck, Y Park, F Jordens…. 0. books.google.com … Cryptography and Data …. 0 cites. “Graph-based forensic investigation of Bitcoin transactions“. C Zhao. 2014. lib.dr.iastate.edu . 0 cites. “Heritage. exe. The current state and future of Norwegian software preservation-mapping the challenges of preserving locally executable digital artifacts and the …“. TB Madsen. 2016. dspace.uib.no . 0 cites. “Himachal Pradesh, growing to prosper“. PS Vyas. 2017. qrius.com Science. 0 cites. “Hitching Healthcare to the Chain: An Introduction to Blockchain Technology in the Healthcare Sector“. MA Engelhardt. 2017. timreview.ca Technology Innovation Management Review. 0 cites. “How Sensitive Is Genetic Data?“. M Sariyar, S Suhr, I Schlünder. 2017. online.liebertpub.com Biopreservation and …. 0 cites. “HPCC-SmartCity-DSS 2016“. X Ling, J Yang, D Wang, J Chen, L Li. 0. ieeexplore.ieee.org. 0 cites. “Human Capital and Assets in the Networked World“. M Russ. 2017. emeraldinsight.com . 0 cites. “ICIOT 2017“. M Hossain, R Hasan. 0. ieeexplore.ieee.org. 0 cites. “Identifying and analyzing digital payment flows regarding illegal purposes on the Internet: I samarbete med CGI och Finanskoalitionen“. C Berggren, J Asplund. 2016. diva-portal.org . 0 cites. “IEEE CCEM 2016 Program Details“. P Chelliah, A Mangalvedkar. 0. ieeexplore.ieee.org. 0 cites. “II. Cyber-OC in the Netherlands“. G Odinot, MA Verhoeven, RLD Pool…. 0. researchgate.net Cyber-OC–Scope and …. 0 cites. “Impact of Technology Innovation: A Study on Cloud Risk Mitigation“. N Suresh, M Gupta. 2017. books.google.com Information Technology Risk Management …. 0 cites. “Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools“. Y Zolotavkin, J García, C Rudolph. 2017. Springer … on Decision and Game Theory for …. 0 cites. “Indian export competitiveness and performance: A long story“. A Kulkarni. 2017. qrius.com Science. 0 cites. “Indiana Journal of Law and Social Equality“. M Selmi. 2014. scholarship.law.gwu.edu . 0 cites. “Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings“. JK Liu, R Steinfeld. 2016. books.google.com . 0 cites. “Infrastructure 2.0 Journal“. M Kim, DS Meliksetian, C Malone. 0. infrastructure20.ulitzer.com. 0 cites. “Intellectual Property in Silicon Valley“. PR Newswire. 0. ip.ulitzer.com. 0 cites. “Internet Voting Using Zcash“. P Tarasov, H Tewari. 0. allquantor.at. 0 cites. “Introduzione Agli Smart Contract (Introduction to Smart Contract)“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com . 0 cites. “Investigation of Cryptocurrency Wallets on iOS and Android Mobile Devices for Potential Forensic Artifacts“. A Montanez. 2014. marshall.edu . 0 cites. “IoT based smart home: Security challenges, security requirements and solutions“. W Ali, G Dustgeer, M Awais…. 2017. ieeexplore.ieee.org … and Computing (ICAC) …. 0 cites. “iPad on Ulitzer“. PR Newswire. 0. ipad.ulitzer.com. 0 cites. “Islamic State of Iraq and Syria Revenue Sources and Countermeasures With a Specific Look at Cryptocurrency Use“. DM Haines. 2017. search.proquest.com . 0 cites. “It’s the Cyber Crime and Its Sponsors (Not My Cyber-Security), Stupid“. D Lawrence, F Townsend, T Murphy, D Garrie…. 2016. HeinOnline JL & Cyber …. 0 cites. “JOnline: Dealing With Computer Fraud“. C Filip Van Hallewijn, A CISM. 0. m.isaca.org. 0 cites. “JOURNAL OF LAW AND CYBER WARFARE“. S Comment. 0. jlcw.org. 0 cites. “Juridische beroepen in de toekomst“. MJ ter Voert, M Beenakkers. 0. researchgate.net. 0 cites. “Komparace právních podmínek užití kryptoměn ve Švýcarsku, Spojených státech amerických a Japonsku“. A Yakimenka. 2017. dspace.cuni.cz . 0 cites. “LAWNEWS“. J Ting-Edwards. 0. c-justice.com. 0 cites. “LE TRAFIC ILLICITE DE TABAC SUR LES CRYPTOMARCHÉS“. D Décary-Hétu, V Mousseau, I Rguioui. 2017. daviddhetu.openum.ca . 0 cites. “Learning Python for Forensics“. P Miller, C Bryce. 2016. books.google.com . 0 cites. “Legal Risks of Owning Cryptocurrencies“. K Low, EGS Teo. 2016. papers.ssrn.com . 0 cites. “LegalTech on the Rise: Technology Changes Legal Work Behaviours, But Does Not Replace Its Profession“. MM Bues, E Matthaei. 2017. Springer Liquid Legal. 0 cites. “Long term data storage using peer-to-peer technology“. PN Meessen, A de Vries. 2017. ru.nl . 0 cites. “Managing electronic records across organizational boundaries: The experience of the Belgian federal government in automating investigation processes“. L Maroye, L Maroye, S van Hooland…. 2017. emeraldinsight.com Records …. 0 cites. “Matrix Accounting Illustrated: Contribution Margin“. M Hughes. 2016. Wiley Online Library Journal of Corporate Accounting & Finance. 0 cites. “MedRec: blockchain for medical data access, permission management and trend analysis“. AC Ekblaw. 2017. dspace.mit.edu . 0 cites. “Memory Forensics and Bitcoin mining malware“. P Dimotikalis. 2016. repository.ihu.edu.gr . 0 cites. “Mentoring in Cyber Education: Capture-the-Flag Exercises to Promote Good Cyber Hygiene in Disadvantaged Populations“. R Thomson. 0. westpoint.edu. 0 cites. “Method and apparatus for protecting digital photos from alteration“. N Powers, TM Fortuna, P Kocsis. 2016. Google Patents US Patent App. 15/260,074. 0 cites. “MMTC Communications-Frontiers“. A Costanzo, V Loscrì, S Costanzo. 0. mmc.committees.comsoc.org. 0 cites. “Mobile security technology“. US Patent App. 14/476,629. 2014. Google Patents. 0 cites. “Mobile security technology“. US Patent App. 14/686,069. 2015. Google Patents. 0 cites. “Money for Nothing and Bits for Free: The Geographies of Bitcoin“. A Pel. 2015. tspace.library.utoronto.ca . 0 cites. “MỘT SỐ GIẢI PHÁP VỀ PHÁT TRIỂN NGUỒN NHÂN LỰC CÔNG NGHỆ THÔNG TIN TẠI VIỆT NAM.“. G Trần Thu. 2017. data.uet.vnu.edu.vn . 0 cites. “Moving One Step Ahead of the 90’s Job Options“. RN Ahsan, A Chatterjee. 2017. qrius.com Science. 0 cites. “Neuerwerbungen im Dezember 2016“. A von Fürstenberg, CP Müller…. 2016. ub.uni-heidelberg.de Ann Arbor: University of …. 0 cites. “NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform“. P Matias, P Barbosa, T Cardoso, D Mariano…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites. “NUS Hackers“. IHA Git. 0. nushackers.org. 0 cites. “O novo eo atual na Arquivística internacional: a desmaterialização, a interoperabilidade, a organização eo uso da informação em evidência (2011-2016)“. MC Freitas, CG Silva. 2016. bad.pt Actas do Encontro Nacional de Arquivos Municipais. 0 cites. “Online Anonymization Relating to Cyber Attacks“. J Cornwell. 2017. search.proquest.com . 0 cites. “Organised Cybercrime in the Netherlands“. G Odinot, MA Verhoeven, RLD Pool, CJ de Poot. 0. wodc.nl. 0 cites. “OSC Staff Notice 33-748-Annual Summary Report for Dealers, Advisers and Investment Fund Managers“. Ontario Securities Commission. 2017. osc.gov.on.ca Update. 0 cites. “Overview and Comparison of P2P File Synchronization and Storage Solutions“. J Fröhlich, S Ruesch. 2015. csg.uzh.ch Communication Systems VIII. 0 cites. “Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies“. G Brambilla. 2017. dspace-unipr.cineca.it . 0 cites. “Periyar Journal of Research in Business and Development Studies“. S Chhabra, N Gangwar, AB Singhal, F Fatima…. 0. pmccdelhi.com. 0 cites. “Periyar Journal of Research in Business and Development Studies“. S Singh. 0. pmccdelhi.com. 0 cites. “Personal control of privacy and data: Estonian experience“. J Priisalu, R Ottis. 2017. Springer Health and Technology. 0 cites. “Pharmaceutical News on Ulitzer“. PR Newswire. 0. pharmaceuticals.ulitzer.com. 0 cites. “Pluralism and Economics Today: Understanding the ISIPE Rebellion“. A Baksy. 2017. qrius.com Science. 0 cites. “Policing af kryptomarkeder“. J Demant, R Munksgaard. 2017. justitsministeriet.dk . 0 cites. “Predictive Computing and Information Security“. PK Gupta, V Tyagi, SK Singh. 2017. Springer . 0 cites. “Predictive Computing and Information Security: A Technical Review“. PK Gupta, V Tyagi, SK Singh. 2017. Springer Predictive Computing and Information …. 0 cites. “Privacy in the Smart City–Applications, Technologies, Challenges and Solutions“. D Eckhoff, I Wagner. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …. 0 cites. “Privacy Verification Chains for IoT“. N Foukia, D Billard, E Solana. 2017. Springer International Conference on Network and …. 0 cites. “Privacy‐preserving smart data storage for financial industry in cloud computing“. M Qiu, K Gai, H Zhao, M Liu. 0. Wiley Online Library Concurrency and Computation: Practice …. 0 cites. “Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core“. L van der Horst, KKR Choo, NA Le-Khac. 2017. ieeexplore.ieee.org IEEE Access. 0 cites. “Prof J Maiti Head, I&SE“. PP Chakrabarti, IIT Director. 0. iem.iitkgp.ernet.in. 0 cites. “Protecting Data Privacy in the Presence of Data Provenance“. P Kianmajd. 2017. search.proquest.com . 0 cites. “Provenance threat modeling“. O Hambolu, L Yu, J Oakley, RR Brooks…. 2016. ieeexplore.ieee.org Privacy, Security and …. 0 cites. “Public Evidence from Secret Ballots“. J Benaloh, M Bernhard, JA Halderman…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites. “Quick Start“. MTWT Friday. 2016. wp.df.uba.ar . 0 cites. “Ransomware 7 and cryptocurrency“. GJ Ahn, A Doupe, Z Zhao, K Liao. 2016. books.google.com Cybercrime Through an …. 0 cites. “Rarity trading legacy protection and digital convergence platform“. MM Saigh, X Zhang. 2016. Google Patents US Patent App. 15/072,911. 0 cites. “Rational mining on bitcoin“. S Pachal. 2017. library.isical.ac.in . 0 cites. “Rational Whistle Blower Prototypes Buch 1 Grundlagen, Ergebnisse und Literatur“. G Förster. 2016. integrity-art.de . 0 cites. “Read The Manual“. M Faou, JI Boutin. 2017. welivesecurity.com . 0 cites. “RECALIBRATING LAW ENFORCEMENT TO KEEP PACE WITH NEW TECHNOLOGIES AND FORMS OF CRIME“. MM Oberoi. 0. idsa.in SECURING CYBERSPACE. 0 cites. “Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication …“. F Saeed, N Gazem, S Patnaik, ASS Balaid…. 2017. books.google.com . 0 cites. “Recognition of Traffic Sign Based on Bag-of-Words and Artificial Neural Network“. KT Islam, RG Raj, G Mujtaba. 2017. mdpi.com Symmetry. 0 cites. “Reflections on the REST architectural style and principled design of the modern web architecture (impact paper award)“. RT Fielding, RN Taylor, JR Erenkrantz…. 2017. dl.acm.org Proceedings of the …. 0 cites. “Reflections upon periclitations in privacy: perspectives from Rwanda’s digital transformation“. JP Nsengimana. 2017. Springer Health and Technology. 0 cites. “Regulation based switching system for electronic message routing“. J Crabtree, A Sellers, J Uchiyama. 2017. Google Patents US Patent App. 15/489,716. 0 cites. “Report from GI-Dagstuhl Seminar 16394: Software Performance Engineering in the DevOps World“. A van Hoorn, P Jamshidi, P Leitner, I Weber. 2017. arxiv.org arXiv preprint arXiv …. 0 cites. “Report of the second expert group meeting on opportunities and risks associated with the advent of digital currency in the Caribbean“. NU CEPAL. 2015. repositorio.cepal.org . 0 cites. “Requisitos y soluciones de privacidad para la testificacion digital“. A Nieto, R Rios. 0. nics.uma.es. 0 cites. “Research Challenges in Financial Data Modeling and Analysis“. L Alexander, SR Das, Z Ives, HV Jagadish…. 2017. online.liebertpub.com Big …. 0 cites. “Research Specialties“. T MOORE. 2016. tylermoore.ens.utulsa.edu Computing. 0 cites. “Retrofit Device And Method Of Retrofitting A Flow Meter“. D Mackie, S Grefen, CJ Boelter…. 2017. Google Patents US Patent App. 15 …. 0 cites. “REXIT: What It Brings to Light About Term Length“. B Pratap. 2017. qrius.com Science. 0 cites. “Schöne neue Verbraucherwelt?“. C Bala, W Schuldzinski. 0. projekte.meine-verbraucherzentrale …. 0 cites. “Searchain: Blockchain-based private keyword search in decentralized storage“. P Jiang, F Guo, K Liang, J Lai, Q Wen. 2017. Elsevier Future Generation Computer …. 0 cites. “Section 75 and credit cards: misconceived interpretation?“. J Mukwiri. 2005. emeraldinsight.com Journal of Financial Regulation and Compliance. 0 cites. “Secure lightweight context-driven data logging for bodyworn sensing devices“. M Siddiqi, ST All, V Sivaraman. 2017. ieeexplore.ieee.org … Forensic and Security (ISDFS) …. 0 cites. “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions“. J Ni, K Zhang, X Lin, X Shen. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …. 0 cites. “Securing the Assets of Decentralized Applications using Financial Derivatives}}“. G Bissias, BN Levine, N Kapadia, AP Ozisik…. 0. people.cs.umass.edu Elsevier Child Abuse …. 0 cites. “Security Enhancement of Digital Watermarking“. MA Nematollahi, C Vorakulpipat, HG Rosales. 2017. Springer Digital Watermarking. 0 cites. “Security Hands-On-Training–Part 6–Final“. L Rocha, I Handling. 0. countuponsecurity.com. 0 cites. “SEEKING PAPERS ON COMPUTATIONAL SOCIAL SYSTEMS“. SD Computing, S Computing. 0. ieeexplore.ieee.org. 0 cites. “Self-reported Verifiable Reputation with Rater Privacy“. R Bazin, A Schaub, O Hasan, L Brunie. 2017. Springer IFIP International Conference on …. 0 cites. “Share and Share Alike: The challenges from social media for Intellectual Property Rights“. D Collopy. 2017. uhra.herts.ac.uk . 0 cites. “Small scale denial of service attacks“. V Bukač. 0. is.muni.cz. 0 cites. “Smart Contracts: A Preliminary Evaluation“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com . 0 cites. “Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection“. Y Yu, T Tun. 2017. oro.open.ac.uk . 0 cites. “Social, Cultural, and Behavioral Modeling“. D Lee, YR Lin, N Osgood, R Thomson. 0. Springer. 0 cites. “Social, Cultural, and Behavioral Modeling: 10th International Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings“. D Lee, N Osgood, YR Lin, R Thomson. 2017. books.google.com . 0 cites. “Sparse Encoded Matrix based Steganography algorithm“. V Shah. 2017. irjet.net . 0 cites. “Sticky policies approach within cloud computing“. G Spyra, WJ Buchanan, E Ekonomou. 2017. Elsevier Computers & Security. 0 cites. “Students Link Brains to Fire Video Game Cannon“. J DORRIER. 0. losnuevosguerreros.org. 0 cites. “Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT)“. L Arief, TA Sundara. 2017. jurnal.iaii.or.id Jurnal RESTI (Rekayasa Sistem dan Teknologi …. 0 cites. “Supporting users to take informed decisions on privacy settings of personal devices“. I Torre, OR Sanchez, F Koceva, G Adorni. 2017. Springer Personal and Ubiquitous …. 0 cites. “Systemic banking crises: completing the enhanced policy responses“. O Frecaut, O Frecaut. 2017. emeraldinsight.com Journal of Financial Regulation and …. 0 cites. “Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance“. M Dawson, JA Cárdenas-Haro. 2017. igi-global.com … and the Internet of Things (IJHIoT). 0 cites. “Tamper-Resistant Mobile Health Using Blockchain Technology“. D Ichikawa, M Kashiyama, T Ueno. 2017. ncbi.nlm.nih.gov JMIR mHealth and uHealth. 0 cites. “TCCN Newsletter“. M Yannuzzi, R Milito, R Serral-Gracià, D Montero…. 0. cn.committees.comsoc.org. 0 cites. “Technologien, Forschungsfragen und Anwendungen“. J Schütte, G Fridgen, W Prinz, T Rose, NU FIT…. 0. aisec.fraunhofer.de. 0 cites. “TERRORIST USE OF VIRTUAL CURRENCIES“. ZK Goldman, E Maruyama, E Rosenberg, E Saravalle…. 2017. caict.ac.cn . 0 cites. “The Bitcoin Guidebook: How to Obtain, Invest, and Spend the World’s First Decentralized Cryptocurrency“. I DeMartino. 2016. books.google.com . 0 cites. “The Cyber Triad“. B Thijssen. 2016. researchgate.net . 0 cites. “The Establishment of Bitcoin“. P Hesch. 2017. dspace.allegheny.edu . 0 cites. “The Evolving Cloud“. J Weinman. 2017. ieeexplore.ieee.org IEEE Cloud Computing. 0 cites. “The global village and it’s back-breaking terrain“. JD Ostry. 2017. qrius.com Science. 0 cites. “The illicit drug trade on the dark net: Analysing the need for a new EU Framework“. Y Hassan. 2017. openaccess.leidenuniv.nl . 0 cites. “The impact of Self-Generated Images in online pornography“. A Monaghan. 2017. eprints.mdx.ac.uk . 0 cites. “The Missing Account of Progressive Corporate Criminal Law“. WS Laufer. 2017. papers.ssrn.com . 0 cites. “The New Bio-Citizen: How the Democratization of Genomics Will Transform Our Lives from Epidemics Management to the Internet of Living Things“. E Pauwels. 0. wilsoncenter.org. 0 cites. “The Nuts and Bolts of Micropayments: A Survey“. ST Ali, D Clarke, P McCorry. 2017. arxiv.org arXiv preprint arXiv:1710.02964. 0 cites. “The Programmable Economy: Envisaging an Entire Planned Economic System as a Single Computer Through Blockchain Networks“. K Hegadekatti, Y SG. 2017. papers.ssrn.com . 0 cites. “The Tor browser: A forensic investigation study“. K Keller. 2016. search.proquest.com . 0 cites. “Threshold Single Password Authentication“. D İşler, A Küpçü. 2017. Springer … Management, Cryptocurrencies and Blockchain …. 0 cites. “Towards a leaner, smarter public-sector workforce.“. A Hitchcock, K Laycock, E Sundorph. 2017. reform.uk . 0 cites. “Towards an accountable software-defined networking architecture“. BE Ujcich, A Miller, A Bates…. 2017. ieeexplore.ieee.org … (NetSoft), 2017 IEEE …. 0 cites. “Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model“. Y Ishihara, T Fujiwara. 2017. books.google.com … Blockchain Technology: ESORICS 2017 …. 0 cites. “Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model“. Y Furuta, N Yanai, M Karasaki, K Eguchi…. 2017. Springer … and Blockchain …. 0 cites. “TOWARDS ENHANCING SECURITY IN CLOUD STORAGE ENVIRONMENTS“. D Wilson. 2016. jscholarship.library.jhu.edu . 0 cites. “Trifling and Gambling with Virtual Money“. JT Holden. 2017. papers.ssrn.com . 0 cites. “Trumpeting in the New Era of a Lean Technology-Driven Financial System“. V Rule. 0. financialintergroup.com. 0 cites. “Trust Management in Fog Computing“. TS Dybedokken. 2017. brage.bibsys.no . 0 cites. “Turkish Riviera, the Turquoise Coast“. PR Newswire. 0. turkishriviera.ulitzer.com. 0 cites. “Typologies in Canadian Securities Fraud: An Impact Assessment on Investor Protection, Money Laundering and the Financing of Terrorism (AML/CFT), and Risk …“. R Ranjan. 2015. papers.ssrn.com . 0 cites. “Understanding Digital Crime, Trust, and Control in Blockchain Technologies“. JB Walton, G Dhillon. 2017. aisel.aisnet.org . 0 cites. “Unlocking Innovations and Competitive Advantage of State Bank of India“. B Jha, A Gulati, S Goyal, S Vig. 2017. strategiesinemergingmarkets.com . 0 cites. “Use of Bitcoin in Online Travel Product Shopping: The European Perspective“. D Leung, A Dickinger. 2017. Springer … and Communication Technologies in Tourism 2017. 0 cites. “Using Blockchain for Research Transparency“. K Opoku-Agyemang. 2017. osf.io . 0 cites. “Using blockchain for scientific transparency“. KA Opoku-Agyemang. 2017. papers.ssrn.com . 0 cites. “Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data“. RR Brooks, L Yu, Y Fu, G Cordone, J Oakley…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites. “Using the Blockchain to Secure Provenance Meta-Data (A CCoE Webinar Presentation)“. RR Brooks, A Skjellum. 2017. scholarworks.iu.edu . 0 cites. “Using Tor in cybersecurity investigations“. J Flanagan. 2015. search.proquest.com . 0 cites. “Vers la sécurité mobile: caractérisation des attaques et contremesures“. Y Le Traon, JY Marion, F Massacci, S Limet…. 0. tel.archives-ouvertes.fr. 0 cites. “Vers la sécurité mobile: caractérisation des attaques et contremesures“. JF Lalande. 2016. hal-univ-orleans.archives-ouvertes.fr . 0 cites. “Video Integrity through Blockchain Technology“. A Hemlin Billström, F Huss. 2017. diva-portal.org . 0 cites. “Welcome Message“. M Koscina, D Caragata, N Abdoun, S El Assady…. 0. ieeexplore.ieee.org. 0 cites. “What Are They Really Up To? Activist Social Scientists Backpedal on Conspiracy Theory Agenda, Kurtis Hagen“. L Basham. 0. social-epistemology.com. 0 cites. “WHAT MAKES A CURRENCY?–THE BITCOIN PHENOMENON“. EE LEWIS. 0. researchgate.net. 0 cites. “Why Fintech Could Lead to More Financial Crime“. C Harrington. 2017. CFA Institute CFA Institute Magazine. 0 cites. “Will Donald trump Hillary’s Climb to the Top of the Everest?“. A Kulkarni. 2017. qrius.com Science. 0 cites. “Will Organizations Emerge as “Hybrid Intelligences” from the Digital Transformation?“. W Leodolter. 2017. Springer … Transformation Shaping the Subconscious Minds of …. 0 cites. “Words to go: Data center design standards bodies“. W Enterprises. 0. tngconsultores.com. 0 cites. “Zeng Chong, Huang Song, Yang Yongming“. X Yang, D Ogawa, N Dai, TTG Hoang, X Wang, X Zhou…. 0. ieeexplore.ieee.org. 0 cites. “Zwischen Online-Streife und Online-(Raster-) Fahndung–Ein Beitrag zur Verarbeitung öffentlich zugänglicher Daten im Ermittlungsverfahren“. C Rückert. 2017. degruyter.com Zeitschrift für die gesamte Strafrechtswissenschaft. 0 cites. “比特币与法定数字货币“. 秦波. 2017. jcr.cacrnet.org.cn 密码学报. 0 cites.
participants (1)
-
grarpamp