Cryptocurrency: Most Cited Blockchain Forensic Analysis Publications

grarpamp grarpamp at gmail.com
Wed Jan 23 16:58:58 PST 2019


https://blockchainlibrary.org/2017/11/most-cited-blockchain-forensic-analysis-publications/
https://steemit.com/@blockchainlib/

Most Cited Blockchain Forensic Analysis Publications

Last updated November 4th, 2017.

    “Trust among strangers in Internet transactions: Empirical
analysis of eBay’s reputation system“. P Resnick, R Zeckhauser. 2002.
emeraldinsight.com The Economics of the Internet and …. 2072 cites.
    “Bitcoin and beyond: A technical survey on decentralized digital
currencies“. F Tschorsch, B Scheuermann. 2016. ieeexplore.ieee.org
IEEE Communications Surveys …. 80 cites.
    “Protocols for secure electronic commerce“. MH Sherif. 2016.
books.google.com . 70 cites.
    “Cutting the gordian knot: A look under the hood of ransomware
attacks“. A Kharraz, W Robertson, D Balzarotti, L Bilge…. 2015.
Springer … on Detection of …. 57 cites.
    “Bitiodine: Extracting intelligence from the bitcoin network“. M
Spagnuolo, F Maggi, S Zanero. 2014. Springer International Conference
on Financial …. 52 cites.
    “Virtual currencies; Bitcoin & what now after Liberty Reserve,
Silk Road, and Mt. Gox?“. LJ Trautman. 2014. papers.ssrn.com . 49
cites.
    “Mobile security technology“. US Patent 9,014,661. 2015. Google
Patents. 48 cites.
    “Beyond Bitcoin: Issues in Regulating Blockchain Tranactions“. TI
Kiviat. 2015. HeinOnline Duke LJ. 41 cites.
    “A learned representation for artistic style“. V Dumoulin, J
Shlens, M Kudlur, A Behboodi…. 2016. arxiv.org arXiv preprint arXiv ….
40 cites.
    “Corporate governance and blockchains“. D Yermack. 2017.
academic.oup.com Review of Finance. 40 cites.
    “Information management systems on construction projects: case
reviews“. N Craig, J Sommerville. 2006. emeraldinsight.com Records
Management Journal. 37 cites.
    “What will be the next records management orthodoxy?“. J Lappin.
2010. emeraldinsight.com Records Management Journal. 37 cites.
    “Bitcoin: under the hood“. A Zohar. 2015. dl.acm.org
Communications of the ACM. 28 cites.
    “Keeping authorities” honest or bust” with decentralized witness
cosigning“. E Syta, I Tamas, D Visher, DI Wolinsky…. 2016.
ieeexplore.ieee.org Security and Privacy …. 26 cites.
    “Recordkeeping informatics: re-figuring a discipline in crisis
with a single minded approach“. F Upward, B Reed, G Oliver…. 2013.
emeraldinsight.com Records Management …. 25 cites.
    “Medrec: Using blockchain for medical data access and permission
management“. A Azaria, A Ekblaw, T Vieira…. 2016. ieeexplore.ieee.org
Open and Big Data (OBD …. 24 cites.
    “Near zero Bitcoin transaction fees cannot last forever“. K
Kaskaloglu. 2014. sdiwc.net … Conference on Digital Security and
Forensics  …. 23 cites.
    “Trends, tips, tolls: A longitudinal study of Bitcoin transaction
fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial
Cryptography and Data …. 23 cites.
    “Daemon“. D Suarez. 2017. books.google.com . 16 cites.
    “Development of RMJ: A mirror of the development of the profession
and discipline of records management“. J McLeod, C Hare. 2010.
emeraldinsight.com Records Management Journal. 16 cites.
    “Security protocols and evidence: Where many payment systems
fail“. SJ Murdoch, R Anderson. 2014. Springer … on Financial
Cryptography and Data Security. 16 cites.
    “A survey of P2P Network security“. L Washbourne. 2015. arxiv.org
arXiv preprint arXiv:1504.01358. 15 cites.
    “Blockchains and Bitcoin: Regulatory responses to
cryptocurrencies“. A Guadamuz, C Marsden. 2015. papers.ssrn.com . 15
cites.
    “New Private Monies: A Bit-Part Player?“. K Dowd. 2014.
papers.ssrn.com . 14 cites.
    “Identity-based remote data integrity checking with perfect data
privacy preserving for cloud storage“. Y Yu, MH Au, G Ateniese, X
Huang…. 2017. ieeexplore.ieee.org … Forensics and …. 13 cites.
    “Security and privacy in decentralized energy trading through
multi-signatures, blockchain and anonymous messaging streams“. NZ
Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on
Dependable …. 13 cites.
    “On the security of key extraction from measuring physical
quantities“. M Edman, A Kiayias, Q Tang…. 2016. ieeexplore.ieee.org …
on Information Forensics …. 12 cites.
    “Diplomatics of born digital documents–considering documentary
form in a digital environment“. C Rogers. 2015. emeraldinsight.com
Records Management Journal. 11 cites.
    “Listening to whispers of ripple: Linking wallets and
deanonymizing transactions in the ripple network“. P Moreno-Sanchez,
MB Zafar, A Kate. 2016. degruyter.com Proceedings on Privacy …. 11
cites.
    “On the properties of non-media digital watermarking: a review of
state of the art techniques“. AS Panah, R Van Schyndel, T Sellis, E
Bertino. 2016. ieeexplore.ieee.org IEEE Access. 11 cites.
    “Reverse Engineering and Security Evaluation of Commercial Tags
for RFID-Based IoT Applications“. TM Fernández-Caramés, P
Fraga-Lamas…. 2016. mdpi.com Sensors. 11 cites.
    “A trustless privacy-preserving reputation system“. A Schaub, R
Bazin, O Hasan, L Brunie. 2016. Springer IFIP International
Information …. 10 cites.
    “Cyberspace and cybersecurity“. G Kostopoulos. 2017.
books.google.com . 10 cites.
    “Electronic Currency: The Potential Risks to National Security and
Methods to Minimize Them“. GN Vovchenko, NE Tishchenko, VT Epifanova….
2017. ersj.eu European Research …. 9 cites.
    “Tackling the wicked problem of ERM: using the Cynefin framework
as a lens“. S Childs, J McLeod. 2013. emeraldinsight.com Records
Management Journal. 9 cites.
    “Virtual Currencies: Bitcoin & What Now after Liberty Reserve,
Silk Road, and Mt. Gox“. L Trautman. 2013. HeinOnline Rich. JL &
Tech.. 9 cites.
    “Bitcoin and the uniform commercial code“. JL Schroeder. 2015.
HeinOnline U. Miami Bus. L. Rev.. 8 cites.
    “BitIodine: extracting intelligence from the Bitcoin network“. M
Spagnuolo. 2013. politesi.polimi.it . 8 cites.
    “Cryptocurrency-Based Law“. M Abramaowicz. 2016. HeinOnline Ariz.
L. Rev.. 8 cites.
    “P2P Mixing and Unlinkable Bitcoin Transactions.“. T Ruffing, P
Moreno-Sanchez…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint
…. 8 cites.
    “Sovereign money: Beyond reserve banking“. J Huber. 2016.
books.google.com . 8 cites.
    “A Case Study for Blockchain in Healthcare:“MedRec” prototype for
electronic health records and medical research data“. A Ekblaw, A
Azaria, JD Halamka…. 2016. healthit.gov … of IEEE Open & Big Data …. 7
cites.
    “A dangerous trend of cybercrime: ransomware growing challenge“.
DPB Pathak, YM Nanded. 2016. ijarcet.org … Journal of Advanced
Research in Computer …. 7 cites.
    “A Novel Multi-Focus Image Fusion Method Based on Stochastic
Coordinate Coding and Local Density Peaks Clustering“. Z Zhu, G Qi, Y
Chai, Y Chen. 2016. mdpi.com Future Internet. 7 cites.
    “A Wearable Revolution: Is the smartwatch the next small big
thing?“. M Kracheel, W Bronzi, H Kazemi. 2014. publications.uni.lu IT
ONE Magazine 2014. 7 cites.
    “Cryptocurrencies: The Next Generation of Terrorist Financing?“.
AE Brill, L Keene. 2014. papers.ssrn.com . 7 cites.
    “The Unreasonable Effectiveness of Address Clustering“. M
Harrigan, C Fretter. 2016. ieeexplore.ieee.org … Cloud and Big Data
Computing, Internet …. 7 cites.
    “An Empirical Analysis of Linkability in the Monero Blockchain“. A
Miller, M Möser, K Lee, A Narayanan. 2017. arxiv.org arXiv preprint
arXiv:1704.04299. 6 cites.
    “Apple Pay, Bitcoin, and Consumers: The ABCs of Future Public
Payments Law“. ME Burge. 2015. papers.ssrn.com . 6 cites.
    “Behind closed doors: measurement and analysis of CryptoLocker
ransoms in Bitcoin“. K Liao, Z Zhao, A Doupé, GJ Ahn. 2016.
ieeexplore.ieee.org Electronic Crime Research …. 6 cites.
    “Blockchain-Based Database to Ensure Data Integrity in Cloud
Computing Environments.“. E Gaetani, L Aniello, R Baldoni, F
Lombardi…. 2017. ceur-ws.org ITASEC. 6 cites.
    “Cryptocurrencies and business ethics“. C Dierksmeier, P Seele.
2016. Springer Journal of Business Ethics. 6 cites.
    “Cryptocurrency: how bitcoin and digital money are challenging the
global economic order“. P Vigna, MJ Casey. 2015. Random House . 6
cites.
    “International accounting standards and accounting quality in
code-law countries: The case of Egypt“. IES Ebaid. 2016.
emeraldinsight.com Journal of Financial Regulation and Compliance. 6
cites.
    “Privacy preserving Internet of Things: From privacy techniques to
a blueprint architecture and efficient implementation“. PP Jayaraman,
X Yang, A Yavari…. 2017. Elsevier Future Generation …. 6 cites.
    “Bitcoin block withholding attack: Analysis and mitigation“. S
Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org … on Information
Forensics and …. 5 cites.
    “Bitcoin-based fair payments for outsourcing computations of fog
devices“. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier
Future Generation Computer …. 5 cites.
    “Entering the matrix: the challenge of regulating Radical Leveling
Technologies“. JJ Snow. 2015. calhoun.nps.edu . 5 cites.
    “Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R
Osborne, P Pacifico. 2016. eprints.mdx.ac.uk . 5 cites.
    “Provchain: A blockchain-based data provenance architecture in
cloud environment with enhanced privacy and availability“. X Liang, S
Shetty, D Tosh, C Kamhoua…. 2017. dl.acm.org Proceedings of the 17th
…. 5 cites.
    “The implications of economic cybercrime for policing“. M Levi, A
Doig, R Gundur, D Wall, ML Williams. 2016. orca.cf.ac.uk . 5 cites.
    “Tomorrow’s Inheritance: The Frontiers of Estate Planning
Formalism“. D Horton. 2017. HeinOnline BCL Rev.. 5 cites.
    ““Justice delayed is justice denied” Records management and the
travesty of justice in South Africa“. M Ngoepe, S Makhubela. 2015.
emeraldinsight.com Records Management Journal. 4 cites.
    “A New Framework for a Novel Lattice: 3D Printers, DNA
Fabricators, and the Perils in Regulating the Raw Materials of the
Next Era of Revolution, Renaissance, and …“. P Jensen-Haxel. 2015.
HeinOnline Wake Forest JL & Pol’y. 4 cites.
    “Optimizing Governed Blockchains for Financial Process
Authentications“. LN Lundbaek, AC D’Iddio, M Huth. 2016. arxiv.org
arXiv preprint arXiv:1612.00407. 4 cites.
    “Security of Electronic Payment Systems: A Comprehensive Survey“.
S Solat. 2017. arxiv.org arXiv preprint arXiv:1701.04556. 4 cites.
    “The Decision to Produce Altcoins: Miners’ Arbitrage in
Cryptocurrency Markets“. A Hayes. 2015. papers.ssrn.com Browser
Download This Paper. 4 cites.
    “Towards automated threat intelligence fusion“. A Modi, Z Sun, A
Panwar, T Khairnar…. 2016. ieeexplore.ieee.org … (CIC), 2016 IEEE …. 4
cites.
    “A review of existing and emerging digital technologies to combat
the global trade in fake medicines“. TK Mackey, G Nayyar. 2017. Taylor
& Francis Expert Opinion on Drug Safety. 3 cites.
    “A Survey on Security and Privacy Issues of Bitcoin“. M Conti, C
Lal, S Ruj. 2017. arxiv.org arXiv preprint arXiv:1706.00916. 3 cites.
    “A Traceability Analysis of Monero’s Blockchain.“. A Kumar, C
Fischer, S Tople, P Saxena. 2017. eprint.iacr.org IACR Cryptology
ePrint …. 3 cites.
    “Decentralizing authorities into scalable strongest-link
cothorities“. E Syta, I Tamas, D Visher…. 2015.
pdfs.semanticscholar.org CoRR, abs …. 3 cites.
    “Electronic Voting Service Using Block-Chain“. K Lee, JI James, TG
Ejeta…. 2016. search.proquest.com … Journal of Digital Forensics …. 3
cites.
    “Investment funds, shadow banking and systemic risk“. E Bengtsson.
2016. emeraldinsight.com Journal of Financial Regulation and
Compliance. 3 cites.
    “Money“. J Huber. 2017. Springer Sovereign Money. 3 cites.
    “Radical Technologies: The Design of Everyday Life“. A Greenfield.
2017. books.google.com . 3 cites.
    “Security implications of blockchain cloud with analysis of block
withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017.
dl.acm.org Proceedings of the 17th …. 3 cites.
    “The Board’s Responsibility for Crisis Governance“. LJ Trautman.
2016. HeinOnline Hastings Bus. LJ. 3 cites.
    “The Scandal of Money: Why Wall Street Recovers But the Economy
Never Does“. G Gilder. 2016. books.google.com . 3 cites.
    “The use of crypto-currencies in funding violent jihad“. ASM
Irwin, ASM Irwin, G Milad…. 2016. emeraldinsight.com Journal of Money
…. 3 cites.
    “The WPA-Lancet Psychiatry Commission on the Future of
psychiatry“. D Bhugra, A Tasman, S Pathare, S Priebe, S Smith…. 2017.
Elsevier The Lancet …. 3 cites.
    “Using crime data in academic research: issues of comparability
and integrity“. A Ludwig, M Marshall. 2015. emeraldinsight.com Records
Management Journal. 3 cites.
    “Why Won’t Johnny Encrypt?“. H Orman. 2015. ieeexplore.ieee.org
IEEE Internet Computing. 3 cites.
    “A Decentralized Anonymity-Preserving Reputation System with
Constant-time Score Retrieval.“. R Bazin, A Schaub, O Hasan…. 2016.
pdfs.semanticscholar.org IACR Cryptology ePrint …. 2 cites.
    “A Probabilistic Nanopayment Scheme for Golem“. P Bylica, L Glen,
P Janiuk, A Skrzypcaz, A Zawlocki. 2015. golemproject.net . 2 cites.
    “Analysis of the Cryptocurrency Marketplace“. A Heid. 2013.
hackmiami.org Retrieved February. 2 cites.
    “BBDS: Blockchain-Based Data Sharing for Electronic Medical
Records in Cloud Environments“. Q Xia, EB Sifah, A Smahi, S Amofa, X
Zhang. 2017. mdpi.com Information. 2 cites.
    “Cyber Guerilla“. J Van Haaster, R Gevers, M Sprengers. 2016.
books.google.com . 2 cites.
    “Cybersecurity problems in a typical hospital (and probably in all
of them)“. H Thimbleby. 2017. cronfa.swan.ac.uk . 2 cites.
    “Developing a comprehensive information security framework for
mHealth: a detailed analysis“. N Vithanwattana, G Mapp, C George.
2017. Springer Journal of Reliable Intelligent …. 2 cites.
    “Digital Forensics: Threatscape and Best Practices“. J Sammons.
2015. books.google.com . 2 cites.
    “Knowledge discovery from within: An examination of records
management and electronic records management syllabi“. DC Force, DC
Force, J Zhang…. 2016. emeraldinsight.com Records Management …. 2
cites.
    “Peer-to-peer law, built on Bitcoin“. MB Abramowicz. 2015.
scholarship.law.gwu.edu . 2 cites.
    “Publics and counterpublics on the front page of the internet: The
cultural practices, technological affordances, hybrid economics and
politics of reddit’s public …“. NJ Springer. 2015. search.proquest.com
. 2 cites.
    “Real-time digital signatures for time-critical networks“. AA
Yavuz, A Mudgerikar, A Singla…. 2017. ieeexplore.ieee.org … Forensics
and …. 2 cites.
    “Research Ideas for Artificial Intelligence in Auditing: The
Formalization of Audit and Workforce Supplementation“. H Issa, T Sun,
MA Vasarhelyi. 2016. aaajournals.org Journal of Emerging Technologies
…. 2 cites.
    “Rich Credentials for Remote Identity Proofing“. K Lewison, F
Corella. 2016. pomcor.com . 2 cites.
    “Scaling SPADE to “Big Provenance”“. A Gehani, H Kazmi, H Irshad.
2016. usenix.org … of the 8th USENIX Conference on Theory …. 2 cites.
    “Scoping: Exploring a collective R&D process for entrepreneurs,
microenterprises, and SMEs“. S COULSON, M WOODS. 2016.
discovery.dundee.ac.uk the Proceedings of the 20th DMI …. 2 cites.
    “Silicon to syringe: Cryptomarkets and disruptive innovation in
opioid supply chains“. M Gilbert, N Dasgupta. 2017. Elsevier
International Journal of Drug Policy. 2 cites.
    “Social Palimpsests–Clouding the Lens of the Personal Panopticon“.
N SHADBOLT. 2014. books.google.com … Yearbook 2014: Social Networks
and Social …. 2 cites.
    “Strong Federations: An Interoperable Blockchain Solution to
Centralized Third Party Risks“. J Dilley, A Poelstra, J Wilkins, M
Piekarska…. 2016. arxiv.org arXiv preprint arXiv …. 2 cites.
    “Sustainability of bitcoin and blockchains“. H Vranken. 2017.
Elsevier Current Opinion in Environmental Sustainability. 2 cites.
    “Systems and methods for executing cryptographically secure
transactions using voice and natural language processing“. MS Meadows.
2015. Google Patents US Patent App. 14/668,882. 2 cites.
    “The Alpha Engine: Designing an Automated Trading Algorithm“. A
Golub, J Glattfelder, RB Olsen. 2017. papers.ssrn.com . 2 cites.
    “The Anthropocene, resilience and post-colonial computation“. D
McQuillan. 2017. Taylor & Francis Resilience. 2 cites.
    “the Deep Web“. V Ciancaglini, M Balduzzi, R McArdle, M Rösler.
2015. trendmicro.nl Trend Micro. 2 cites.
    “The economics of crypto-democracy“. DWE Allen, C Berg, AM Lane, J
Potts. 2017. papers.ssrn.com . 2 cites.
    “Towards self-sovereign identity using blockchain technology“. DS
Baars. 2016. essay.utwente.nl . 2 cites.
    “Trust Implications of DDoS Protection in Online Elections“. C
Culnane, M Eldridge, A Essex, V Teague. 2017. Springer … Joint
Conference on …. 2 cites.
    “Virtual currencies and the implications for US anti-money
laundering regulations“. BA Pamplin. 2014. search.proquest.com . 2
cites.
    “What happened to global banking after the crisis?“. D
Schoenmaker, D Schoenmaker. 2017. emeraldinsight.com Journal of
Financial …. 2 cites.
    “A forensic look at Bitcoin cryptocurrency“. MD Doran. 2014.
search.proquest.com . 1 cites.
    “An Analysis of Attacks on Blockchain Consensus“. G Bissias, BN
Levine, AP Ozisik…. 2016. arxiv.org arXiv preprint arXiv …. 1 cites.
    “An Efficient E2E Verifiable E-voting System without Setup
Assumptions“. A Kiayias, T Zacharias, B Zhang. 2017.
ieeexplore.ieee.org IEEE Security & Privacy. 1 cites.
    “An Introduction to the Blockchain and Its Implications for
Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical
Reference Services Quarterly. 1 cites.
    “Anonymity Properties of the Bitcoin P2P Network“. G Fanti, P
Viswanath. 2017. arxiv.org arXiv preprint arXiv:1703.08761. 1 cites.
    “As technology goes democratic, nations lose military control“. B
FitzGerald, J Parziale. 2017. Taylor & Francis Bulletin of the Atomic
Scientists. 1 cites.
    “Automatically Inferring Malware Signatures for Anti-Virus
Assisted Attacks“. C Wressnegger, K Freeman, F Yamaguchi…. 2017.
dl.acm.org … of the 2017 ACM on Asia …. 1 cites.
    “Autonomous Weapon Systems and Strategic Stability“. J Altmann, F
Sauer. 2017. iiss.tandfonline.com Survival. 1 cites.
    “BITCOIN COMO ALTERNATIVA TRANSVERSAL DE INTERCAMBIO MONETARIO EN
LA ECONOMÍA DIGITAL“. ZJP Cárdenas, MAV Avellaneda…. 2015.
revistas.udistrital.edu.co Redes de …. 1 cites.
    “Bitcoin, the Law and Emerging Public Policy: Towards a 21st
Century Regulatory Scheme“. GM Karch. 2014. HeinOnline Fla. A & M UL
Rev.. 1 cites.
    “Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript
of Discussion)“. ST Ali. 2015. Springer Cambridge International
Workshop on Security …. 1 cites.
    “BitIodine: Extracting Intelligence from the Bitcoin Network“. F
Maggi, S Zanero, M Spagnuolo. 2014. . 1 cites.
    “Cloud as a Service: Understanding the Service Innovation
Ecosystem“. E Castro-Leon, R Harmon. 2016. books.google.com . 1 cites.
    “Conflict of Laws Cross to Public International Laws: The
Conflicting Models in the Conceptualisation of Disability Rights Under
International Humanitarian Law and …“. I Mugabi. 2015. papers.ssrn.com
. 1 cites.
    “Cyberinsurance Value Generator or Cost Burden?“. SK Ishaq, C
CISA. 2016. isaca.org . 1 cites.
    “Data Analytics and Big Data: Opportunity or Threat for the
Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos, C
Wong. 2016. papers.ssrn.com . 1 cites.
    “Dealer, Hacker, Lawyer, Spy. Modern Techniques and Legal
Boundaries of Counter-cybercrime Operations“. K Bojarski. 2015.
academia.edu The European Review of Organised Crime. 1 cites.
    “Digital diplomatics and forensics: going forward on a global
basis“. FB Cohen. 2015. emeraldinsight.com Records Management Journal.
1 cites.
    “Digital diplomatics and measurement of electronic public data
qualities: What lessons should be learned?“. B Makhlouf Shabou. 2015.
emeraldinsight.com Records Management Journal. 1 cites.
    “Digital Preservation: From Possible to Practical“. G Dingwall.
2017. books.google.com Currents of Archival Thinking. 1 cites.
    “Disrupting Agents, Distributing Agency“. CHP Zuckerman. 2017.
books.google.com Distributed Agency. 1 cites.
    “How companies achieve balance between technology enabled
innovation and cyber-security“. NNN Nelson. 2016. dspace.mit.edu . 1
cites.
    “Incentivizing blockchain forks via whale transactions“. K Liao, J
Katz. 2017. cs.umd.edu Bitcoin Workshop. 1 cites.
    “Information Security and Privacy“. JK Liu, R Steinfeld. 2007.
Springer . 1 cites.
    “Macroprudential policy–closing the financial stability gap“. S
Fahr, S Fahr, J Fell, J Fell. 2017. emeraldinsight.com Journal of
Financial Regulation …. 1 cites.
    “MeDShare: Trust-Less Medical Data Sharing Among Cloud Service
Providers via Blockchain“. Q Xia, EB Sifah, KO Asamoah, J Gao, X Du….
2017. ieeexplore.ieee.org IEEE …. 1 cites.
    “MOBILE SECURITY TECHNOLOGY“. C Decharms. 2016.
freepatentsonline.com US Patent 20,160,192,166. 1 cites.
    “NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data
Sharing with Group Users“. A Fu, S Yu, Y Zhang, H Wang…. 2017.
ieeexplore.ieee.org IEEE Transactions on Big …. 1 cites.
    “Object-oriented diplomatics: Using archival diplomatics in
software application development to support authenticity of digital
records“. A Jansen. 2015. emeraldinsight.com Records Management
Journal. 1 cites.
    “P2P Mixing and Unlinkable P2P Transactions“. P Moreno-Sanchez, T
Ruffing, A Kate. 2016. pdfs.semanticscholar.org Draft, June. 1 cites.
    “Personal Archive Service System using Blockchain Technology: Case
Study, Promising and Challenging“. Z Chen, Y Zhu. 2017.
ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE …. 1 cites.
    “Preserving the Archival Bond in Distributed Ledgers: A Data Model
and Syntax“. VL Lemieux, M Sporny. 2017. dl.acm.org … of the 26th
International Conference on World …. 1 cites.
    “Privacy-preserving smart grid tariff decisions with
blockchain-based smart contracts“. F Knirsch, A Unterweger, G Eibl, D
Engel. 2018. Springer Sustainable Cloud and Energy …. 1 cites.
    “Proof of Stake Blockchain: Performance and Scalability for
Groupware Communications“. J Spasovski, P Eklund. 2017.
researchgate.net Proceedings of the International …. 1 cites.
    “Revisiting the effect of regulation, supervision and risk on
banking performance: Evidence from European banks based on PSTR
model“. H Rachdi, F Ben Bouheni. 2016. emeraldinsight.com Journal of
Financial Regulation and …. 1 cites.
    “Securing Claim Data via Block-Chains for a Peer to Peer
Platform“. W Slavin. 2016. Google Patents US Patent App. 15/004,702. 1
cites.
    “Security for 4G and 5G cellular networks: A survey of existing
authentication and privacy-preserving schemes“. MA Ferrag, L Maglaras,
A Argyriou…. 2017. arxiv.org arXiv preprint arXiv …. 1 cites.
    “Short selling and the development of anti-shorting laws in the
UK“. A Mohamad. 2016. emeraldinsight.com Journal of Financial
Regulation and Compliance. 1 cites.
    “Software independence revisited“. RL Rivest, M Virza. 2017.
people.csail.mit.edu … -World Electronic Voting: Design, Analysis …. 1
cites.
    “Solving Modern Crime in Financial Markets: Analytics and Case
Studies“. MC Frunza. 2015. books.google.com . 1 cites.
    “System and method for data management structure using auditable
delta records in a distributed environment“. S Grefen, A Jaehde, D
Mackie. 2016. Google Patents US Patent App. 15/367,873. 1 cites.
    “The 21st Century Case for Gold: A New Information Theory of
Money“. G Gilder. 2016. thescienceexperience.org . 1 cites.
    “The Adoption Process of Cryptocurrencies-Identifying factors that
influence the adoption of cryptocurrencies from a multiple stakeholder
perspective“. HF Spenkelink. 2014. essay.utwente.nl . 1 cites.
    “The Challenge of Bitcoin Pseudo-Anonymity to Computer Forensics“.
EJ Imwinkelried, J Luu. 2015. papers.ssrn.com . 1 cites.
    “The crowdjury, a crowdsourced justice system for the
collaboration era“. F Ast, A Sewrjugin. 2015. weusecoins.com . 1
cites.
    “The measurement and regulation of shadow banking in Ireland“. J
Stewart, J Stewart, C Doyle…. 2017. emeraldinsight.com Journal of
Financial …. 1 cites.
    “The New Market Manipulation“. TCW Lin. 2016. HeinOnline Emory LJ. 1 cites.
    “The Tao of open source intelligence“. S Bertram. 2015.
books.google.com . 1 cites.
    “Time intervals as a Behavioral Biometric“. JV Monaco. 2015.
researchgate.net . 1 cites.
    “Towards an internet of trust: issues and solutions for
identification and authentication in the internet of things“. M
Signorini. 2015. tdx.cat . 1 cites.
    “Tracking digital footprints: anonymity within the bitcoin
system“. P Reynolds, P Reynolds, ASM Irwin…. 2017. emeraldinsight.com
Journal of Money …. 1 cites.
    “Uncoupling the relationship between corruption and money
laundering crimes“. N Mugarura. 2016. emeraldinsight.com Journal of
Financial Regulation and Compliance. 1 cites.
    “Virtual Currencies and Fundamental Rights“. C Rueckert. 2016.
papers.ssrn.com Browser Download This Paper. 1 cites.
    “Visualization and Data Provenance Trends in Decision Support for
Cybersecurity“. J Garae, RKL Ko. 2017. Springer Data Analytics and
Decision Support for Cybersecurity. 1 cites.
    “When the cookie meets the blockchain: Privacy risks of web
payments via cryptocurrencies“. S Goldfeder, H Kalodner, D Reisman….
2017. arxiv.org arXiv preprint arXiv …. 1 cites.
    “Точки экономического и инновационного роста: модель организации
эффективного функционирования региона“. ДД Буркальцева. 2017.
cyberleninka.ru МИР (Модернизация. Инновации. Развитие). 1 cites.
    ““SMART” CONTRACT MARKETS: TRADING DERIVATIVES CONTRACTS ON THE
BLOCKCHAIN“. TI KIVIAT. 2015. pdfs.semanticscholar.org . 0 cites.
    “11th USENIX Symposium on Networked Systems Design and
Implementation“. S IX. 2016. enigma.usenix.org . 0 cites.
    “12 Social media’s impact on intellectual property rights“. D
Collopy. 2017. books.google.com Handbook of Research on Counterfeiting
and Illicit …. 0 cites.
    “3TH1CS: A reinvention of ethics in the digital age?“. P Otto, E
Gräf. 2017. iRights Media . 0 cites.
    “4.25 Chromatic index/edge coloring“. M Lewenstein, S Pettie….
2017. vesta.informatik.rwth-aachen.de … and Hardness in …. 0 cites.
    “4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D
COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy
…“. PH Jones, KM Dye. 2016. dtic.mil . 0 cites.
    “4-D printing (four-dimensional printing)“. A Rajey. 0.
tngconsultores.com. 0 cites.
    “A Bibliography of O’Reilly & Associates and O’Reilly Media. Inc.
Publishers“. NHF Beebe. 2017. 155.101.98.136 . 0 cites.
    “A blockchain future to Internet of Things security: A position
paper“. M Banerjee, J Lee, KKR Choo. 2017. Elsevier Digital
Communications and Networks. 0 cites.
    “A Block-Chain Implemented Voting System“. F Caiazzo, M Chow.
2016. cs.tufts.edu . 0 cites.
    “A Comprehensive Insight towards Research Direction in Information
Propagation“. N Kayarvizhy. 0. researchgate.net. 0 cites.
    “A conceptual framework for the Basel accords-based regulation“. J
Mohammed Ahmed. 2016. emeraldinsight.com Journal of Financial
Regulation and …. 0 cites.
    “A Cross-Sectional Overview of Cryptoasset Governance and
Implications for Investors“. N Carter. 0. coinmetrics.io. 0 cites.
    “A Distributed Public Key Infrastructure for the Web Backed by a
Blockchain“. B Fredriksson. 2017. diva-portal.org . 0 cites.
    “A Distributed X. 509 Public Key Infrastructure Backed by a
Blockchain“. B Fredriksson. 2017. helix.stormhub.org . 0 cites.
    “A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS“. C Zhao, Y
Guan. 2015. Springer IFIP International Conference on Digital
Forensics. 0 cites.
    “A novel method to authenticate in website using CAPTCHA‐based
validation“. SK Krishnamoorthy…. 2016. Wiley Online Library Security
and …. 0 cites.
    “A platform for end-to-end mobile application infrastructure
analytics using system log correlation“. V Ramakrishna, N Rajput….
2017. ieeexplore.ieee.org IBM Journal of …. 0 cites.
    “A proposal to improve the authentication process in m-health
environments“. FD Guillén-Gámez, I García-Magariño…. 2017.
ieeexplore.ieee.org IEEE …. 0 cites.
    “A restful e-health interoperability platform: case of Nairobi
County health facilities“. DK Rono. 2016. su-plus.strathmore.edu . 0
cites.
    “A Scalable and Lightweight Grouping Proof Protocol for Internet
of Things Applications“. S Rostampour, N Bagheri, M Hosseinzadeh….
2017. Springer The Journal of …. 0 cites.
    “A study of Bitcoin as a currency for email-based
micro-transactions“. B Eriksson. 2016. diva-portal.org . 0 cites.
    “A Survey on FinTech“. K Gai, M Qiu, X Sun. 2017. Elsevier Journal
of Network and Computer Applications. 0 cites.
    “A Text-Independent Speaker Authentication System for Mobile
Devices“. F Thullier, B Bouchard, BAJ Menelas. 2017. mdpi.com
Cryptography. 0 cites.
    “Adaptation 12 strategies of cybercriminals to interventions from
public and private sectors“. F Jansen, J van Lenthe. 2016.
books.google.com Cybercrime Through an Interdisciplinary …. 0 cites.
    “Advance Program“. P MobiApps, E SNAMS, ABA SITA. 2016.
ficloud.org . 0 cites.
    “Advances in Digital Forensics XIII: 13th IFIP WG 11.9
International Conference, Orlando, FL, USA, January 30-February 1,
2017, Revised Selected Papers“. G Peterson, S Shenoi. 2017.
books.google.com . 0 cites.
    “Advances in Internetworking, Data & Web Technologies: The 5th
International Conference on Emerging Internetworking, Data & Web
Technologies (EIDWT …“. L Barolli, M Zhang, XA Wang. 2017.
books.google.com . 0 cites.
    “Algorithmic governance: Developing a research agenda through the
power of collective intelligence“. J Danaher, MJ Hogan, C Noone….
2017. journals.sagepub.com Big Data & …. 0 cites.
    “Alumni US“. JP Mitrovic. 2010. alumnius.net The Center for
Leadership Studies Network at the …. 0 cites.
    “Amazon Cloud Journal“. PR Newswire. 0. amazon.ulitzer.com. 0 cites.
    “American Kingpin: The Epic Hunt for the Criminal Mastermind
Behind the Silk Road“. N Bilton. 2017. books.google.com . 0 cites.
    “American Kingpin: The Epic Hunt for the Criminal Mastermind
behind the Silk Road Drugs Empire“. N Bilton. 2017. Random House . 0
cites.
    “An Analysis of Energy and Hardware Impacts on the Bitcoin Mining
Network“. J LEE, Y KIM. 0. jakehlee.com. 0 cites.
    “An approach for initiating interventions for bank recovery“. CAE
Goodhart, CAE Goodhart…. 2017. emeraldinsight.com Journal of Financial
…. 0 cites.
    “An Exploratory Analysis of the Security Risks of the Internet of
Things in Finance“. K Markantonakis. 2017. books.google.com Trust,
Privacy and Security in Digital Business …. 0 cites.
    “An Exploratory Analysis of the Security Risks of the Internet of
Things in Finance“. C Shepherd, FAP Petitcolas, RN Akram…. 2017.
Springer … Conference on Trust …. 0 cites.
    “An Innovative Merger of Academe and Corporation: A Non-Thesis
Distance Computing Masters’ Degree with IBM Open Badging
Technologies“. RF Roggio, K Shaik. 2017. search.proquest.com
International Conference on Computer …. 0 cites.
    “Analysis of Bitcoin Transaction Flows to Reveal Usage and
Geographic Patterns“. SP Bissessar. 2013. nicolascourtois.com The New
York Times. 0 cites.
    “Analysis of Present Day Election Processes Vis-À-Vis Elections
Through Blockchain Technology“. K Hegadekatti. 2017. papers.ssrn.com .
0 cites.
    “Analysis of the impact of technological advances on financial
institutions“. MJ Michalow. 2016. search.proquest.com . 0 cites.
    “and the Chair of the Applied Economics Department at the Sapir
Academic College. His main areas of interest are innovation and
high-tech policy, economic growth …“. R Bar-El. 2017.
emeraldinsight.com Human Capital and Assets in the Networked World. 0
cites.
    “Arbitrage and International Trade and Finance“. K Doshi. 2017.
qrius.com Science. 0 cites.
    “Artificial Intelligence and Blockchains in financial services.
Potential applications, challenges, and risks“. A Shet Shirodkar.
2017. content.grin.com . 0 cites.
    “Artificial Intelligence–Fact or Fiction“. KVN Rajesh, KVN Ramesh.
2012. csi-india.org Computing NaNo. 0 cites.
    “Authenticated Data Redaction with Fine-Grained Control“. J Ma, J
Liu, X Huang, Y Xiang…. 2017. ieeexplore.ieee.org IEEE Transactions on
…. 0 cites.
    “Authorization by Documents“. H Sato. 2017. jstage.jst.go.jp
Journal of Information Processing. 0 cites.
    “Automated Workflow Scheduling in Self-Adaptive Clouds: Concepts,
Algorithms and Methods“. G Kousalya, P Balakrishnan, CP Raj. 2017.
Springer . 0 cites.
    “Automating the accounts payable process“. M Heusser. 0.
tngconsultores.com. 0 cites.
    “Automating the accounts payable process“. M Heusser. 0.
tngconsultores.com. 0 cites.
    “Backchanneling Quantum Bit (Qubit)’Shuffling’: Quantum Bit
(Qubit)’Shuffling’as Added Security by Slipstreaming Q-Morse“. J
Ronczka. 2016. ieeexplore.ieee.org Computer Science and Engineering
(APWC on …. 0 cites.
    “Bare Feet Pat The Earth: Hardships, Future And Legislations For
The Salt Pan Workers In Kutch“. K Doshi. 2017. qrius.com Science. 0
cites.
    “Big Data Analytics: Opportunity or Threat for the Accounting
Profession?“. G Richins, A Stapleton, TC Stratopoulos…. 2017.
aaajournals.org Journal of Information …. 0 cites.
    “Big Data on Ulitzer“. M Walker, K Irwin. 0. bigdata.ulitzer.com. 0 cites.
    “Big Data Orchestration as a Service Network“. C Esposito, A
Castiglione…. 2017. ieeexplore.ieee.org IEEE Communications …. 0
cites.
    “Bioengineering and biocrime“. V Sutton. 2017. books.google.com
The Routledge Handbook of Technology, Crime and …. 0 cites.
    “Bitcoin as an investment asset: The added value of bitcoin in a
global market portfolio“. S Klabbers. 2017. theses.ubn.ru.nl . 0
cites.
    “Bitcoin forensics: a tutorial“. D Neilson, S Hara, I Mitchell.
2017. Springer … Conference on Global Security, Safety, and …. 0
cites.
    “Bitcoin regulations and investigations: A proposal for US
policies“. JP Fawcett. 2017. search.proquest.com . 0 cites.
    “Bitcoin: Between Digital Currency and Financial Commodity“. ML
Perugini, C Maioli. 2014. papers.ssrn.com . 0 cites.
    “Bitcoin: Pyramid-scheme Wildfire, New Online Payment Medium, or
Future Alternative Currency?“. H Vozak. 0. dspace.cuni.cz. 0 cites.
    “BITCOIN-BANKING AND TECHNOLOGICAL CHALLENGES“. G Kunjadić. 0. . 0 cites.
    “BitIodine: Extracting Intelligence from the Bitcoin Network“. D
NECSTLab. 2014. books.google.com Financial Cryptography and Data
Security: 18th …. 0 cites.
    “BLOCK CHAIN BASED DATA LOGGING AND INTEGRITY MANAGEMENT SYSTEM
FOR CLOUD FORENSICS“. JH Park, JY Park, EN Huh. 0.
pdfs.semanticscholar.org. 0 cites.
    “Blockchain and Distributed Ledgers as Trusted Recordkeeping
Systems“. VL Lemieux. 0. researchgate.net. 0 cites.
    “Blockchain as an Audit-Able Communication Channel“. S Suzuki, J
Murai. 2017. ieeexplore.ieee.org Computer Software and Applications ….
0 cites.
    “Blockchain as an enabler for public mHealth solutions in South
Africa“. M WEISS, A BOTHA, M HERSELMAN, G LOOTS. 0. researchgate.net.
0 cites.
    “Blockchain entrepreneurship opportunity in the practices of the
unbanked“. GJ Larios-Hernández. 2017. Elsevier Business Horizons. 0
cites.
    “Blockchain Explorer: An Analytical Process and Investigation
Environment for Bitcoin“. H Kuzuno, C Karam. 0. ieeexplore.ieee.org. 0
cites.
    “Blockchain for smart grid resilience: Exchanging distributed
energy at speed, scale and security“. M Mylrea, SNG Gourisetti. 2017.
ieeexplore.ieee.org Resilience Week (RWS), 2017. 0 cites.
    “Blockchain for the people: Blockchain technology as the basis for
a secure and reliable e-voting system“. M Kovic. 2017. osf.io . 0
cites.
    “Blockchain or not blockchain, that is the question of the
insurance and other sectors“. F Lamberti, V Gatteschi, C Demartini….
2017. ieeexplore.ieee.org IT …. 0 cites.
    “Blockchain Security in Cloud Computing: Use Cases, Challenges,
and Solutions“. JH Park, JH Park. 2017. mdpi.com Symmetry. 0 cites.
    “Blockchain: Emergent Industry Adoption and Implications for
Accounting“. J Kokina, R Mancha…. 2017. aaajournals.org Journal of
Emerging …. 0 cites.
    “Blockchain: Vision and Challenges“. G Caglar, YS Hanay. 2016.
internetinitiative.ieee.org Newsletter. 0 cites.
    “Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and
Their Consensus Mechanisms“. A Judmayer, N Stifter, K Krombholz….
2017. morganclaypool.com Synthesis Lectures on …. 0 cites.
    “BlockSci: Design and applications of a blockchain analysis
platform“. H Kalodner, S Goldfeder, A Chator, M Möser…. 2017.
arxiv.org arXiv preprint arXiv …. 0 cites.
    “Bobbies on the net: a police workforce for the digital age“. A
Hitchcock, R Holmes, E Sundorph. 2017. reform.uk . 0 cites.
    “Breaking Data as a Service News“. PR Newswire. 0.
daas.ulitzer.com. 0 cites.
    “Breaking van Gogh: Saint-Rémy, Forgery, and the $95 Million Fake
at the Met“. JO Grundvig. 2016. books.google.com . 0 cites.
    “Buying Votes in the 21st Century: The Potential Use of Bitcoins
and Blockchain Technology in Electronic Voting Reform“. B Bogucki.
2017. HeinOnline Asper Rev. Int’l Bus. & Trade L.. 0 cites.
    “by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o
Milestones. 0. tngconsultores.com. 0 cites.
    “by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o
Milestones. 0. tngconsultores.com. 0 cites.
    “Call for Participants“. JPY Regular, FT Student. 0.
jstage.jst.go.jp. 0 cites.
    “Career Summary“. BM David. 0. bmdavid.com. 0 cites.
    “CEOs in Technology“. FDA First. 0. ceo.ulitzer.com. 0 cites.
    “CHANGE HISTORY“. S Martín. 0. truessec.eu. 0 cites.
    “Changing the Practice of Law Leadership“. K Grady. 0.
seytlines.com. 0 cites.
    “Changing the rules of the game: How can law enforcement deter
criminals by increasing the risks of conducting cybercrime?“. P Amann,
A Klayn, G Mounier. 2017. ingentaconnect.com Cyber Security: A Peer ….
0 cites.
    “Characterization of Counterfeit and Substandard Medicines Using
Capillary Electrophoresis“. JSS Rudaz. 2016. chromatographyonline.com
. 0 cites.
    “Child abuse materials as digital goods: Why we should fear new
commercial forms“. KV Acar. 2017. econstor.eu . 0 cites.
    “Chuncan Deng, Cheng Yang, Fangyong Xiao, Dajie Suolang and
Wenshan She. Accurate Recognition and Extraction of Massive Device
Monitoring Signals Based …“. AR Arban Uka, O Tahan, R Hawchar, F
Matar. 0. ieeexplore.ieee.org Algorithms. 0 cites.
    “Cloud as a Service“. E Castro-Leon, R Harmon. 0. Springer. 0 cites.
    “Cloud Computing as a Service“. E Castro-Leon, R Harmon. 2016.
Springer Cloud as a Service. 0 cites.
    “Cloud Storage: Background and Related Work“. J Reardon. 2016.
Springer Secure Data Deletion. 0 cites.
    “Command Disaggregation Attack and Mitigation in Industrial
Internet of Things“. P Xun, PD Zhu, YF Hu, PS Cui, Y Zhang. 2017.
mdpi.com Sensors. 0 cites.
    “Cómo funciona blockchain: Una explicación infográfica“. E
McLaughlin. 0. tngconsultores.com. 0 cites.
    “Computer Security–ESORICS 2017: 22nd European Symposium on
Research in Computer Security, Oslo, Norway, September 11-15, 2017,
Proceedings“. SN Foley, D Gollmann, E Snekkenes. 2017.
books.google.com . 0 cites.
    “CONNECTING MULTIPLE DEVICES WITH BLOCKCHAIN IN THE INTERNET OF
THINGS“. JJ Karst, G Brodar. 0. courses.cs.ut.ee. 0 cites.
    “Conspiracy Theories and Their Investigator (s), Matthew RX
Dentith“. MRX Dentith. 0. social-epistemology.com. 0 cites.
    “Constructing Narrative in the Contemporary Music Industries“. K
Barr. 2017. joebennett.net Presented at IASPM. 0 cites.
    “Contemplating human-centred security & privacy research:
Suggesting future directions“. K Renaud, S Flowerday. 2017. Elsevier
Journal of Information Security and Applications. 0 cites.
    “Contributions to Content Placement, Load-balancing and Caching:
System Design and Security“. C Neumann. 2016. hal.inria.fr . 0 cites.
    “Controlling Cyberspace“. D Lewis. 2017. qrius.com History. 0 cites.
    “Critical analysis and comparison of data protection techniques
for genomics data sets“. D Naro. 2016. upcommons.upc.edu . 0 cites.
    “CrowdBC: A Blockchain-based Decentralized Framework for
Crowdsourcing“. M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, J Liu. 0.
eprint.iacr.org. 0 cites.
    “Cryptocurrency the new money laundering problem for banking, law
enforcement, and the legal system“. T Jacquez. 2016.
search.proquest.com . 0 cites.
    “Cryptographic Key Management in Delay Tolerant Networks: A
Survey“. SA Menesidou, V Katos, G Kambourakis. 2017. mdpi.com Future
Internet. 0 cites.
    “Cryptography“. B Buchanan. 2017. books.google.com . 0 cites.
    “Current State Survey and Future Opportunities for Trust and
Security in Green Cloud Computing“. A Haouari, Z Mostapha, S Yassir.
2018. igi-global.com Cloud Computing Technologies for …. 0 cites.
    “Cyberspace Safety and Security: 9th International Symposium, CSS
2017, Xi’an China, October 23–25, 2017, Proceedings“. S Wen, W Wu, A
Castiglione. 2017. books.google.com . 0 cites.
    “Cyber-und Computerkriminalität: Prüfung doloser Handlungen“. A
Sowa. 2017. Springer Management der Informationssicherheit. 0 cites.
    “Cyrilic encryption based image Steganography algorithm“. V Shah.
2017. irjet.net . 0 cites.
    “D4. 1 Findings on economic modelling of malware as business
model“. D Hurley-Smith. 0. . 0 cites.
    “Damon Liwanu McCoy“. CAD Grunwald, D Sicker. 0.
pdfs.semanticscholar.org. 0 cites.
    “Darknet Forensics“. D Rathod. 0. ijettcs.org future. 0 cites.
    “Data and the City“. R Kitchin, TP Lauriault, G McArdle. 2017.
books.google.com . 0 cites.
    “Data provenance assurance in the cloud using blockchain“. S
Shetty, V Red, C Kamhoua, K Kwiat…. 2017. spiedigitallibrary.org … in
Sensors and …. 0 cites.
    “Decentralized enforcement of document lifecycle constraints“. S
Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone. 2017. Elsevier
Information Systems. 0 cites.
    “DECIPHERING CRYPTOCURRENCY: SHINING A LIGHT ON THE DEEP DARK
WEB“. C DiPiero. 2017. litigation-essentials.lexisnexis.com U. Ill. L.
Rev.. 0 cites.
    “Deep web: Challenges of catching the cyber criminal“. N
Williamson. 2014. search.proquest.com . 0 cites.
    “Defence Against Terrorism Review-DATR“. A Richards. 0.
researchgate.net. 0 cites.
    “Defining cybercrime based on roles of data processing systems“. X
Li. 2016. search.informit.com.au Pandora’s Box. 0 cites.
    “Deliverable D5. 2.1-Conception Exploitation plan“. P Meyer, M
Weinrich, S Custic, D Tofan, W Tremmel…. 0. acdc-project.eu. 0 cites.
    “De-SAG: On the De-anonymization of Structure-Attribute Graph
Data“. S Ji, T Wang, J Chen, W Li, P Mittal…. 2017.
ieeexplore.ieee.org IEEE Transactions on …. 0 cites.
    “Developing an adaptive Risk-based access control model for the
Internet of Things“. HF Atlam, A Alenezi, RJ Walters, GB Wills, J
Daniel. 2017. researchgate.net . 0 cites.
    “Development of Secure and Reliable Techniques for Data
Communication“. A Mileva, P RM Inácio, S Bouyuklieva, N Stojkovic….
2017. eprints.ugd.edu.mk . 0 cites.
    “Deviating From the Cybercriminal Script: Exploring Tools of
Anonymity (Mis) Used by Carders on Cryptomarkets“. GJ van Hardeveld, C
Webber…. 2017. journals.sagepub.com American Behavioral …. 0 cites.
    “Digital Currencies: Unlocking the Secrets of Crypto-Currencies“.
D Peterson. 2017. books.google.com . 0 cites.
    “Digital Currency: Risks, Rewards and Investigative Techniques“. P
Kraus. 2017. search.proquest.com . 0 cites.
    “Digital Forensic Implications of Collusion Attacks on the
Lightning Network“. D Piatkivskyi, S Axelsson, M Nowostawski. 2017.
Springer … on Digital Forensics. 0 cites.
    “Digital forensics: The smart person’s guide“. D Patterson. 0.
tngconsultores.com. 0 cites.
    “Digital forensics: The smart person’s guide“. D Patterson. 0.
tngconsultores.com. 0 cites.
    “Digital image integrity–a survey of protection and verification
techniques“. P Korus. 2017. Elsevier Digital Signal Processing. 0
cites.
    “Digital Watermarking of Non-media data stream (applications)“. A
Soltani Panah. 2017. researchbank.rmit.edu.au . 0 cites.
    “Digital Witness and Privacy in IoT: Anonymous Witnessing
Approach“. A Nieto, R Rios, J Lopez. 2017. ieeexplore.ieee.org
Trustcom/BigDataSE/ICESS, 2017 …. 0 cites.
    “Digitaler Tatort, Sicherung und Verfolgung digitaler Spuren“. D
Pawlaszczyk. 2017. Springer Forensik in der digitalen Welt: Moderne
Methoden der …. 0 cites.
    “Distributed Configuration, Authorization and Management in the
Cloud-Based Internet of Things“. M Henze, B Wolters, R Matzutt…. 2017.
ieeexplore.ieee.org … /ICESS, 2017 IEEE. 0 cites.
    “Do vouchers make a difference? A study of vouchers for improving
organizational capabilities in firms“. E Magro. 2016. delegia.com
EU-SPRI CONFERENCE LUND 2016. 0 cites.
    “Don’t Dirty Green!“. R Suryaprakash. 2017. qrius.com Science. 0 cites.
    “ED TECH TRENDS TO WATCH“. HOWABR LED. 0. pdf.101com.com. 0 cites.
    “Efficient private subset computation“. J Dou, L Gong, S Li, L Ma.
2016. Wiley Online Library Security and Communication …. 0 cites.
    “Electronic finance–recent developments“. K Dandapani, K
Dandapani. 2017. emeraldinsight.com Managerial Finance. 0 cites.
    “Emergence of Fintech and cybersecurity in a global financial
centre: Strategic approach by a regulator“. AW Ng, AW Ng, BKB Kwok….
2017. emeraldinsight.com Journal of Financial …. 0 cites.
    “Encyclopedia of Cyber Warfare“. PJ Springer. 2017.
books.google.com . 0 cites.
    “Energy-Efficient Distance-Bounding with Residual Charge
Computation“. Y Zhuang, A Yang, GP Hancke…. 2017. ieeexplore.ieee.org
IEEE Transactions on …. 0 cites.
    “Enhancing Breeder Document Long-Term Security Using Blockchain
Technology“. N Buchmann, C Rathgeb, H Baier…. 2017.
ieeexplore.ieee.org … ), 2017 IEEE 41st …. 0 cites.
    “Enhancing National Cybersecurity: The Current and Future States
of Cybersecurity in the Digital Economy“. T Patterson, E Liebig, R
Sapp, B Searcy, D Desai…. 0. nist.gov. 0 cites.
    “Establishing Governance for Hybrid Cloud and the Internet of
Things“. M Wolfe. 2016. books.google.com Handbook of Research on
End-to-End Cloud …. 0 cites.
    “Europe and MENA Cooperation Advances in Information and
Communication Technologies“. Á Rocha, M Serrhini, C Felgueiras. 2017.
Springer . 0 cites.
    “Evolution of bitcoin and security risk in bitcoin wallets“. PK
Kaushal, A Bagga, R Sobti. 2017. ieeexplore.ieee.org … and Electronics
(Comptelix) …. 0 cites.
    “Examining the forensic artifacts produced by use of bitcoin
currency“. LD Jones. 2014. search.proquest.com . 0 cites.
    “Exploring the Essence of Records Management, Engaging with
Experts: Proceedings“. R Barry. 2007. emeraldinsight.com Records
Management Journal. 0 cites.
    “FBI DIRECTOR COMEY NOT QUALIFIED TO DECIDE ON HILLARY
EMAILGATE-REWROTE LAW“. U CONFLICT, HISM CLINTON. 0. fbcoverup.com. 0
cites.
    “FDA News“. PR Newswire. 0. fda.ulitzer.com. 0 cites.
    “Financial Stability Governance Today: A Job Half Done“. A Large.
0. group30.org. 0 cites.
    “Forenzní analýza sítě Bitcoin“. PBT DROZDA, V VESELÝ. 2016.
itspy.cz . 0 cites.
    “Four tips for effective software testing“. RF Goldsmith. 0.
tngconsultores.com. 0 cites.
    “From show on blog page“. S Milan, E Treré. 0. data-activism.net. 0 cites.
    “From SMOG to Fog: A security perspective“. R Rios, R Roman, JA
Onieva…. 2017. ieeexplore.ieee.org Fog and Mobile Edge …. 0 cites.
    “GI-Dagstuhl Seminar 16353 on Aware Machine to Machine
Communication“. M Arumaithurai, S Sigg, X Wang. 0. dagstuhl.de. 0
cites.
    “Governing eMoney: On Bitcoin & Global Governance“. DAL Pope, R
Marlin-Bennett. 2016. academia.edu . 0 cites.
    “Government Activities to Detect, Deter and Disrupt Threats
Enumerating from the Dark Web“. NV Denic. 2017. dtic.mil . 0 cites.
    “Government News“. A This. 0. gov.ulitzer.com. 0 cites.
    “Graph Analytics for Real-Time Scoring of Cross-Channel
Transactional Fraud“. I Molloy, S Chari, U Finkler, M Wiggerman….
2016. Springer … Conference on Financial …. 0 cites.
    “Graph Analytics for Real-Time Scoring of Cross-Channel
Transactional Fraud“. C Jonker, T Habeck, Y Park, F Jordens…. 0.
books.google.com … Cryptography and Data …. 0 cites.
    “Graph-based forensic investigation of Bitcoin transactions“. C
Zhao. 2014. lib.dr.iastate.edu . 0 cites.
    “Heritage. exe. The current state and future of Norwegian software
preservation-mapping the challenges of preserving locally executable
digital artifacts and the …“. TB Madsen. 2016. dspace.uib.no . 0
cites.
    “Himachal Pradesh, growing to prosper“. PS Vyas. 2017. qrius.com
Science. 0 cites.
    “Hitching Healthcare to the Chain: An Introduction to Blockchain
Technology in the Healthcare Sector“. MA Engelhardt. 2017.
timreview.ca Technology Innovation Management Review. 0 cites.
    “How Sensitive Is Genetic Data?“. M Sariyar, S Suhr, I Schlünder.
2017. online.liebertpub.com Biopreservation and …. 0 cites.
    “HPCC-SmartCity-DSS 2016“. X Ling, J Yang, D Wang, J Chen, L Li.
0. ieeexplore.ieee.org. 0 cites.
    “Human Capital and Assets in the Networked World“. M Russ. 2017.
emeraldinsight.com . 0 cites.
    “ICIOT 2017“. M Hossain, R Hasan. 0. ieeexplore.ieee.org. 0 cites.
    “Identifying and analyzing digital payment flows regarding illegal
purposes on the Internet: I samarbete med CGI och Finanskoalitionen“.
C Berggren, J Asplund. 2016. diva-portal.org . 0 cites.
    “IEEE CCEM 2016 Program Details“. P Chelliah, A Mangalvedkar. 0.
ieeexplore.ieee.org. 0 cites.
    “II. Cyber-OC in the Netherlands“. G Odinot, MA Verhoeven, RLD
Pool…. 0. researchgate.net Cyber-OC–Scope and …. 0 cites.
    “Impact of Technology Innovation: A Study on Cloud Risk
Mitigation“. N Suresh, M Gupta. 2017. books.google.com Information
Technology Risk Management …. 0 cites.
    “Incentive Compatibility of Pay Per Last N Shares in Bitcoin
Mining Pools“. Y Zolotavkin, J García, C Rudolph. 2017. Springer … on
Decision and Game Theory for …. 0 cites.
    “Indian export competitiveness and performance: A long story“. A
Kulkarni. 2017. qrius.com Science. 0 cites.
    “Indiana Journal of Law and Social Equality“. M Selmi. 2014.
scholarship.law.gwu.edu . 0 cites.
    “Information Security and Privacy: 21st Australasian Conference,
ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings“.
JK Liu, R Steinfeld. 2016. books.google.com . 0 cites.
    “Infrastructure 2.0 Journal“. M Kim, DS Meliksetian, C Malone. 0.
infrastructure20.ulitzer.com. 0 cites.
    “Intellectual Property in Silicon Valley“. PR Newswire. 0.
ip.ulitzer.com. 0 cites.
    “Internet Voting Using Zcash“. P Tarasov, H Tewari. 0.
allquantor.at. 0 cites.
    “Introduzione Agli Smart Contract (Introduction to Smart
Contract)“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com . 0
cites.
    “Investigation of Cryptocurrency Wallets on iOS and Android Mobile
Devices for Potential Forensic Artifacts“. A Montanez. 2014.
marshall.edu . 0 cites.
    “IoT based smart home: Security challenges, security requirements
and solutions“. W Ali, G Dustgeer, M Awais…. 2017. ieeexplore.ieee.org
… and Computing (ICAC) …. 0 cites.
    “iPad on Ulitzer“. PR Newswire. 0. ipad.ulitzer.com. 0 cites.
    “Islamic State of Iraq and Syria Revenue Sources and
Countermeasures With a Specific Look at Cryptocurrency Use“. DM
Haines. 2017. search.proquest.com . 0 cites.
    “It’s the Cyber Crime and Its Sponsors (Not My Cyber-Security),
Stupid“. D Lawrence, F Townsend, T Murphy, D Garrie…. 2016. HeinOnline
JL & Cyber …. 0 cites.
    “JOnline: Dealing With Computer Fraud“. C Filip Van Hallewijn, A
CISM. 0. m.isaca.org. 0 cites.
    “JOURNAL OF LAW AND CYBER WARFARE“. S Comment. 0. jlcw.org. 0 cites.
    “Juridische beroepen in de toekomst“. MJ ter Voert, M Beenakkers.
0. researchgate.net. 0 cites.
    “Komparace právních podmínek užití kryptoměn ve Švýcarsku,
Spojených státech amerických a Japonsku“. A Yakimenka. 2017.
dspace.cuni.cz . 0 cites.
    “LAWNEWS“. J Ting-Edwards. 0. c-justice.com. 0 cites.
    “LE TRAFIC ILLICITE DE TABAC SUR LES CRYPTOMARCHÉS“. D
Décary-Hétu, V Mousseau, I Rguioui. 2017. daviddhetu.openum.ca . 0
cites.
    “Learning Python for Forensics“. P Miller, C Bryce. 2016.
books.google.com . 0 cites.
    “Legal Risks of Owning Cryptocurrencies“. K Low, EGS Teo. 2016.
papers.ssrn.com . 0 cites.
    “LegalTech on the Rise: Technology Changes Legal Work Behaviours,
But Does Not Replace Its Profession“. MM Bues, E Matthaei. 2017.
Springer Liquid Legal. 0 cites.
    “Long term data storage using peer-to-peer technology“. PN
Meessen, A de Vries. 2017. ru.nl . 0 cites.
    “Managing electronic records across organizational boundaries: The
experience of the Belgian federal government in automating
investigation processes“. L Maroye, L Maroye, S van Hooland…. 2017.
emeraldinsight.com Records …. 0 cites.
    “Matrix Accounting Illustrated: Contribution Margin“. M Hughes.
2016. Wiley Online Library Journal of Corporate Accounting & Finance.
0 cites.
    “MedRec: blockchain for medical data access, permission management
and trend analysis“. AC Ekblaw. 2017. dspace.mit.edu . 0 cites.
    “Memory Forensics and Bitcoin mining malware“. P Dimotikalis.
2016. repository.ihu.edu.gr . 0 cites.
    “Mentoring in Cyber Education: Capture-the-Flag Exercises to
Promote Good Cyber Hygiene in Disadvantaged Populations“. R Thomson.
0. westpoint.edu. 0 cites.
    “Method and apparatus for protecting digital photos from
alteration“. N Powers, TM Fortuna, P Kocsis. 2016. Google Patents US
Patent App. 15/260,074. 0 cites.
    “MMTC Communications-Frontiers“. A Costanzo, V Loscrì, S Costanzo.
0. mmc.committees.comsoc.org. 0 cites.
    “Mobile security technology“. US Patent App. 14/476,629. 2014.
Google Patents. 0 cites.
    “Mobile security technology“. US Patent App. 14/686,069. 2015.
Google Patents. 0 cites.
    “Money for Nothing and Bits for Free: The Geographies of Bitcoin“.
A Pel. 2015. tspace.library.utoronto.ca . 0 cites.
    “MỘT SỐ GIẢI PHÁP VỀ PHÁT TRIỂN NGUỒN NHÂN LỰC CÔNG NGHỆ THÔNG TIN
TẠI VIỆT NAM.“. G Trần Thu. 2017. data.uet.vnu.edu.vn . 0 cites.
    “Moving One Step Ahead of the 90’s Job Options“. RN Ahsan, A
Chatterjee. 2017. qrius.com Science. 0 cites.
    “Neuerwerbungen im Dezember 2016“. A von Fürstenberg, CP Müller….
2016. ub.uni-heidelberg.de Ann Arbor: University of …. 0 cites.
    “NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag
Platform“. P Matias, P Barbosa, T Cardoso, D Mariano…. 2017. arxiv.org
arXiv preprint arXiv …. 0 cites.
    “NUS Hackers“. IHA Git. 0. nushackers.org. 0 cites.
    “O novo eo atual na Arquivística internacional: a
desmaterialização, a interoperabilidade, a organização eo uso da
informação em evidência (2011-2016)“. MC Freitas, CG Silva. 2016.
bad.pt Actas do Encontro Nacional de Arquivos Municipais. 0 cites.
    “Online Anonymization Relating to Cyber Attacks“. J Cornwell.
2017. search.proquest.com . 0 cites.
    “Organised Cybercrime in the Netherlands“. G Odinot, MA Verhoeven,
RLD Pool, CJ de Poot. 0. wodc.nl. 0 cites.
    “OSC Staff Notice 33-748-Annual Summary Report for Dealers,
Advisers and Investment Fund Managers“. Ontario Securities Commission.
2017. osc.gov.on.ca Update. 0 cites.
    “Overview and Comparison of P2P File Synchronization and Storage
Solutions“. J Fröhlich, S Ruesch. 2015. csg.uzh.ch Communication
Systems VIII. 0 cites.
    “Peer-to-Peer Location-Based Services based on Blockchain and Web
Technologies“. G Brambilla. 2017. dspace-unipr.cineca.it . 0 cites.
    “Periyar Journal of Research in Business and Development Studies“.
S Chhabra, N Gangwar, AB Singhal, F Fatima…. 0. pmccdelhi.com. 0
cites.
    “Periyar Journal of Research in Business and Development Studies“.
S Singh. 0. pmccdelhi.com. 0 cites.
    “Personal control of privacy and data: Estonian experience“. J
Priisalu, R Ottis. 2017. Springer Health and Technology. 0 cites.
    “Pharmaceutical News on Ulitzer“. PR Newswire. 0.
pharmaceuticals.ulitzer.com. 0 cites.
    “Pluralism and Economics Today: Understanding the ISIPE
Rebellion“. A Baksy. 2017. qrius.com Science. 0 cites.
    “Policing af kryptomarkeder“. J Demant, R Munksgaard. 2017.
justitsministeriet.dk . 0 cites.
    “Predictive Computing and Information Security“. PK Gupta, V
Tyagi, SK Singh. 2017. Springer . 0 cites.
    “Predictive Computing and Information Security: A Technical
Review“. PK Gupta, V Tyagi, SK Singh. 2017. Springer Predictive
Computing and Information …. 0 cites.
    “Privacy in the Smart City–Applications, Technologies, Challenges
and Solutions“. D Eckhoff, I Wagner. 2017. ieeexplore.ieee.org IEEE
Communications Surveys & …. 0 cites.
    “Privacy Verification Chains for IoT“. N Foukia, D Billard, E
Solana. 2017. Springer International Conference on Network and …. 0
cites.
    “Privacy‐preserving smart data storage for financial industry in
cloud computing“. M Qiu, K Gai, H Zhao, M Liu. 0. Wiley Online Library
Concurrency and Computation: Practice …. 0 cites.
    “Process memory investigation of the Bitcoin Clients Electrum and
Bitcoin Core“. L van der Horst, KKR Choo, NA Le-Khac. 2017.
ieeexplore.ieee.org IEEE Access. 0 cites.
    “Prof J Maiti Head, I&SE“. PP Chakrabarti, IIT Director. 0.
iem.iitkgp.ernet.in. 0 cites.
    “Protecting Data Privacy in the Presence of Data Provenance“. P
Kianmajd. 2017. search.proquest.com . 0 cites.
    “Provenance threat modeling“. O Hambolu, L Yu, J Oakley, RR
Brooks…. 2016. ieeexplore.ieee.org Privacy, Security and …. 0 cites.
    “Public Evidence from Secret Ballots“. J Benaloh, M Bernhard, JA
Halderman…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
    “Quick Start“. MTWT Friday. 2016. wp.df.uba.ar . 0 cites.
    “Ransomware 7 and cryptocurrency“. GJ Ahn, A Doupe, Z Zhao, K
Liao. 2016. books.google.com Cybercrime Through an …. 0 cites.
    “Rarity trading legacy protection and digital convergence
platform“. MM Saigh, X Zhang. 2016. Google Patents US Patent App.
15/072,911. 0 cites.
    “Rational mining on bitcoin“. S Pachal. 2017. library.isical.ac.in
. 0 cites.
    “Rational Whistle Blower Prototypes Buch 1 Grundlagen, Ergebnisse
und Literatur“. G Förster. 2016. integrity-art.de . 0 cites.
    “Read The Manual“. M Faou, JI Boutin. 2017. welivesecurity.com . 0 cites.
    “RECALIBRATING LAW ENFORCEMENT TO KEEP PACE WITH NEW TECHNOLOGIES
AND FORMS OF CRIME“. MM Oberoi. 0. idsa.in SECURING CYBERSPACE. 0
cites.
    “Recent Trends in Information and Communication Technology:
Proceedings of the 2nd International Conference of Reliable
Information and Communication …“. F Saeed, N Gazem, S Patnaik, ASS
Balaid…. 2017. books.google.com . 0 cites.
    “Recognition of Traffic Sign Based on Bag-of-Words and Artificial
Neural Network“. KT Islam, RG Raj, G Mujtaba. 2017. mdpi.com Symmetry.
0 cites.
    “Reflections on the REST architectural style and principled design
of the modern web architecture (impact paper award)“. RT Fielding, RN
Taylor, JR Erenkrantz…. 2017. dl.acm.org Proceedings of the …. 0
cites.
    “Reflections upon periclitations in privacy: perspectives from
Rwanda’s digital transformation“. JP Nsengimana. 2017. Springer Health
and Technology. 0 cites.
    “Regulation based switching system for electronic message
routing“. J Crabtree, A Sellers, J Uchiyama. 2017. Google Patents US
Patent App. 15/489,716. 0 cites.
    “Report from GI-Dagstuhl Seminar 16394: Software Performance
Engineering in the DevOps World“. A van Hoorn, P Jamshidi, P Leitner,
I Weber. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
    “Report of the second expert group meeting on opportunities and
risks associated with the advent of digital currency in the
Caribbean“. NU CEPAL. 2015. repositorio.cepal.org . 0 cites.
    “Requisitos y soluciones de privacidad para la testificacion
digital“. A Nieto, R Rios. 0. nics.uma.es. 0 cites.
    “Research Challenges in Financial Data Modeling and Analysis“. L
Alexander, SR Das, Z Ives, HV Jagadish…. 2017. online.liebertpub.com
Big …. 0 cites.
    “Research Specialties“. T MOORE. 2016. tylermoore.ens.utulsa.edu
Computing. 0 cites.
    “Retrofit Device And Method Of Retrofitting A Flow Meter“. D
Mackie, S Grefen, CJ Boelter…. 2017. Google Patents US Patent App. 15
…. 0 cites.
    “REXIT: What It Brings to Light About Term Length“. B Pratap.
2017. qrius.com Science. 0 cites.
    “Schöne neue Verbraucherwelt?“. C Bala, W Schuldzinski. 0.
projekte.meine-verbraucherzentrale …. 0 cites.
    “Searchain: Blockchain-based private keyword search in
decentralized storage“. P Jiang, F Guo, K Liang, J Lai, Q Wen. 2017.
Elsevier Future Generation Computer …. 0 cites.
    “Section 75 and credit cards: misconceived interpretation?“. J
Mukwiri. 2005. emeraldinsight.com Journal of Financial Regulation and
Compliance. 0 cites.
    “Secure lightweight context-driven data logging for bodyworn
sensing devices“. M Siddiqi, ST All, V Sivaraman. 2017.
ieeexplore.ieee.org … Forensic and Security (ISDFS) …. 0 cites.
    “Securing Fog Computing for Internet of Things Applications:
Challenges and Solutions“. J Ni, K Zhang, X Lin, X Shen. 2017.
ieeexplore.ieee.org IEEE Communications Surveys & …. 0 cites.
    “Securing the Assets of Decentralized Applications using Financial
Derivatives}}“. G Bissias, BN Levine, N Kapadia, AP Ozisik…. 0.
people.cs.umass.edu Elsevier Child Abuse …. 0 cites.
    “Security Enhancement of Digital Watermarking“. MA Nematollahi, C
Vorakulpipat, HG Rosales. 2017. Springer Digital Watermarking. 0
cites.
    “Security Hands-On-Training–Part 6–Final“. L Rocha, I Handling. 0.
countuponsecurity.com. 0 cites.
    “SEEKING PAPERS ON COMPUTATIONAL SOCIAL SYSTEMS“. SD Computing, S
Computing. 0. ieeexplore.ieee.org. 0 cites.
    “Self-reported Verifiable Reputation with Rater Privacy“. R Bazin,
A Schaub, O Hasan, L Brunie. 2017. Springer IFIP International
Conference on …. 0 cites.
    “Share and Share Alike: The challenges from social media for
Intellectual Property Rights“. D Collopy. 2017. uhra.herts.ac.uk . 0
cites.
    “Small scale denial of service attacks“. V Bukač. 0. is.muni.cz. 0 cites.
    “Smart Contracts: A Preliminary Evaluation“. ML Perugini, P Dal
Checco. 2015. papers.ssrn.com . 0 cites.
    “Snap forensics: a tradeoff between ephemeral intelligence and
persistent evidence collection“. Y Yu, T Tun. 2017. oro.open.ac.uk . 0
cites.
    “Social, Cultural, and Behavioral Modeling“. D Lee, YR Lin, N
Osgood, R Thomson. 0. Springer. 0 cites.
    “Social, Cultural, and Behavioral Modeling: 10th International
Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017,
Proceedings“. D Lee, N Osgood, YR Lin, R Thomson. 2017.
books.google.com . 0 cites.
    “Sparse Encoded Matrix based Steganography algorithm“. V Shah.
2017. irjet.net . 0 cites.
    “Sticky policies approach within cloud computing“. G Spyra, WJ
Buchanan, E Ekonomou. 2017. Elsevier Computers & Security. 0 cites.
    “Students Link Brains to Fire Video Game Cannon“. J DORRIER. 0.
losnuevosguerreros.org. 0 cites.
    “Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT)“.
L Arief, TA Sundara. 2017. jurnal.iaii.or.id Jurnal RESTI (Rekayasa
Sistem dan Teknologi …. 0 cites.
    “Supporting users to take informed decisions on privacy settings
of personal devices“. I Torre, OR Sanchez, F Koceva, G Adorni. 2017.
Springer Personal and Ubiquitous …. 0 cites.
    “Systemic banking crises: completing the enhanced policy
responses“. O Frecaut, O Frecaut. 2017. emeraldinsight.com Journal of
Financial Regulation and …. 0 cites.
    “Tails Linux Operating System: Remaining Anonymous with the
Assistance of an Incognito System in Times of High Surveillance“. M
Dawson, JA Cárdenas-Haro. 2017. igi-global.com … and the Internet of
Things (IJHIoT). 0 cites.
    “Tamper-Resistant Mobile Health Using Blockchain Technology“. D
Ichikawa, M Kashiyama, T Ueno. 2017. ncbi.nlm.nih.gov JMIR mHealth and
uHealth. 0 cites.
    “TCCN Newsletter“. M Yannuzzi, R Milito, R Serral-Gracià, D
Montero…. 0. cn.committees.comsoc.org. 0 cites.
    “Technologien, Forschungsfragen und Anwendungen“. J Schütte, G
Fridgen, W Prinz, T Rose, NU FIT…. 0. aisec.fraunhofer.de. 0 cites.
    “TERRORIST USE OF VIRTUAL CURRENCIES“. ZK Goldman, E Maruyama, E
Rosenberg, E Saravalle…. 2017. caict.ac.cn . 0 cites.
    “The Bitcoin Guidebook: How to Obtain, Invest, and Spend the
World’s First Decentralized Cryptocurrency“. I DeMartino. 2016.
books.google.com . 0 cites.
    “The Cyber Triad“. B Thijssen. 2016. researchgate.net . 0 cites.
    “The Establishment of Bitcoin“. P Hesch. 2017.
dspace.allegheny.edu . 0 cites.
    “The Evolving Cloud“. J Weinman. 2017. ieeexplore.ieee.org IEEE
Cloud Computing. 0 cites.
    “The global village and it’s back-breaking terrain“. JD Ostry.
2017. qrius.com Science. 0 cites.
    “The illicit drug trade on the dark net: Analysing the need for a
new EU Framework“. Y Hassan. 2017. openaccess.leidenuniv.nl . 0 cites.
    “The impact of Self-Generated Images in online pornography“. A
Monaghan. 2017. eprints.mdx.ac.uk . 0 cites.
    “The Missing Account of Progressive Corporate Criminal Law“. WS
Laufer. 2017. papers.ssrn.com . 0 cites.
    “The New Bio-Citizen: How the Democratization of Genomics Will
Transform Our Lives from Epidemics Management to the Internet of
Living Things“. E Pauwels. 0. wilsoncenter.org. 0 cites.
    “The Nuts and Bolts of Micropayments: A Survey“. ST Ali, D Clarke,
P McCorry. 2017. arxiv.org arXiv preprint arXiv:1710.02964. 0 cites.
    “The Programmable Economy: Envisaging an Entire Planned Economic
System as a Single Computer Through Blockchain Networks“. K
Hegadekatti, Y SG. 2017. papers.ssrn.com . 0 cites.
    “The Tor browser: A forensic investigation study“. K Keller. 2016.
search.proquest.com . 0 cites.
    “Threshold Single Password Authentication“. D İşler, A Küpçü.
2017. Springer … Management, Cryptocurrencies and Blockchain …. 0
cites.
    “Towards a leaner, smarter public-sector workforce.“. A Hitchcock,
K Laycock, E Sundorph. 2017. reform.uk . 0 cites.
    “Towards an accountable software-defined networking architecture“.
BE Ujcich, A Miller, A Bates…. 2017. ieeexplore.ieee.org … (NetSoft),
2017 IEEE …. 0 cites.
    “Towards Efficient and Secure Encrypted Databases: Extending
Message-Locked Encryption in Three-Party Model“. Y Ishihara, T
Fujiwara. 2017. books.google.com … Blockchain Technology: ESORICS 2017
…. 0 cites.
    “Towards Efficient and Secure Encrypted Databases: Extending
Message-Locked Encryption in Three-Party Model“. Y Furuta, N Yanai, M
Karasaki, K Eguchi…. 2017. Springer … and Blockchain …. 0 cites.
    “TOWARDS ENHANCING SECURITY IN CLOUD STORAGE ENVIRONMENTS“. D
Wilson. 2016. jscholarship.library.jhu.edu . 0 cites.
    “Trifling and Gambling with Virtual Money“. JT Holden. 2017.
papers.ssrn.com . 0 cites.
    “Trumpeting in the New Era of a Lean Technology-Driven Financial
System“. V Rule. 0. financialintergroup.com. 0 cites.
    “Trust Management in Fog Computing“. TS Dybedokken. 2017.
brage.bibsys.no . 0 cites.
    “Turkish Riviera, the Turquoise Coast“. PR Newswire. 0.
turkishriviera.ulitzer.com. 0 cites.
    “Typologies in Canadian Securities Fraud: An Impact Assessment on
Investor Protection, Money Laundering and the Financing of Terrorism
(AML/CFT), and Risk …“. R Ranjan. 2015. papers.ssrn.com . 0 cites.
    “Understanding Digital Crime, Trust, and Control in Blockchain
Technologies“. JB Walton, G Dhillon. 2017. aisel.aisnet.org . 0 cites.
    “Unlocking Innovations and Competitive Advantage of State Bank of
India“. B Jha, A Gulati, S Goyal, S Vig. 2017.
strategiesinemergingmarkets.com . 0 cites.
    “Use of Bitcoin in Online Travel Product Shopping: The European
Perspective“. D Leung, A Dickinger. 2017. Springer … and Communication
Technologies in Tourism 2017. 0 cites.
    “Using Blockchain for Research Transparency“. K Opoku-Agyemang.
2017. osf.io . 0 cites.
    “Using blockchain for scientific transparency“. KA Opoku-Agyemang.
2017. papers.ssrn.com . 0 cites.
    “Using Markov Models and Statistics to Learn, Extract, Fuse, and
Detect Patterns in Raw Data“. RR Brooks, L Yu, Y Fu, G Cordone, J
Oakley…. 2017. arxiv.org arXiv preprint arXiv …. 0 cites.
    “Using the Blockchain to Secure Provenance Meta-Data (A CCoE
Webinar Presentation)“. RR Brooks, A Skjellum. 2017.
scholarworks.iu.edu . 0 cites.
    “Using Tor in cybersecurity investigations“. J Flanagan. 2015.
search.proquest.com . 0 cites.
    “Vers la sécurité mobile: caractérisation des attaques et
contremesures“. Y Le Traon, JY Marion, F Massacci, S Limet…. 0.
tel.archives-ouvertes.fr. 0 cites.
    “Vers la sécurité mobile: caractérisation des attaques et
contremesures“. JF Lalande. 2016.
hal-univ-orleans.archives-ouvertes.fr . 0 cites.
    “Video Integrity through Blockchain Technology“. A Hemlin
Billström, F Huss. 2017. diva-portal.org . 0 cites.
    “Welcome Message“. M Koscina, D Caragata, N Abdoun, S El Assady….
0. ieeexplore.ieee.org. 0 cites.
    “What Are They Really Up To? Activist Social Scientists Backpedal
on Conspiracy Theory Agenda, Kurtis Hagen“. L Basham. 0.
social-epistemology.com. 0 cites.
    “WHAT MAKES A CURRENCY?–THE BITCOIN PHENOMENON“. EE LEWIS. 0.
researchgate.net. 0 cites.
    “Why Fintech Could Lead to More Financial Crime“. C Harrington.
2017. CFA Institute CFA Institute Magazine. 0 cites.
    “Will Donald trump Hillary’s Climb to the Top of the Everest?“. A
Kulkarni. 2017. qrius.com Science. 0 cites.
    “Will Organizations Emerge as “Hybrid Intelligences” from the
Digital Transformation?“. W Leodolter. 2017. Springer … Transformation
Shaping the Subconscious Minds of …. 0 cites.
    “Words to go: Data center design standards bodies“. W Enterprises.
0. tngconsultores.com. 0 cites.
    “Zeng Chong, Huang Song, Yang Yongming“. X Yang, D Ogawa, N Dai,
TTG Hoang, X Wang, X Zhou…. 0. ieeexplore.ieee.org. 0 cites.
    “Zwischen Online-Streife und Online-(Raster-) Fahndung–Ein Beitrag
zur Verarbeitung öffentlich zugänglicher Daten im
Ermittlungsverfahren“. C Rückert. 2017. degruyter.com Zeitschrift für
die gesamte Strafrechtswissenschaft. 0 cites.
    “比特币与法定数字货币“. 秦波. 2017. jcr.cacrnet.org.cn 密码学报. 0 cites.


More information about the cypherpunks mailing list