marketing

Marketing materials (presentations, posters, flyers)
Log | Files | Refs

extra.bib (11626B)


      1 @article{doi:10.1287/mnsc.2024.06830,
      2 author = {Tinn, Katrin},
      3 title = {A Theory Model of Digital Currency with Asymmetric Privacy},
      4 journal = {Management Science},
      5 year = {2025},
      6 doi = {10.1287/mnsc.2024.06830},
      7 }
      8 
      9 
     10 
     11 @Misc{castens2021,
     12   author =    {Catherine Austin Fitts},
     13   title =     {The Threat of Financial Transaction Control},
     14   howpublished = {\url{https://solarireport.substack.com/p/the-threat-of-financial-transaction}},
     15   month =     {February},
     16   year =      {2024},
     17 }
     18 
     19 @techreport{project-hamilton-boston-fed,
     20   author          = {{Jim Cunha, Robert Bench, James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula}},
     21   institution     = {Federal Reserve Bank of Boston and Massachusetts Institute of Technology Digital Currency Initiative},
     22   title           = {Project Hamilton Phase 1 A High Performance Payment Processing System Designed for Central Bank Digital Currencies},
     23   month           = {Feb},
     24   year            = {2022},
     25   note = {Available at \url{https://www.bostonfed.org/-/media/Documents/Project-Hamilton/Project-Hamilton-Phase-1-Whitepaper.pdf} [05.05.2022]}
     26 }
     27 
     28 @techreport{riskbank-e-krona-phase-2,
     29   author      = {Sveriges Riskbank},
     30   institution = {Sveriges Riskbank},
     31   title       = {e-krona pilot Phase 2},
     32   note        = {Available at \url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2022/e-krona-pilot-phase-2.pdf} [05.05.2022]},
     33   year        = {2022},
     34   month       = {Apr},
     35 }
     36 
     37 @techreport{pboc-e-cny,
     38   author      = {People's Bank of China},
     39   institution = {People's Bank of China},
     40   month       = {Jul},
     41   year        = {2021},
     42   title       = {Progress of Research \& Development of E-CNY in China},
     43   note        = {Available at \url{http://www.pbc.gov.cn/en/3688110/3688172/4157443/4293696/2021071614584691871.pdf} [05.05.2022]},
     44 }
     45 
     46 @misc{atlanticcouncil-e-cny,
     47   author       = {Kunar, Ananya},
     48   note         = {Available at \url{https://www.atlanticcouncil.org/blogs/econographics/a-report-card-on-chinas-central-bank-digital-currency-the-e-cny/} [05.05.2022]},
     49   title        = {A Report Card on China's Central Bank Digital Currency: the e-CNY},
     50   year         = {2022},
     51   month        = {Jan},
     52 }
     53 
     54 @article{ruiz:hal-01334135,
     55   TITLE = {{Reconstructable Software Appliances with Kameleon}},
     56   AUTHOR = {Ruiz, Cristian and Harrache, Salem and Mercier, Michael and Richard, Olivier},
     57   JOURNAL = {{Operating Systems Review}},
     58   PUBLISHER = {{Association for Computing Machinery}},
     59   VOLUME = {49},
     60   NUMBER = {1},
     61   PAGES = {80-89},
     62   YEAR = {2015},
     63 }
     64 
     65 @misc{postgres-wiki-perf,
     66   url={https://wiki.postgresql.org/wiki/Performance_Optimization},
     67   title={PostgreSQL Wiki},
     68   publisher={PostgreSQL},
     69   author={Postgres},
     70   note = {Avaliable at \url{https://wiki.postgresql.org/wiki/Performance_Optimization} [24.04.2022]},
     71   year={2020},
     72   month={Sep}
     73 }
     74 
     75 @incollection{grid5000,
     76    title = {Adding Virtualization Capabilities to the {Grid'5000} Testbed},
     77    author = {Balouek, Daniel and Carpen Amarie, Alexandra and Charrier, Ghislain and Desprez, Fr{\'e}d{\'e}ric and Jeannot, Emmanuel and Jeanvoine, Emmanuel and L{\`e}bre, Adrien and Margery, David and Niclausse, Nicolas and Nussbaum, Lucas and Richard, Olivier and P{\'e}rez, Christian and Quesnel, Flavien and Rohr, Cyril and Sarzyniec, Luc},
     78    booktitle = {Cloud Computing and Services Science},
     79    publisher = {Springer International Publishing},
     80    pages = {3-20},
     81    volume = {367},
     82    year = {2013},
     83 }
     84 
     85 
     86 @Misc{dirksen2018,
     87   author =    {Alexandra Dirksen},
     88   title =     {A Blockchain Picture Book},
     89   howpublished = {\url{https://media.ccc.de/v/35c3-9573-a_blockchain_picture_book)}},
     90   month =     {12},
     91   year =      {2018},
     92 }
     93 
     94 
     95 @incollection{crdt,
     96   author = {Pregui{\c c}a, Nuno and Baquero, Carlos and Shapiro, Marc},
     97   title = {Conflict-Free Replicated Data Types ({CRDT}s)},
     98   booktitle = {Encyclopedia of Big Data Technologies},
     99   year = {2018},
    100   month = may,
    101   publisher = {Springer},
    102   doi = {10.1007/978-3-319-63962-8_185-1},
    103   eprint = {1805.06358},
    104   keywords = {introduction}
    105 }
    106 
    107 
    108 @conference {rogaway2016,
    109 author = {Phillip Rogaway},
    110 title = {The Moral Character of Cryptographic Work},
    111 year = {2016},
    112 address = {Austin, TX},
    113 publisher = {USENIX Association},
    114 month = aug
    115 }
    116 
    117 @article{stainton2023post,
    118   title={Post Quantum Sphinx},
    119   author={Stainton, David Anthony},
    120   journal={Cryptology ePrint Archive},
    121   year={2023}
    122 }
    123 
    124 @inproceedings{danezis2009sphinx,
    125   title={Sphinx: A compact and provably secure mix format},
    126   author={Danezis, George and Goldberg, Ian},
    127   booktitle={2009 30th IEEE Symposium on Security and Privacy},
    128   pages={269--282},
    129   year={2009},
    130   organization={IEEE}
    131 }
    132 
    133 @article{diaz2021nym,
    134   title={The nym network},
    135   author={Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos},
    136   year={2021}
    137 }
    138 
    139 @Techreport{ sdsi,
    140 	title = "SDSI - A Simple Distributed Security Infrastructure",
    141 	author = "Ronald L. Rivest,Butler Lampson",
    142 	year = "1996",
    143 	month = "April",
    144 	day = "30",
    145 	url = "http://research.microsoft.com/pubs/68726/acrobat.pdf",
    146 }
    147 
    148 @Article{suerf2023huang,
    149   author =       {Priscilla Huang and Emmanuel Benoist and Christian Grothoff and Sebastian Javier Marchano},
    150   title =        {Practical Offline Payments Using One-Time Passcodes},
    151   journal =      {SUERF Policy Briefs},
    152   year =         {2023},
    153   number =    {622},
    154   month =     {June},
    155 }
    156 
    157 @InProceedings{depolymerization,
    158   author =       {Antoine d’Aligny and Emmanuel Benoist and Christian Grothoff},
    159   title =        {Project Depolymerization: Tokenization of Blockchains},
    160   booktitle = {4th Conference on Blockchain Research and Applications for Innovative Networks and Services},
    161   year =      {2022},
    162   month =     {September},
    163 }
    164 
    165 @inproceedings{evans2009practical,
    166   title={A Practical Congestion Attack on Tor Using Long Paths.},
    167   author={Evans, Nathan S and Dingledine, Roger and Grothoff, Christian},
    168   booktitle={USENIX Security Symposium},
    169   pages={33--50},
    170   year={2009}
    171 }
    172 @inproceedings{jansen2014sniper,
    173   title={The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.},
    174   author={Jansen, Rob and Tschorsch, Florian and Johnson, Aaron and Scheuermann, Bj{\"o}rn},
    175   booktitle={NDSS},
    176   year={2014}
    177 }
    178 @inproceedings{arp2015torben,
    179   title={Torben: A practical side-channel attack for deanonymizing tor communication},
    180   author={Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad},
    181   booktitle={Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security},
    182   pages={597--602},
    183   year={2015}
    184 }
    185 @inproceedings{iacovazzi2019duster,
    186   title={The $\{$DUSTER$\}$ attack: Tor onion service attribution based on flow watermarking with track hiding},
    187   author={Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval},
    188   booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)},
    189   pages={213--225},
    190   year={2019}
    191 }
    192 
    193 @article{ling2012new,
    194   title={A new cell-counting-based attack against Tor},
    195   author={Ling, Zhen and Luo, Junzhou and Yu, Wei and Fu, Xinwen and Xuan, Dong and Jia, Weijia},
    196   journal={IEEE/ACM Transactions On Networking},
    197   volume={20},
    198   number={4},
    199   pages={1245--1261},
    200   year={2012},
    201   publisher={IEEE}
    202 }
    203 
    204 @InProceedings{acquisti2003,
    205 author="Acquisti, Alessandro
    206 and Dingledine, Roger
    207 and Syverson, Paul",
    208 editor="Wright, Rebecca N.",
    209 title="On the Economics of Anonymity",
    210 booktitle="Financial Cryptography",
    211 year="2003",
    212 publisher="Springer Berlin Heidelberg",
    213 address="Berlin, Heidelberg",
    214 pages="84--102",
    215 abstract="Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios.",
    216 isbn="978-3-540-45126-6"
    217 }
    218 
    219 
    220 @INPROCEEDINGS{sp2018anonymity,
    221   author={Das, Debajyoti and Meiser, Sebastian and Mohammadi, Esfandiar and Kate, Aniket},
    222   booktitle={2018 IEEE Symposium on Security and Privacy (SP)},
    223   title={Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two},
    224   year={2018},
    225   pages={108-126},
    226   doi={10.1109/SP.2018.00011}}
    227 
    228 @InProceedings{ pitchblack,
    229   author = 	 {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff},
    230   title = 	 {Routing in the Dark: Pitch Black},
    231   booktitle = 	 {23rd Annual Computer Security Applications Conference (ACSAC
    232                   2007)},
    233   month = {December},
    234   location = {Miami Beach, Florida, USA},
    235   pages = 	 {305--314},
    236   year = 	 {2007},
    237   publisher = {IEEE Computer Society},
    238 }
    239 
    240 @article{dijkstra1974selfstabilization,
    241 author = {Dijkstra, Edsger W.},
    242 title = {Self-stabilizing systems in spite of distributed control},
    243 year = {1974},
    244 issue_date = {Nov. 1974},
    245 publisher = {Association for Computing Machinery},
    246 address = {New York, NY, USA},
    247 volume = {17},
    248 number = {11},
    249 issn = {0001-0782},
    250 url = {https://doi.org/10.1145/361179.361202},
    251 doi = {10.1145/361179.361202},
    252 abstract = {The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation “the system is in a legitimate state” invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily—and quite systematically—implemented if the different processes can be granted mutually exclusive access to a common store in which “the current system state” is recorded.},
    253 journal = {Commun. ACM},
    254 month = {nov},
    255 pages = {643–644},
    256 numpages = {2},
    257 keywords = {synchronization, sharing, self-stabilization, self-repair, robustness, networks, mutual exclusion, multiprocessing, harmonious cooperation, error recovery, distributed control}
    258 }
    259 
    260 
    261 
    262 
    263 
    264 @Misc{pipenet,
    265   author =    {Wei Dai},
    266   title =     {PipeNet 1.1},
    267   howpublished = {\url{http://www.weidai.com/pipenet.txt}},
    268 }
    269 
    270 @InProceedings{gns2014wachs,
    271   author =       {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
    272   title =        {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System},
    273   booktitle = { 13th International Conference on Cryptology and Network Security (CANS 2014)},
    274   year =      {2014},
    275   pages = {127--142},
    276 }
    277 @article{eppstein,
    278  author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George},
    279  title = {What's the Difference?: Efficient Set Reconciliation Without Prior Context},
    280  journal = {SIGCOMM Comput. Commun. Rev.},
    281  issue_date = {August 2011},
    282  volume = {41},
    283  number = {4},
    284  month = aug,
    285  year = {2011},
    286  issn = {0146-4833},
    287  pages = {218--229},
    288  numpages = {12},
    289  acmid = {2018462},
    290  publisher = {ACM},
    291  address = {New York, NY, USA},
    292  keywords = {difference digest, invertible bloom filter, set difference},
    293 }
    294 
    295 
    296 @misc{setu,
    297   author =       {Elias Summermatter and Christian Grothoff},
    298   title =        {Byzantine Fault Tolerant Set Reconciliation},
    299   howpublished =         {\url{https://datatracker.ietf.org/doc/html/draft-summermatter-set-union}},
    300   month =     {1},
    301   year =      {2021},
    302 }