extra.bib (11626B)
1 @article{doi:10.1287/mnsc.2024.06830, 2 author = {Tinn, Katrin}, 3 title = {A Theory Model of Digital Currency with Asymmetric Privacy}, 4 journal = {Management Science}, 5 year = {2025}, 6 doi = {10.1287/mnsc.2024.06830}, 7 } 8 9 10 11 @Misc{castens2021, 12 author = {Catherine Austin Fitts}, 13 title = {The Threat of Financial Transaction Control}, 14 howpublished = {\url{https://solarireport.substack.com/p/the-threat-of-financial-transaction}}, 15 month = {February}, 16 year = {2024}, 17 } 18 19 @techreport{project-hamilton-boston-fed, 20 author = {{Jim Cunha, Robert Bench, James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula}}, 21 institution = {Federal Reserve Bank of Boston and Massachusetts Institute of Technology Digital Currency Initiative}, 22 title = {Project Hamilton Phase 1 A High Performance Payment Processing System Designed for Central Bank Digital Currencies}, 23 month = {Feb}, 24 year = {2022}, 25 note = {Available at \url{https://www.bostonfed.org/-/media/Documents/Project-Hamilton/Project-Hamilton-Phase-1-Whitepaper.pdf} [05.05.2022]} 26 } 27 28 @techreport{riskbank-e-krona-phase-2, 29 author = {Sveriges Riskbank}, 30 institution = {Sveriges Riskbank}, 31 title = {e-krona pilot Phase 2}, 32 note = {Available at \url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2022/e-krona-pilot-phase-2.pdf} [05.05.2022]}, 33 year = {2022}, 34 month = {Apr}, 35 } 36 37 @techreport{pboc-e-cny, 38 author = {People's Bank of China}, 39 institution = {People's Bank of China}, 40 month = {Jul}, 41 year = {2021}, 42 title = {Progress of Research \& Development of E-CNY in China}, 43 note = {Available at \url{http://www.pbc.gov.cn/en/3688110/3688172/4157443/4293696/2021071614584691871.pdf} [05.05.2022]}, 44 } 45 46 @misc{atlanticcouncil-e-cny, 47 author = {Kunar, Ananya}, 48 note = {Available at \url{https://www.atlanticcouncil.org/blogs/econographics/a-report-card-on-chinas-central-bank-digital-currency-the-e-cny/} [05.05.2022]}, 49 title = {A Report Card on China's Central Bank Digital Currency: the e-CNY}, 50 year = {2022}, 51 month = {Jan}, 52 } 53 54 @article{ruiz:hal-01334135, 55 TITLE = {{Reconstructable Software Appliances with Kameleon}}, 56 AUTHOR = {Ruiz, Cristian and Harrache, Salem and Mercier, Michael and Richard, Olivier}, 57 JOURNAL = {{Operating Systems Review}}, 58 PUBLISHER = {{Association for Computing Machinery}}, 59 VOLUME = {49}, 60 NUMBER = {1}, 61 PAGES = {80-89}, 62 YEAR = {2015}, 63 } 64 65 @misc{postgres-wiki-perf, 66 url={https://wiki.postgresql.org/wiki/Performance_Optimization}, 67 title={PostgreSQL Wiki}, 68 publisher={PostgreSQL}, 69 author={Postgres}, 70 note = {Avaliable at \url{https://wiki.postgresql.org/wiki/Performance_Optimization} [24.04.2022]}, 71 year={2020}, 72 month={Sep} 73 } 74 75 @incollection{grid5000, 76 title = {Adding Virtualization Capabilities to the {Grid'5000} Testbed}, 77 author = {Balouek, Daniel and Carpen Amarie, Alexandra and Charrier, Ghislain and Desprez, Fr{\'e}d{\'e}ric and Jeannot, Emmanuel and Jeanvoine, Emmanuel and L{\`e}bre, Adrien and Margery, David and Niclausse, Nicolas and Nussbaum, Lucas and Richard, Olivier and P{\'e}rez, Christian and Quesnel, Flavien and Rohr, Cyril and Sarzyniec, Luc}, 78 booktitle = {Cloud Computing and Services Science}, 79 publisher = {Springer International Publishing}, 80 pages = {3-20}, 81 volume = {367}, 82 year = {2013}, 83 } 84 85 86 @Misc{dirksen2018, 87 author = {Alexandra Dirksen}, 88 title = {A Blockchain Picture Book}, 89 howpublished = {\url{https://media.ccc.de/v/35c3-9573-a_blockchain_picture_book)}}, 90 month = {12}, 91 year = {2018}, 92 } 93 94 95 @incollection{crdt, 96 author = {Pregui{\c c}a, Nuno and Baquero, Carlos and Shapiro, Marc}, 97 title = {Conflict-Free Replicated Data Types ({CRDT}s)}, 98 booktitle = {Encyclopedia of Big Data Technologies}, 99 year = {2018}, 100 month = may, 101 publisher = {Springer}, 102 doi = {10.1007/978-3-319-63962-8_185-1}, 103 eprint = {1805.06358}, 104 keywords = {introduction} 105 } 106 107 108 @conference {rogaway2016, 109 author = {Phillip Rogaway}, 110 title = {The Moral Character of Cryptographic Work}, 111 year = {2016}, 112 address = {Austin, TX}, 113 publisher = {USENIX Association}, 114 month = aug 115 } 116 117 @article{stainton2023post, 118 title={Post Quantum Sphinx}, 119 author={Stainton, David Anthony}, 120 journal={Cryptology ePrint Archive}, 121 year={2023} 122 } 123 124 @inproceedings{danezis2009sphinx, 125 title={Sphinx: A compact and provably secure mix format}, 126 author={Danezis, George and Goldberg, Ian}, 127 booktitle={2009 30th IEEE Symposium on Security and Privacy}, 128 pages={269--282}, 129 year={2009}, 130 organization={IEEE} 131 } 132 133 @article{diaz2021nym, 134 title={The nym network}, 135 author={Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos}, 136 year={2021} 137 } 138 139 @Techreport{ sdsi, 140 title = "SDSI - A Simple Distributed Security Infrastructure", 141 author = "Ronald L. Rivest,Butler Lampson", 142 year = "1996", 143 month = "April", 144 day = "30", 145 url = "http://research.microsoft.com/pubs/68726/acrobat.pdf", 146 } 147 148 @Article{suerf2023huang, 149 author = {Priscilla Huang and Emmanuel Benoist and Christian Grothoff and Sebastian Javier Marchano}, 150 title = {Practical Offline Payments Using One-Time Passcodes}, 151 journal = {SUERF Policy Briefs}, 152 year = {2023}, 153 number = {622}, 154 month = {June}, 155 } 156 157 @InProceedings{depolymerization, 158 author = {Antoine d’Aligny and Emmanuel Benoist and Christian Grothoff}, 159 title = {Project Depolymerization: Tokenization of Blockchains}, 160 booktitle = {4th Conference on Blockchain Research and Applications for Innovative Networks and Services}, 161 year = {2022}, 162 month = {September}, 163 } 164 165 @inproceedings{evans2009practical, 166 title={A Practical Congestion Attack on Tor Using Long Paths.}, 167 author={Evans, Nathan S and Dingledine, Roger and Grothoff, Christian}, 168 booktitle={USENIX Security Symposium}, 169 pages={33--50}, 170 year={2009} 171 } 172 @inproceedings{jansen2014sniper, 173 title={The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.}, 174 author={Jansen, Rob and Tschorsch, Florian and Johnson, Aaron and Scheuermann, Bj{\"o}rn}, 175 booktitle={NDSS}, 176 year={2014} 177 } 178 @inproceedings{arp2015torben, 179 title={Torben: A practical side-channel attack for deanonymizing tor communication}, 180 author={Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad}, 181 booktitle={Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security}, 182 pages={597--602}, 183 year={2015} 184 } 185 @inproceedings{iacovazzi2019duster, 186 title={The $\{$DUSTER$\}$ attack: Tor onion service attribution based on flow watermarking with track hiding}, 187 author={Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval}, 188 booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)}, 189 pages={213--225}, 190 year={2019} 191 } 192 193 @article{ling2012new, 194 title={A new cell-counting-based attack against Tor}, 195 author={Ling, Zhen and Luo, Junzhou and Yu, Wei and Fu, Xinwen and Xuan, Dong and Jia, Weijia}, 196 journal={IEEE/ACM Transactions On Networking}, 197 volume={20}, 198 number={4}, 199 pages={1245--1261}, 200 year={2012}, 201 publisher={IEEE} 202 } 203 204 @InProceedings{acquisti2003, 205 author="Acquisti, Alessandro 206 and Dingledine, Roger 207 and Syverson, Paul", 208 editor="Wright, Rebecca N.", 209 title="On the Economics of Anonymity", 210 booktitle="Financial Cryptography", 211 year="2003", 212 publisher="Springer Berlin Heidelberg", 213 address="Berlin, Heidelberg", 214 pages="84--102", 215 abstract="Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios.", 216 isbn="978-3-540-45126-6" 217 } 218 219 220 @INPROCEEDINGS{sp2018anonymity, 221 author={Das, Debajyoti and Meiser, Sebastian and Mohammadi, Esfandiar and Kate, Aniket}, 222 booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, 223 title={Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two}, 224 year={2018}, 225 pages={108-126}, 226 doi={10.1109/SP.2018.00011}} 227 228 @InProceedings{ pitchblack, 229 author = {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff}, 230 title = {Routing in the Dark: Pitch Black}, 231 booktitle = {23rd Annual Computer Security Applications Conference (ACSAC 232 2007)}, 233 month = {December}, 234 location = {Miami Beach, Florida, USA}, 235 pages = {305--314}, 236 year = {2007}, 237 publisher = {IEEE Computer Society}, 238 } 239 240 @article{dijkstra1974selfstabilization, 241 author = {Dijkstra, Edsger W.}, 242 title = {Self-stabilizing systems in spite of distributed control}, 243 year = {1974}, 244 issue_date = {Nov. 1974}, 245 publisher = {Association for Computing Machinery}, 246 address = {New York, NY, USA}, 247 volume = {17}, 248 number = {11}, 249 issn = {0001-0782}, 250 url = {https://doi.org/10.1145/361179.361202}, 251 doi = {10.1145/361179.361202}, 252 abstract = {The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation “the system is in a legitimate state” invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily—and quite systematically—implemented if the different processes can be granted mutually exclusive access to a common store in which “the current system state” is recorded.}, 253 journal = {Commun. ACM}, 254 month = {nov}, 255 pages = {643–644}, 256 numpages = {2}, 257 keywords = {synchronization, sharing, self-stabilization, self-repair, robustness, networks, mutual exclusion, multiprocessing, harmonious cooperation, error recovery, distributed control} 258 } 259 260 261 262 263 264 @Misc{pipenet, 265 author = {Wei Dai}, 266 title = {PipeNet 1.1}, 267 howpublished = {\url{http://www.weidai.com/pipenet.txt}}, 268 } 269 270 @InProceedings{gns2014wachs, 271 author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, 272 title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System}, 273 booktitle = { 13th International Conference on Cryptology and Network Security (CANS 2014)}, 274 year = {2014}, 275 pages = {127--142}, 276 } 277 @article{eppstein, 278 author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George}, 279 title = {What's the Difference?: Efficient Set Reconciliation Without Prior Context}, 280 journal = {SIGCOMM Comput. Commun. Rev.}, 281 issue_date = {August 2011}, 282 volume = {41}, 283 number = {4}, 284 month = aug, 285 year = {2011}, 286 issn = {0146-4833}, 287 pages = {218--229}, 288 numpages = {12}, 289 acmid = {2018462}, 290 publisher = {ACM}, 291 address = {New York, NY, USA}, 292 keywords = {difference digest, invertible bloom filter, set difference}, 293 } 294 295 296 @misc{setu, 297 author = {Elias Summermatter and Christian Grothoff}, 298 title = {Byzantine Fault Tolerant Set Reconciliation}, 299 howpublished = {\url{https://datatracker.ietf.org/doc/html/draft-summermatter-set-union}}, 300 month = {1}, 301 year = {2021}, 302 }