Privacy and cryptocurrencies—A systematic literature review

L Herskind, P Katsikouli, N Dragoni - IEEE Access, 2020 - ieeexplore.ieee.org
Our transaction history in the current centralized banking system has the ability to reveal a
lot of private information for each spender, both to the banking system itself, but also to those …

Monitoring data requests in decentralized data storage systems: A case study of IPFS

L Balduf, S Henningsen, M Florian… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
Decentralized data storage systems like the Interplanetary Filesystem (IPFS) are becoming
increasingly popular, eg, as a data layer in blockchain applications and for sharing content …

On the vital aspects and characteristics of cryptocurrency—A survey

AFMS Shah, MA Karabulut, AFMS Akhter… - Ieee …, 2023 - ieeexplore.ieee.org
Cryptocurrencies acquire user confidence by making the whole creation and transaction
history transparent to the public. In exchange, the transaction history accurately captures the …

Passively measuring ipfs churn and network size

E Daniel, F Tschorsch - 2022 IEEE 42nd International …, 2022 - ieeexplore.ieee.org
The InterPlanetary File System (IPFS) is a popular decentralized peer-to-peer network for
exchanging data. While there are many use cases for IPFS, the success of these use cases …

Counting down thunder: Timing attacks on privacy in payment channel networks

E Rohrer, F Tschorsch - Proceedings of the 2nd ACM Conference on …, 2020 - dl.acm.org
The Lightning Network is a scaling solution for Bitcoin that promises to enable rapid and
private payment processing. In Lightning, multi-hop payments are secured by utilizing …

On the peer degree distribution of the bitcoin p2p network

M Grundmann, M Baumstark… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A recent spam wave of IP addresses in the Bitcoin P2P network allowed us to estimate the
degree distribution of reachable peers. The resulting distribution indicates that about half of …

TopoShot: uncovering Ethereum's network topology leveraging replacement transactions

K Li, Y Tang, J Chen, Y Wang, X Liu - Proceedings of the 21st ACM …, 2021 - dl.acm.org
Ethereum relies on a peer-to-peer overlay network to propagate information. The knowledge
of Ethereum network topology holds the key to understanding Ethereum's security …

Graph analysis of blockchain p2p overlays and their security implications

A Paphitis, N Kourtellis, M Sirivianos - … on Security and Privacy in Social …, 2023 - Springer
In blockchain systems, similar to any distributed system, the underlying network plays a
crucial role and provides the infrastructure for communication and coordination among the …

Resilience of blockchain overlay networks

A Paphitis, N Kourtellis, M Sirivianos - International Conference on …, 2023 - Springer
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an
alternative to centralized services and promise robustness to coordinated attacks. However …

[PDF][PDF] State machine replication and consensus with Byzantine adversaries

M Davidson - 2023 - nvlpubs.nist.gov
The objective of state machine replication (SMR) is to emulate a centralized service in a
distributed, fault-tolerant fashion. To this end, a set of mutually distrusting processes must …