marketing

Marketing materials (presentations, posters, flyers)
Log | Files | Refs

extra.bib (13003B)


      1 @ARTICLE{blockchaintrilemma,
      2   author={Nakai, Taishi and Sakurai, Akira and Hironaka, Shiori and Shudo, Kazuyuki},
      3   journal={IEEE Access},
      4   title={A Formulation of the Trilemma in Proof of Work Blockchain},
      5   year={2024},
      6   volume={12},
      7   pages={80559-80578},
      8   doi={10.1109/ACCESS.2024.3410025}
      9 }
     10 
     11 
     12 @techreport{project-hamilton-boston-fed,
     13   author          = {{Jim Cunha, Robert Bench, James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula}},
     14   institution     = {Federal Reserve Bank of Boston and Massachusetts Institute of Technology Digital Currency Initiative},
     15   title           = {Project Hamilton Phase 1 A High Performance Payment Processing System Designed for Central Bank Digital Currencies},
     16   month           = {Feb},
     17   year            = {2022},
     18   note = {Available at \url{https://www.bostonfed.org/-/media/Documents/Project-Hamilton/Project-Hamilton-Phase-1-Whitepaper.pdf} [05.05.2022]}
     19 }
     20 
     21 @techreport{riskbank-e-krona-phase-2,
     22   author      = {Sveriges Riskbank},
     23   institution = {Sveriges Riskbank},
     24   title       = {e-krona pilot Phase 2},
     25   note        = {Available at \url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2022/e-krona-pilot-phase-2.pdf} [05.05.2022]},
     26   year        = {2022},
     27   month       = {Apr},
     28 }
     29 
     30 @techreport{pboc-e-cny,
     31   author      = {People's Bank of China},
     32   institution = {People's Bank of China},
     33   month       = {Jul},
     34   year        = {2021},
     35   title       = {Progress of Research \& Development of E-CNY in China},
     36   note        = {Available at \url{http://www.pbc.gov.cn/en/3688110/3688172/4157443/4293696/2021071614584691871.pdf} [05.05.2022]},
     37 }
     38 
     39 @misc{atlanticcouncil-e-cny,
     40   author       = {Kunar, Ananya},
     41   note         = {Available at \url{https://www.atlanticcouncil.org/blogs/econographics/a-report-card-on-chinas-central-bank-digital-currency-the-e-cny/} [05.05.2022]},
     42   title        = {A Report Card on China's Central Bank Digital Currency: the e-CNY},
     43   year         = {2022},
     44   month        = {Jan},
     45 }
     46 
     47 @article{ruiz:hal-01334135,
     48   TITLE = {{Reconstructable Software Appliances with Kameleon}},
     49   AUTHOR = {Ruiz, Cristian and Harrache, Salem and Mercier, Michael and Richard, Olivier},
     50   JOURNAL = {{Operating Systems Review}},
     51   PUBLISHER = {{Association for Computing Machinery}},
     52   VOLUME = {49},
     53   NUMBER = {1},
     54   PAGES = {80-89},
     55   YEAR = {2015},
     56 }
     57 
     58 @misc{postgres-wiki-perf,
     59   url={https://wiki.postgresql.org/wiki/Performance_Optimization},
     60   title={PostgreSQL Wiki},
     61   publisher={PostgreSQL},
     62   author={Postgres},
     63   note = {Avaliable at \url{https://wiki.postgresql.org/wiki/Performance_Optimization} [24.04.2022]},
     64   year={2020},
     65   month={Sep}
     66 }
     67 
     68 @incollection{grid5000,
     69    title = {Adding Virtualization Capabilities to the {Grid'5000} Testbed},
     70    author = {Balouek, Daniel and Carpen Amarie, Alexandra and Charrier, Ghislain and Desprez, Fr{\'e}d{\'e}ric and Jeannot, Emmanuel and Jeanvoine, Emmanuel and L{\`e}bre, Adrien and Margery, David and Niclausse, Nicolas and Nussbaum, Lucas and Richard, Olivier and P{\'e}rez, Christian and Quesnel, Flavien and Rohr, Cyril and Sarzyniec, Luc},
     71    booktitle = {Cloud Computing and Services Science},
     72    publisher = {Springer International Publishing},
     73    pages = {3-20},
     74    volume = {367},
     75    year = {2013},
     76 }
     77 
     78 
     79 @Misc{dirksen2018,
     80   author =    {Alexandra Dirksen},
     81   title =     {A Blockchain Picture Book},
     82   howpublished = {\url{https://media.ccc.de/v/35c3-9573-a_blockchain_picture_book)}},
     83   month =     {12},
     84   year =      {2018},
     85 }
     86 
     87 
     88 @incollection{crdt,
     89   author = {Pregui{\c c}a, Nuno and Baquero, Carlos and Shapiro, Marc},
     90   title = {Conflict-Free Replicated Data Types ({CRDT}s)},
     91   booktitle = {Encyclopedia of Big Data Technologies},
     92   year = {2018},
     93   month = may,
     94   publisher = {Springer},
     95   doi = {10.1007/978-3-319-63962-8_185-1},
     96   eprint = {1805.06358},
     97   keywords = {introduction}
     98 }
     99 
    100 
    101 @conference {rogaway2016,
    102 author = {Phillip Rogaway},
    103 title = {The Moral Character of Cryptographic Work},
    104 year = {2016},
    105 address = {Austin, TX},
    106 publisher = {USENIX Association},
    107 month = aug
    108 }
    109 
    110 @article{stainton2023post,
    111   title={Post Quantum Sphinx},
    112   author={Stainton, David Anthony},
    113   journal={Cryptology ePrint Archive},
    114   year={2023}
    115 }
    116 
    117 @inproceedings{danezis2009sphinx,
    118   title={Sphinx: A compact and provably secure mix format},
    119   author={Danezis, George and Goldberg, Ian},
    120   booktitle={2009 30th IEEE Symposium on Security and Privacy},
    121   pages={269--282},
    122   year={2009},
    123   organization={IEEE}
    124 }
    125 
    126 @article{diaz2021nym,
    127   title={The nym network},
    128   author={Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos},
    129   year={2021}
    130 }
    131 
    132 @Techreport{ sdsi,
    133 	title = "SDSI - A Simple Distributed Security Infrastructure",
    134 	author = "Ronald L. Rivest,Butler Lampson",
    135 	year = "1996",
    136 	month = "April",
    137 	day = "30",
    138 	url = "http://research.microsoft.com/pubs/68726/acrobat.pdf",
    139 }
    140 
    141 @Article{suerf2023huang,
    142   author =       {Priscilla Huang and Emmanuel Benoist and Christian Grothoff and Sebastian Javier Marchano},
    143   title =        {Practical Offline Payments Using One-Time Passcodes},
    144   journal =      {SUERF Policy Briefs},
    145   year =         {2023},
    146   number =    {622},
    147   month =     {June},
    148 }
    149 
    150 @InProceedings{depolymerization,
    151   author =       {Antoine d’Aligny and Emmanuel Benoist and Christian Grothoff},
    152   title =        {Project Depolymerization: Tokenization of Blockchains},
    153   booktitle = {4th Conference on Blockchain Research and Applications for Innovative Networks and Services},
    154   year =      {2022},
    155   month =     {September},
    156 }
    157 
    158 @misc{schnorr:perfect-dl-signatures,
    159   author       = {Claus Peter Schnorr},
    160   title        = {Enhancing the Security of Perfect Blind DL-Signatures.},
    161   howpublished = {Universität Frankfurt},
    162   year         = {2004},
    163   note         = {\url{https://www.math.uni-frankfurt.de/~dmst/teaching/SS2012/Vorlesung/EBS5.pdf}}
    164 }
    165 
    166 @inproceedings{Schnorr01securityof,
    167   author    = {Claus Peter Schnorr},
    168   title     = {Security of Blind Discrete Log Signatures against Interactive Attacks},
    169   booktitle = {ICICS 2001, LNCS 2229},
    170   year      = {2001},
    171   pages     = {1--12},
    172   publisher = {Springer-Verlag}
    173 }
    174 @misc{cryptoeprint:2020:945,
    175   author       = {Fabrice Benhamouda and
    176                   Tancrède Lepoint and
    177                   Julian Loss and
    178                   Michele Orrù and
    179                   Mariana Raykova},
    180   title        = {On the (in)security of ROS},
    181   howpublished = {Cryptology ePrint Archive, Report 2020/945},
    182   year         = {2020},
    183   note         = {\url{https://ia.cr/2020/945}}
    184 }
    185 
    186 @MastersThesis{thesis_demarmels_heuzeveldt,
    187   author = 	 {Demarmels, Gian and Hezeveldt, Lucien},
    188   title = 	 {Adding Schnorr's Blind Signature in Taler},
    189   school = 	 {Bern University of Applied Sciences},
    190   year = 	 {2022},
    191 }
    192 
    193 @inproceedings{agrawal2022practical,
    194   title={Practical, round-optimal lattice-based blind signatures},
    195   author={Agrawal, Shweta and Kirshanova, Elena and Stehl{\'e}, Damien and Yadav, Anshu},
    196   booktitle={Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security},
    197   pages={39--53},
    198   year={2022}
    199 }
    200 
    201 @inproceedings{evans2009practical,
    202   title={A Practical Congestion Attack on Tor Using Long Paths.},
    203   author={Evans, Nathan S and Dingledine, Roger and Grothoff, Christian},
    204   booktitle={USENIX Security Symposium},
    205   pages={33--50},
    206   year={2009}
    207 }
    208 @inproceedings{jansen2014sniper,
    209   title={The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.},
    210   author={Jansen, Rob and Tschorsch, Florian and Johnson, Aaron and Scheuermann, Bj{\"o}rn},
    211   booktitle={NDSS},
    212   year={2014}
    213 }
    214 @inproceedings{arp2015torben,
    215   title={Torben: A practical side-channel attack for deanonymizing tor communication},
    216   author={Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad},
    217   booktitle={Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security},
    218   pages={597--602},
    219   year={2015}
    220 }
    221 @inproceedings{iacovazzi2019duster,
    222   title={The $\{$DUSTER$\}$ attack: Tor onion service attribution based on flow watermarking with track hiding},
    223   author={Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval},
    224   booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)},
    225   pages={213--225},
    226   year={2019}
    227 }
    228 
    229 @article{ling2012new,
    230   title={A new cell-counting-based attack against Tor},
    231   author={Ling, Zhen and Luo, Junzhou and Yu, Wei and Fu, Xinwen and Xuan, Dong and Jia, Weijia},
    232   journal={IEEE/ACM Transactions On Networking},
    233   volume={20},
    234   number={4},
    235   pages={1245--1261},
    236   year={2012},
    237   publisher={IEEE}
    238 }
    239 
    240 @InProceedings{acquisti2003,
    241 author="Acquisti, Alessandro
    242 and Dingledine, Roger
    243 and Syverson, Paul",
    244 editor="Wright, Rebecca N.",
    245 title="On the Economics of Anonymity",
    246 booktitle="Financial Cryptography",
    247 year="2003",
    248 publisher="Springer Berlin Heidelberg",
    249 address="Berlin, Heidelberg",
    250 pages="84--102",
    251 abstract="Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios.",
    252 isbn="978-3-540-45126-6"
    253 }
    254 
    255 
    256 @INPROCEEDINGS{sp2018anonymity,
    257   author={Das, Debajyoti and Meiser, Sebastian and Mohammadi, Esfandiar and Kate, Aniket},
    258   booktitle={2018 IEEE Symposium on Security and Privacy (SP)},
    259   title={Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two},
    260   year={2018},
    261   pages={108-126},
    262   doi={10.1109/SP.2018.00011}}
    263 
    264 @InProceedings{ pitchblack,
    265   author = 	 {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff},
    266   title = 	 {Routing in the Dark: Pitch Black},
    267   booktitle = 	 {23rd Annual Computer Security Applications Conference (ACSAC
    268                   2007)},
    269   month = {December},
    270   location = {Miami Beach, Florida, USA},
    271   pages = 	 {305--314},
    272   year = 	 {2007},
    273   publisher = {IEEE Computer Society},
    274 }
    275 
    276 @article{dijkstra1974selfstabilization,
    277 author = {Dijkstra, Edsger W.},
    278 title = {Self-stabilizing systems in spite of distributed control},
    279 year = {1974},
    280 issue_date = {Nov. 1974},
    281 publisher = {Association for Computing Machinery},
    282 address = {New York, NY, USA},
    283 volume = {17},
    284 number = {11},
    285 issn = {0001-0782},
    286 url = {https://doi.org/10.1145/361179.361202},
    287 doi = {10.1145/361179.361202},
    288 abstract = {The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation “the system is in a legitimate state” invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily—and quite systematically—implemented if the different processes can be granted mutually exclusive access to a common store in which “the current system state” is recorded.},
    289 journal = {Commun. ACM},
    290 month = {nov},
    291 pages = {643–644},
    292 numpages = {2},
    293 keywords = {synchronization, sharing, self-stabilization, self-repair, robustness, networks, mutual exclusion, multiprocessing, harmonious cooperation, error recovery, distributed control}
    294 }
    295 
    296 
    297 
    298 
    299 
    300 @Misc{pipenet,
    301   author =    {Wei Dai},
    302   title =     {PipeNet 1.1},
    303   howpublished = {\url{http://www.weidai.com/pipenet.txt}},
    304 }
    305 
    306 @InProceedings{gns2014wachs,
    307   author =       {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
    308   title =        {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System},
    309   booktitle = { 13th International Conference on Cryptology and Network Security (CANS 2014)},
    310   year =      {2014},
    311   pages = {127--142},
    312 }
    313 @article{eppstein,
    314  author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George},
    315  title = {What's the Difference?: Efficient Set Reconciliation Without Prior Context},
    316  journal = {SIGCOMM Comput. Commun. Rev.},
    317  issue_date = {August 2011},
    318  volume = {41},
    319  number = {4},
    320  month = aug,
    321  year = {2011},
    322  issn = {0146-4833},
    323  pages = {218--229},
    324  numpages = {12},
    325  acmid = {2018462},
    326  publisher = {ACM},
    327  address = {New York, NY, USA},
    328  keywords = {difference digest, invertible bloom filter, set difference},
    329 }
    330 
    331 
    332 @misc{setu,
    333   author =       {Elias Summermatter and Christian Grothoff},
    334   title =        {Byzantine Fault Tolerant Set Reconciliation},
    335   howpublished =         {\url{https://datatracker.ietf.org/doc/html/draft-summermatter-set-union}},
    336   month =     {1},
    337   year =      {2021},
    338 }