aboutsummaryrefslogtreecommitdiff
path: root/contrib/articles/ui/taler.bib
blob: b576d38045460e943771065805374769cafbff02 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
@article{nakamoto2008bitcoin,
  title={Bitcoin: A peer-to-peer electronic cash system},
  author={Nakamoto, Satoshi},
  year={2008}
}

@InProceedings{apod,
  author =       {Elli Androulaki and Steven Bellovin},
  title =        {APOD: Anonymous Physical Object Delivery},
  booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)},
  year =      {2009},
}

@Article{blum1981,
  author = 	 {Manuel Blum},
  title = 	 {Coin Flipping by Telephone},
  journal = 	 {CRYPTO},
  year = 	 {1981},
  pages = 	 {11-15},
}


@Misc{target,
  author =    {Michael Riley and Ben Elgin and Dune Lawrence and Carol Matlack},
  title =     {Missed Alarms and 40 Million Stolen Credit Card Numbers: How {Target} Blew It},
  howpublished = {\url{http://www.bloomberg.com/bw/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data}},
  month =     {March},
  year =      {2013},
}

@Misc{greece2015cash,
  author =    {Reuters},
  title =     {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday},
  howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}},
  month =     {June},
  year =      {2015},
}

@Misc{france2015cash,
  author =    {Heinz-Peter Bader},
  title =     {France steps up monitoring of cash payments to fight low-cost terrorism},
  howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}},
  month =     {Mar},
  year =      {2015},
}


@Misc{fatf1997,
  title =     {FATF-IX report on money laundering typologies},
  howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}},
  month =     {feb},
  year =      {1998},
}

@TechReport{,
  author =       {},
  title =        {},
  institution =  {},
  year =         {},
  OPTkey =       {},
  OPTtype =      {},
  OPTnumber =    {},
  OPTaddress =   {},
  OPTmonth =     {},
  OPTnote =      {},
  OPTannote =    {}
}

@InProceedings{sander1999escrow,
  author =       {Tomas Sander and Amnon Ta-Shma},
  title =        {On Anonymous Electronic Cash and Crime},
  booktitle = {ISW'99},
  year =      {1999},
  series =    {LNCS 1729},
  pages =     {202--206},
}

@Article{solms1992perfect,
  author =       {Sebastiaan H. von Solms and David Naccache},
  title =        {On blind signatures and perfect crimes},
  journal = {Computers \& Security},
  year =      {1992},
  volume =    {11},
  number =    {6},
  pages =     {581--583},
}

@inproceedings{chaum1990untraceable,
  title={Untraceable electronic cash},
  author={Chaum, David and Fiat, Amos and Naor, Moni},
  booktitle={Proceedings on Advances in cryptology},
  pages={319--327},
  year={1990},
  organization={Springer-Verlag New York, Inc.}
}

@inproceedings{chaum1983blind,
  title={Blind signatures for untraceable payments},
  author={Chaum, David},
  booktitle={Advances in cryptology},
  pages={199--203},
  year={1983},
  organization={Springer}
}

@inproceedings{rivest2004peppercoin,
  title={Peppercoin micropayments},
  author={Rivest, Ronald L},
  booktitle={Financial Cryptography},
  pages={2--8},
  year={2004},
  organization={Springer}
}


@InProceedings{fc2014murdoch,
  author =       {Stephen Murdoch and Ross Anderson},
  title =        {Security Protocols and Evidence: Where Many Payment Systems Fail},
  booktitle = {Financial Cryptography and Data Security},
  year =      {2014},
}

@book{ engels1844,
  author = 	 "Friedrich Engels",
  title = 	 "{Umrisse zu einer Kritik der National\"okonomie}",
  year = 	 "1844",
  publisher = "Ruge and Marx, Paris",
}


@inproceedings{selby2004analyzing,
  title={Analyzing the Success and Failure of Recent e-Payment Schemes},
  author={Selby, Jack R},
  booktitle={Financial Cryptography},
  pages={1--1},
  year={2004},
  organization={Springer}
}

@misc{brands1993efficient,
  title={An efficient off-line electronic cash system based on the representation problem},
  author={Brands, Stefan A},
  year={1993},
  publisher={Centrum voor Wiskunde en Informatica}
}

@article{dent2008extensions,
  title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements},
  author={Dent, AW and Paterson, KG and Wild, PR},
  year={2008}
}

@article{dent2008preliminary,
  title={Preliminary Report on Chaum's Online E-Cash Architecture},
  author={Dent, AW and Paterson, KG and Wild, PR},
  journal={Royal Holloway, University of London},
  year={2008}
}



@inproceedings{tor-design,
  title = {Tor: The Second-Generation Onion Router},
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  booktitle = {Proceedings of the 13th USENIX Security Symposium},
  year = {2004},
  month = {August},
  www_important = {1},
  www_tags = {selected},
  www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html},
  www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
  www_section = {Anonymous communication},
}



@misc{brands1993efficient,
  title={An efficient off-line electronic cash system based on the representation problem},
  author={Brands, Stefan A},
  year={1993},
  publisher={Centrum voor Wiskunde en Informatica}
}


@misc{NYA:CyberExtortionRisk,
  title = {Cyber Extortion Risk Report 2015},
  author = {\relax NYA International},
  month = {October},
  year = {2015},
  howpublished = {\url{http://www.nyainternational.com/sites/default/files/nya-publications/151027_Cyber_Extortion_Risk_Report_2015_0.pdf}}
}

@misc{ECB:TRoCF2014,
  title     = {Third Report on Card Fraud},
  author = {{\relax European Central Bank}},
  month     = {February},
  year      = {2014},
  howpublished = {\url{https://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201402en.pdf}},
}



@inproceedings{3DSsucks,
 author = {Murdoch, Steven J. and Anderson, Ross},
 title = {Verified by Visa and Mastercard Securecode: Or, How Not to Design Authentication},
 booktitle = {Proceedings of the 14th International Conference on Financial Cryptography and Data Security},
 series = {FC'10},
 year = {2010},
 isbn = {3-642-14576-0, 978-3-642-14576-6},
 location = {Tenerife, Spain},
 pages = {336--342},
 numpages = {7},
 doi_url = {http://dx.doi.org/10.1007/978-3-642-14577-3_27},
 doi = {10.1007/978-3-642-14577-3_27},
 acmid = {2163598},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
 url = {https://www.cl.cam.ac.uk/~rja14/Papers/fc10vbvsecurecode.pdf}
}