Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

An empirical analysis of traceability in the monero blockchain

M Möser, K Soska, E Heilman, K Lee, H Heffan… - arXiv preprint arXiv …, 2017 - arxiv.org
Monero is a privacy-centric cryptocurrency that allows users to obscure their transactions by
including chaff coins, called" mixins," along with the actual coins they spend. In this paper …

Evaluating user privacy in bitcoin

E Androulaki, GO Karame, M Roeschlin… - … Cryptography and Data …, 2013 - Springer
Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its
reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all …

Mixcoin: Anonymity for bitcoin with accountable mixes

J Bonneau, A Narayanan, A Miller, J Clark… - … Cryptography and Data …, 2014 - Springer
We propose Mixcoin, a protocol to facilitate anonymous payments in Bitcoin and similar
cryptocurrencies. We build on the emergent phenomenon of currency mixes, adding an …

EVchain: An anonymous blockchain-based system for charging-connected electric vehicles

S Xu, X Chen, Y He - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
Purchases of electric vehicles have been increasing in recent years. These vehicles differ
from traditional fossil-fuel-based vehicles especially in the time consumed to keep them …

An inquiry into money laundering tools in the Bitcoin ecosystem

M Möser, R Böhme, D Breuker - 2013 APWG eCrime …, 2013 - ieeexplore.ieee.org
We provide a first systematic account of opportunities and limitations of anti-money
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …

Robust de-anonymization of large sparse datasets

A Narayanan, V Shmatikov - … on Security and Privacy (sp 2008), 2008 - ieeexplore.ieee.org
We present a new class of statistical de-anonymization attacks against high-dimensional
micro-data, such as individual preferences, recommendations, transaction records and so …

The loopix anonymity system

AM Piotrowska, J Hayes, T Elahi, S Meiser… - 26th usenix security …, 2017 - usenix.org
We present Loopix, a low-latency anonymous communication system that provides bi-
directional 'third-party'sender and receiver anonymity and unobservability. Loopix leverages …

Users get routed: Traffic correlation on Tor by realistic adversaries

A Johnson, C Wacek, R Jansen, M Sherr… - Proceedings of the 2013 …, 2013 - dl.acm.org
We present the first analysis of the popular Tor anonymity network that indicates the security
of typical users against reasonably realistic adversaries in the Tor network or in the …