Academic literature on the topic 'Cryptocurrency Wallets'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptocurrency Wallets.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cryptocurrency Wallets"

1

Jokić, Stevo, Aleksandar Cvetković, Saša Adamović, Nenad Ristić, and Petar Spalević. "Comparative analysis of cryptocurrency wallets vs traditional wallets." Ekonomika 65, no. 3 (2019): 65–75. http://dx.doi.org/10.5937/ekonomika1903065j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shaik, Cheman. "Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets." International Journal on Cryptography and Information Security 10, no. 4 (December 30, 2020): 11–20. http://dx.doi.org/10.5121/ijcis.2020.10402.

Full text
Abstract:
In this paper I have discussed a new method of enabling a cryptocurrency wallet user to define his own unforgettable seed phrase. An algorithm named SEEPT (Seed Phrase Transformation) is provided and illustrated with a real user defined seed phrase as input and a BIP39 standard seed phrase generated as output through cryptographic transformations. Discussed in detail is how an unforgettable seed phrase can be generatedfrom a set of names or words that are specific to a user’s personal life. Explained in detail as to how a wallet user can reconstruct his seed phrase on demand without depending on any storage, thereby relieving him from the burden of memorizing it frequently or storing it digitally on a computer hardware or physically on a paper or metal media.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Xitong, He Zhu, and Jiayu Zhou. "Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13985–86. http://dx.doi.org/10.1609/aaai.v34i10.7265.

Full text
Abstract:
With the proliferation of blockchain projects and applications, cryptocurrency exchanges, which provides exchange services among different types of cryptocurrencies, become pivotal platforms that allow customers to trade digital assets on different blockchains. Because of the anonymity and trustlessness nature of cryptocurrency, one major challenge of crypto-exchanges is asset safety, and all-time amount hacked from crypto-exchanges until 2018 is over $1.5 billion even with carefully maintained secure trading systems. The most critical vulnerability of crypto-exchanges is from the so-called hot wallet, which is used to store a certain portion of the total asset online of an exchange and programmatically sign transactions when a withdraw happens. It is important to develop network security mechanisms. However, the fact is that there is no guarantee that the system can defend all attacks. Thus, accurately controlling the available assets in the hot wallets becomes the key to minimize the risk of running an exchange. In this paper, we propose Shoreline, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks.
APA, Harvard, Vancouver, ISO, and other styles
4

He, Daojing, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, and Nadra Guizani. "Security Analysis of Cryptocurrency Wallets in Android-Based Applications." IEEE Network 34, no. 6 (November 2020): 114–19. http://dx.doi.org/10.1109/mnet.011.2000025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xitong, He Zhu, and Jiayu Zhou. "Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (April 3, 2020): 1194–201. http://dx.doi.org/10.1609/aaai.v34i01.5472.

Full text
Abstract:
With the proliferation of blockchain projects and applications, cryptocurrency exchanges, which provides exchange services among different types of cryptocurrencies, become pivotal platforms that allow customers to trade digital assets on different blockchains. Because of the anonymity and trustlessness nature of cryptocurrency, one major challenge of crypto-exchanges is asset safety, and all-time amount hacked from crypto-exchanges until 2018 is over $1.5 billion even with carefully maintained secure trading systems. The most critical vulnerability of crypto-exchanges is from the so-called hot wallet, which is used to store a certain portion of the total asset of an exchange and programmatically sign transactions when a withdraw happens. Whenever hackers managed to gain control over the computing infrastructure of the exchange, they usually immediately obtain all the assets in the hot wallet. It is important to develop network security mechanisms. However, the fact is that there is no guarantee that the system can defend all attacks. Thus, accurately controlling the available assets in the hot wallets becomes the key to minimize the risk of running an exchange. However, determining such optimal threshold remains a challenging task because of the complicated dynamics inside exchanges. In this paper, we propose Shoreline, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks. We conduct extensive empirical studies on the real trading data from a trading platform and demonstrate the effectiveness of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Tyler, Mathew Piscitelli, Ilya Shavrov, and Ibrahim Baggili. "Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework." Forensic Science International: Digital Investigation 33 (July 2020): 301002. http://dx.doi.org/10.1016/j.fsidi.2020.301002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fraij, Jihad, Ashraf Aldabbas, and Nemer Aburumman. "BLOCKCHAIN AS AN E-VOTING TOOL." International Journal of Advanced Research 8, no. 12 (December 31, 2020): 858–66. http://dx.doi.org/10.21474/ijar01/12225.

Full text
Abstract:
Blockchain as a distributed system that confirms security and reliability have started a new era of a solid and consensus system.Blockchains focus on cryptocurrency is encouraging many other processes to follow the same reliable approach of security.Almost all procedures and operations are now invited to be electronically performed in the digital Ethereum network that has been presented. Moreover, this study proposed the use of an Ethereum network on a blockchain platform in the study when it was moved to a blockchain network to confirm transparency.An E-voting system sample has been tested by using an Ethereum network smart contracts inwhich solidity language and wallets were used. In the voting test, the Ethereum blockchain will be able to collect records in which voters can use their Ethereum wallets or android devices to submit their votes in a consensus node.The researchers studied the voting system taking Jordan as a case study.This study recommended the adaptation of e-voting to support transparency and voters trust to reduce corruption and unreliability in the voting processes. Moreover, the use of this system will allow a voter to vote from home in the time of the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
8

Стойка, Маріана. "CRYPTOCURRENCY – DEFİNİTİON, FUNCTİONS, ADVANTAGES AND RİSKS." Підприємництво і торгівля, no. 30 (July 1, 2021): 5–10. http://dx.doi.org/10.36477/2522-1256-2021-30-01.

Full text
Abstract:
The emergence of “virtual currencies” is extremely recent, with a history of only 13 years. Being an ultra-new economic tool, it arouses interest and effervescent reactions, especially in terms of definition, but also about the cumulative effects it has begun to produce in the economic world. The subject also becomes controversial due to the fact that, being an economic instrument of absolute novelty, it is reflected in the legislation of very few countries in the world. One of the definitions determines as virtual currency – the digital representation of the value that is not issued or guaranteed by a central bank or a public authority, which is not necessarily linked to a legal currency and which does not have the legal status of the currency, but which can be accepted by natural or legal persons as a means of exchange and which may be transferred, stored and traded by electronic means. The evaluation of cryptocurrency publications has shown that most of them are related to attempts to establish legislative agricultural work for the operation of virtual currencies. The functions of the cryptocurrencies that we have defined are: the exchange and payment function, the hoarding function, the investment function and the attraction of funds necessary for the activity. Thus, we established that virtual currencies, as well as fiduciary ones, have the role of: means of payment, means of accumulation, means of capitalization and investments. Likewise, through this research we managed to highlight the main features and peculiarities of cryptocurrencies. Among the basic characteristics of cryptocurrencies we highlight: the high degree of security, maximum speed of transactions, full freedom from financial organizations, irreversibility of operations, full anonymity of transactions, open source, they can be ”mined”. Another approach was to determine the advantages and disadvantages and risks of using cryptocurrencies. The main advantages of using cryptocurrencies are related to its functions an caracteristics, such as: it represents a real alternative to classic banking services, market freedom, privacy of transactions, high speed of trnasactions, alternative payment methos, increasing the customer base etc. On the other hand there are some disatvantages. They are related mosly with the following risks: legal uncertainty, market volatility, low degree of acceptance, unsecured crypto wallets, risks related to use for illegal or criminal purposes, money laundering risks. Taking in consideration the global trend of the digitization of the society, the share and importance of fiat currencies will tend to decrease for the benefit of virtual currencies. Cryptocurrencies are becoming a real alternative to physical currencies, but its main disadvantage is that the public autorities are missing controlling it yet. Even so, in the nearest future the money could become digital figures.
APA, Harvard, Vancouver, ISO, and other styles
9

Pérez-Solà, C., S. Delgado-Segura, G. Navarro-Arribas, and J. Herrera-Joancomartí. "Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies." Royal Society Open Science 6, no. 1 (January 2019): 180817. http://dx.doi.org/10.1098/rsos.180817.

Full text
Abstract:
Unspent Transaction Outputs (UTXOs) are the internal mechanism used in many cryptocurrencies to represent coins. Such representation has some clear benefits, but also entails some complexities that, if not properly handled, may leave the system in an inefficient state. Specifically, inefficiencies arise when wallets (the software responsible for transferring coins between parties) do not manage UTXOs properly when performing payments. In this paper, we study three cryptocurrencies: Bitcoin, Bitcoin Cash and Litecoin, by analysing the state of their UTXO sets, that is, the status of their sets of spendable coins. These three cryptocurrencies are the top-3 UTXO-based cryptocurrencies by market capitalization. Our analysis shows that the usage of each cryptocurrency presents some differences, and led to different results. Furthermore, it also points out that the management of the transactions has not always been performed efficiently and therefore, the current state of the UTXO sets is far from ideal.
APA, Harvard, Vancouver, ISO, and other styles
10

Efimova, L. G. "The mechanism of credit transfers via the Blockchain." International Accounting 23, no. 5 (May 15, 2020): 567–84. http://dx.doi.org/10.24891/ia.23.5.567.

Full text
Abstract:
Subject. Money transfers via Blockchain-based banking and payment systems employ a procedure combining the traditional mechanism of gross settlements and P2P network, which is also run with the Blockchain. Therefore, the relationship between payment peers is mixed too. Objectives. The study aims to set up a legal mechanism of credit transfers which synergistically combines two payment procedures, i.e. traditional gross settlements via the national banking system and P2P payments based on the Blockchain. Methods. The study relies upon systemic-structural, dialectical, logic methods, induction, deduction, legal forecast, legal modeling and comparative method (legal comparison). Results. I examine how advantages of Blockchain-based payment systems and banking payment systems can be combined. This will streamline and smooth settlements, allowing to use the fiat currency in the beginning and at the end of credit transfers. The article highlights four phases of a mixed money transfer, i.e. the preliminary creation of a Blockchain-based node, accession to the protocol, opening of cryptocurrency accounts and e-wallets; the commencement of a money transfer under traditional rules of payment laws; interbanking settlements via the Blockchain and crediting of money under ordinary rules of the payment laws. Conclusions and Relevance. When credit transfers migrate from conventional bank accounts to the Blockchain, the fiat currency converts into the cryptocurrency and vice versa. I analyzed types of social relations emerging through the above phases and sources of legal regulations. The findings can be used in the theory of civil and banking laws, law making processes for the preparation of regulatory documents on cashless payments, and IT regulations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cryptocurrency Wallets"

1

Schmid, Philipp, and Sabine Houy. "Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44798.

Full text
Abstract:
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting in the growing adoption of so-called cryptocurrency wallet applications, as these simplify carrying out transactions. These wallets are available in a myriad of different forms and specifications. For example, there are hardware and software wallets. The latter can be divided into mobile, web, and desktop wallets. All of them offer attackers various ways to exploit vulnerabilities and steal money from victims. It is hard to keep track of this multitude of options and thus choose the right cryptocurrency wallet. For this reason, in this thesis, we collect the findings from previous literature to provide an overview of the various attack surfaces, possible countermeasures, and further research. Our systematic study has shown that there is still a considerable variety of attack vectors, which we have divided into six subcategories, (i) Memory and Storage, (ii) Operating Systems, (iii) Software Layer, (iv) Network Layer, (v) Blockchain Protocol, and (vi) Others. Some of the identified vulnerabilities have currently no solutions at all or hardly applicable countermeasures. However, some are easy to fix and simple to implement. One of the essential measures is to raise awareness of the identified weaknesses and the associated mitigations, if any, among the involved stakeholders, including users, developers, and exchanges.
APA, Harvard, Vancouver, ISO, and other styles
2

Lindqvist, Gunnar. "Nyckelhantering för bitcoin : En studie om hur användare hanterar privata nycklar och hur säkerheten kan förbättras." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18817.

Full text
Abstract:
Bitcoin har framträtt som den mest igenkännbara kryptovalutan sedan igångsättningen 2009 och har vid skrivande tillfälle ett börsvärde på 1,6 biljoner svenska kronor. Detta ihop med den ekonomiska friheten som Bitcoin erbjuder gör att användarantalet ständigt ökar. Likt all ny teknik så tar det tid innan teknologin är fullt utvecklad och anpassad för den bredda massan. I följd av detta kan säkerheten lida vilket kan resultera till ekonomiska förluster. Denna forskningsinsats undersöker vad för åtgärder och strategier som kan användas för att öka säkerheten via en litteraturstudie. Insatsen undersöker även med hjälp av en enkätundersökning ställd till ett Bitcoin-forum om hur användare av Bitcoin hanterar sina privata nycklar. Arbetet visar att det finns åtgärder som bidrar till ökad säkerhet såsom kryptering och multisignatur men att det hänger mycket på vad användarna själva väljer för typ av bäst strategi för deras användningsområde. Enkätundersökning redovisar att majoriteten av användarna gör säkerhetsmedvetna beslut för hur de använder Bitcoin men att en andel nyttjar mindre önskade tillvägagångssätt.
Bitcoin has emerged as the most recognizable cryptocurrency since its inception in 2009 and, at the time of writing has a market capitalization of 165 billion dollars. This together with the financial freedom that Bitcoin offers means that the number of users is constantly increasing. Like all new technology, it takes time for the technology to be fully developed and adapted to the wider mass. As a result, security can suffer which can result in financial losses. This research effort explores what measures and strategies can be used to increase safety through a literature study. The effort also investigates with the help of a survey conducted at a Bitcoin forum on how users of Bitcoin manage their private keys. The work shows that there are measures that contribute to increased security such as encryption and multi-signature but that much depends on what the users themselves choose for the type of best strategy for their area of use. The survey shows that the majority of users make security-conscious decisions about how to use Bitcoin but that aproportion uses less desirable approaches.
APA, Harvard, Vancouver, ISO, and other styles
3

Rasool, Muhammad Ahsan, and Shafiq Hafiz Muhammad. "Blockchain Technology : a new domain for Cyber Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.

Full text
Abstract:
Traditional database with no prior security measures is becoming challenging in the era of data technology. Database storage on a central location with single point of failure and vulnerable to cyber attacks is getting exposed to big risk of being hacked with the evolution of powerful machines and modern hacking techniques. Since its commencement, the BlockChain technology has shown a promising performance for application buildup in diversed fields of life from cryptocurrency to smart contracts and decentralized applications. Although multiple studies on privacy, data confidentiality and security issues of BlockChain are performed but a systematic examination is still needs attention. In this thesis work we conduct a systematic study about the vulnerabilities of BlockChain system and review the security enhancement solutions that may point to a good future direction for further research into the area of BlockChain technology and its applications. Smart contracts are self-executable objects hosted on the 2nd generation blockchain like Ethereum, carry billions of SEK worth of cryptocoins and cannot be updated once deployed. Smart contracts are generally considered secure objects but the systematic analysis of technology and source code exposes a new class of vulnerabilities which are more likely an ethical aspect of programming than the software coding errors. Besides the literature review we empower our results with a static code analysis especially with the perspective of cyber forensics.
APA, Harvard, Vancouver, ISO, and other styles
4

DRDÁK, František. "Rozbor a návrh aplikace pro digitální měnu Bitcoin." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-188109.

Full text
Abstract:
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cryptocurrency Wallets"

1

Markwood, Vivienne. Cryptocurrency Paper Wallet: Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Markwood, Vivienne. Cryptocurrency Keys Logbook: Paper Wallet Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Norman, Alan T. Mastering Bitcoin for Starters: Bitcoin and Cryptocurrency Technologies, Mining, Investing and Trading - Bitcoin Book 1, Blockchain, Wallet, Business. CreateSpace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cryptocurrency Wallets"

1

Kiktenko, E. O., M. A. Kudinov, and A. K. Fedorov. "Detecting Brute-Force Attacks on Cryptocurrency Wallets." In Business Information Systems Workshops, 232–42. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36691-9_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moniruzzaman, Md, Farida Chowdhury, and Md Sadek Ferdous. "Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets." In Cyber Security and Computer Science, 631–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52856-0_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chaum, David, Mario Larangeira, Mario Yaksetig, and William Carter. "$$\text{ W-OTS}^{+}$$ Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets." In Applied Cryptography and Network Security, 195–219. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78372-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faridi, Adeela, and Farheen Siddiqui. "Improving SPV-Based Cryptocurrency Wallet." In Cybernetics, Cognition and Machine Learning Applications, 127–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Antipova, Tatiana, and Irina Emelyanova. "Cryptocurrency in Digital Wallet: Pros and Cons." In Advances in Intelligent Systems and Computing, 313–22. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02351-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Leguesse, Yonas, Mark Vella, Christian Colombo, and Julio Hernandez-Castro. "Reducing the Forensic Footprint with Android Accessibility Attacks." In Security and Trust Management, 22–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_2.

Full text
Abstract:
Abstract Android accessibility features include a robust set of tools allowing developers to create apps for assisting people with disabilities. Unfortunately, this useful set of tools can also be abused and turned into an attack vector, providing malware with the ability to interact and read content from third-party apps. In this work, we are the first to study the impact that the stealthy exploitation of Android accessibility services can have on significantly reducing the forensic footprint of malware attacks, thus hindering both live and post-incident forensic investigations. We show that through Living off the Land (LotL) tactics, or by offering a malware-only substitute for attacks typically requiring more elaborate schemes, accessibility-based malware can be rendered virtually undetectable. In the LotL approach, we demonstrate accessibility-enabled SMS and command and control (C2) capabilities. As for the latter, we show a complete cryptocurrency wallet theft, whereby the accessibility trojan can hijack the entire withdrawal process of a widely used app, including two-factor authentication (2FA). In both cases, we demonstrate how the attacks result in significantly diminished forensic evidence when compared to similar attacks not employing accessibility tools, even to the extent of maintaining device take-over without requiring malware persistence.
APA, Harvard, Vancouver, ISO, and other styles
7

Al Shibli, Murad. "Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC)." In Encyclopedia of Criminal Activities and the Deep Web, 1089–111. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch075.

Full text
Abstract:
This article presents an integrated secured framework of blockchain and bitcoin cryptology with the artificial intelligence of neural networks and machine learning. Recently blockchain has received special attention and been used as a new platform for digital information and to store encrypted data and process secure digital transactions. Furthermore, data on blockchain and bitcoin platforms are assumed to be highly encrypted and secured. Although blockchain and bitcoin databases are encrypted using private keys, many cryptocurrency bitcoin wallets have been reported hacked, which has resulted in losing millions of dollars. The artificial intelligent neural networks (AINN) algorithms possess the capability features of processing and operating encrypted data and will lead to minimal risk as a part of the blockchain to protect personal data and information as third wall defense against hacking. Simulation results and analysis demonstrates the effectiveness of this technique for protecting personal data and financial information.
APA, Harvard, Vancouver, ISO, and other styles
8

Chowdhury, Niaz. "Cryptocurrency Wallet." In Inside Blockchain, Bitcoin, and Cryptocurrencies, 233–47. Auerbach Publications, 2019. http://dx.doi.org/10.1201/9780429325533-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cryptocurrency Wallets"

1

Rezaeighaleh, Hossein, and Cliff C. Zou. "New Secure Approach to Backup Cryptocurrency Wallets." In GLOBECOM 2019 - 2019 IEEE Global Communications Conference. IEEE, 2019. http://dx.doi.org/10.1109/globecom38437.2019.9014007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Cong, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, and Yao Cheng. "Android-based Cryptocurrency Wallets: Attacks and Countermeasures." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khadzhi, Andrey S., Sergey V. Zareshin, and Oleg V. Tarakanov. "A Method for Analyzing the Activity of Cold Wallets and Identifying Abandoned Cryptocurrency Wallets." In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2020. http://dx.doi.org/10.1109/eiconrus49466.2020.9039145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guri, Mordechai. "BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Urien, Pascal. "Crypto Terminal: A New Open Device For Securing Blockchain Wallets." In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hardjono, Thomas. "Future Directions for Regulated Private Wallets and VASP Trust Infrastructures." In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2021. http://dx.doi.org/10.1109/icbc51069.2021.9461141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Voskobojnikov, Artemij, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, and Konstantin (Kosta) Beznosov. "The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets." In CHI '21: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3411764.3445407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suratkar, Saurabh, Mahesh Shirole, and Sunil Bhirud. "Cryptocurrency Wallet: A Review." In 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE, 2020. http://dx.doi.org/10.1109/icccsp49186.2020.9315193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rezaeighaleh, Hossein, and Cliff C. Zou. "Multilayered Defense-in-Depth Architecture for Cryptocurrency Wallet." In 2020 IEEE 6th International Conference on Computer and Communications (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc51575.2020.9345013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

di Angelo, Monika, and Gernot Slazer. "Wallet Contracts on Ethereum." In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography