Academic literature on the topic 'Cryptocurrency Wallets'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptocurrency Wallets.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptocurrency Wallets"
Jokić, Stevo, Aleksandar Cvetković, Saša Adamović, Nenad Ristić, and Petar Spalević. "Comparative analysis of cryptocurrency wallets vs traditional wallets." Ekonomika 65, no. 3 (2019): 65–75. http://dx.doi.org/10.5937/ekonomika1903065j.
Full textShaik, Cheman. "Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets." International Journal on Cryptography and Information Security 10, no. 4 (December 30, 2020): 11–20. http://dx.doi.org/10.5121/ijcis.2020.10402.
Full textZhang, Xitong, He Zhu, and Jiayu Zhou. "Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13985–86. http://dx.doi.org/10.1609/aaai.v34i10.7265.
Full textHe, Daojing, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, and Nadra Guizani. "Security Analysis of Cryptocurrency Wallets in Android-Based Applications." IEEE Network 34, no. 6 (November 2020): 114–19. http://dx.doi.org/10.1109/mnet.011.2000025.
Full textZhang, Xitong, He Zhu, and Jiayu Zhou. "Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (April 3, 2020): 1194–201. http://dx.doi.org/10.1609/aaai.v34i01.5472.
Full textThomas, Tyler, Mathew Piscitelli, Ilya Shavrov, and Ibrahim Baggili. "Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework." Forensic Science International: Digital Investigation 33 (July 2020): 301002. http://dx.doi.org/10.1016/j.fsidi.2020.301002.
Full textFraij, Jihad, Ashraf Aldabbas, and Nemer Aburumman. "BLOCKCHAIN AS AN E-VOTING TOOL." International Journal of Advanced Research 8, no. 12 (December 31, 2020): 858–66. http://dx.doi.org/10.21474/ijar01/12225.
Full textСтойка, Маріана. "CRYPTOCURRENCY – DEFİNİTİON, FUNCTİONS, ADVANTAGES AND RİSKS." Підприємництво і торгівля, no. 30 (July 1, 2021): 5–10. http://dx.doi.org/10.36477/2522-1256-2021-30-01.
Full textPérez-Solà, C., S. Delgado-Segura, G. Navarro-Arribas, and J. Herrera-Joancomartí. "Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies." Royal Society Open Science 6, no. 1 (January 2019): 180817. http://dx.doi.org/10.1098/rsos.180817.
Full textEfimova, L. G. "The mechanism of credit transfers via the Blockchain." International Accounting 23, no. 5 (May 15, 2020): 567–84. http://dx.doi.org/10.24891/ia.23.5.567.
Full textDissertations / Theses on the topic "Cryptocurrency Wallets"
Schmid, Philipp, and Sabine Houy. "Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44798.
Full textLindqvist, Gunnar. "Nyckelhantering för bitcoin : En studie om hur användare hanterar privata nycklar och hur säkerheten kan förbättras." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18817.
Full textBitcoin has emerged as the most recognizable cryptocurrency since its inception in 2009 and, at the time of writing has a market capitalization of 165 billion dollars. This together with the financial freedom that Bitcoin offers means that the number of users is constantly increasing. Like all new technology, it takes time for the technology to be fully developed and adapted to the wider mass. As a result, security can suffer which can result in financial losses. This research effort explores what measures and strategies can be used to increase safety through a literature study. The effort also investigates with the help of a survey conducted at a Bitcoin forum on how users of Bitcoin manage their private keys. The work shows that there are measures that contribute to increased security such as encryption and multi-signature but that much depends on what the users themselves choose for the type of best strategy for their area of use. The survey shows that the majority of users make security-conscious decisions about how to use Bitcoin but that aproportion uses less desirable approaches.
Rasool, Muhammad Ahsan, and Shafiq Hafiz Muhammad. "Blockchain Technology : a new domain for Cyber Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.
Full textDRDÁK, František. "Rozbor a návrh aplikace pro digitální měnu Bitcoin." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-188109.
Full textBooks on the topic "Cryptocurrency Wallets"
Markwood, Vivienne. Cryptocurrency Paper Wallet: Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.
Find full textMarkwood, Vivienne. Cryptocurrency Keys Logbook: Paper Wallet Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.
Find full textNorman, Alan T. Mastering Bitcoin for Starters: Bitcoin and Cryptocurrency Technologies, Mining, Investing and Trading - Bitcoin Book 1, Blockchain, Wallet, Business. CreateSpace Independent Publishing Platform, 2017.
Find full textBook chapters on the topic "Cryptocurrency Wallets"
Kiktenko, E. O., M. A. Kudinov, and A. K. Fedorov. "Detecting Brute-Force Attacks on Cryptocurrency Wallets." In Business Information Systems Workshops, 232–42. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36691-9_20.
Full textMoniruzzaman, Md, Farida Chowdhury, and Md Sadek Ferdous. "Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets." In Cyber Security and Computer Science, 631–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52856-0_50.
Full textChaum, David, Mario Larangeira, Mario Yaksetig, and William Carter. "$$\text{ W-OTS}^{+}$$ Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets." In Applied Cryptography and Network Security, 195–219. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78372-3_8.
Full textFaridi, Adeela, and Farheen Siddiqui. "Improving SPV-Based Cryptocurrency Wallet." In Cybernetics, Cognition and Machine Learning Applications, 127–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_14.
Full textAntipova, Tatiana, and Irina Emelyanova. "Cryptocurrency in Digital Wallet: Pros and Cons." In Advances in Intelligent Systems and Computing, 313–22. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02351-5_36.
Full textLeguesse, Yonas, Mark Vella, Christian Colombo, and Julio Hernandez-Castro. "Reducing the Forensic Footprint with Android Accessibility Attacks." In Security and Trust Management, 22–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_2.
Full textAl Shibli, Murad. "Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC)." In Encyclopedia of Criminal Activities and the Deep Web, 1089–111. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch075.
Full textChowdhury, Niaz. "Cryptocurrency Wallet." In Inside Blockchain, Bitcoin, and Cryptocurrencies, 233–47. Auerbach Publications, 2019. http://dx.doi.org/10.1201/9780429325533-14.
Full textConference papers on the topic "Cryptocurrency Wallets"
Rezaeighaleh, Hossein, and Cliff C. Zou. "New Secure Approach to Backup Cryptocurrency Wallets." In GLOBECOM 2019 - 2019 IEEE Global Communications Conference. IEEE, 2019. http://dx.doi.org/10.1109/globecom38437.2019.9014007.
Full textLi, Cong, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, and Yao Cheng. "Android-based Cryptocurrency Wallets: Attacks and Countermeasures." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00010.
Full textKhadzhi, Andrey S., Sergey V. Zareshin, and Oleg V. Tarakanov. "A Method for Analyzing the Activity of Cold Wallets and Identifying Abandoned Cryptocurrency Wallets." In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2020. http://dx.doi.org/10.1109/eiconrus49466.2020.9039145.
Full textGuri, Mordechai. "BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00227.
Full textUrien, Pascal. "Crypto Terminal: A New Open Device For Securing Blockchain Wallets." In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169410.
Full textHardjono, Thomas. "Future Directions for Regulated Private Wallets and VASP Trust Infrastructures." In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2021. http://dx.doi.org/10.1109/icbc51069.2021.9461141.
Full textVoskobojnikov, Artemij, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, and Konstantin (Kosta) Beznosov. "The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets." In CHI '21: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3411764.3445407.
Full textSuratkar, Saurabh, Mahesh Shirole, and Sunil Bhirud. "Cryptocurrency Wallet: A Review." In 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE, 2020. http://dx.doi.org/10.1109/icccsp49186.2020.9315193.
Full textRezaeighaleh, Hossein, and Cliff C. Zou. "Multilayered Defense-in-Depth Architecture for Cryptocurrency Wallet." In 2020 IEEE 6th International Conference on Computer and Communications (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc51575.2020.9345013.
Full textdi Angelo, Monika, and Gernot Slazer. "Wallet Contracts on Ethereum." In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169467.
Full text