• Corpus ID: 237385942

Crypto Currency Regulation and Law Enforcement Perspectives

@article{Courtois2021CryptoCR,
  title={Crypto Currency Regulation and Law Enforcement Perspectives},
  author={Nicolas T. Courtois and Kacper Gradon and Klaus Schmeh},
  journal={ArXiv},
  year={2021},
  volume={abs/2109.01047}
}
This paper provides an overview of how crypto currency and blockchain engineering interacts with the law enforcement. We point out that a large proportion of crypto users are amateur investors and the dominant and the largest segment in crypto crime are simply investment scams (!). We look at various questions of criminal use and misuse of technology, especially in the areas of money laundering or cashing out the profits originating from illicit activities. The aim of the paper is to raise a… 

Review on Digital Currency

  • Yinghua Zhong
  • Economics, Computer Science
    Proceedings of the 2022 7th International Conference on Financial Innovation and Economic Development (ICFIED 2022)
  • 2022
This article summarizes the concept, classification, characteristics and benefits, risks and potential problems of digital currency, and finally gives an overview of the development trend.

References

SHOWING 1-10 OF 45 REFERENCES

The use of crypto-currencies in funding violent jihad

The need for further in-depth research into reliable ways to circumvent the current difficulties experienced in differentiating illicit transactions from legitimate ones and establishing reliable means of attribution is highlighted.

Could Bitcoin transactions be 100x faster?

This paper looks at the question of fast transaction acceptance in bitcoin and other crypto currencies and claims that bitcoin needs to change in order to be able to satisfy the most basic needs of modern users.

On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies

This paper develops a theory of Programmed Self-Destruction of crypto currencies and exhibits examples of 'alt-coins' which validate the theory and for which the process of programmed decline and rapid self-destruction has clearly already started.

A Survey on Security and Privacy Issues of Bitcoin

This paper presents a systematic survey that covers the security and privacy aspects of Bitcoin, and reviews the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol.

Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures

This work indicates, using data from January and February of 2018 from the university, that a new kind of cyber attack aimed at illegally mining cryptocurrencies by stealing energy is real and presents a projection of the gains derived from these attacks.

Cryptocurrencies: The Next Generation of Terrorist Financing?

Virtual currencies — which are not legal tender in any country and are not issued or backed by any government — have become an important factor in global funds transfers. But features associated with

Electronic Currency: The Potential Risks to National Security and Methods to Minimize Them

The estimate is given to the development of risks and threats to national security, combating laundering of criminal money and terrorism financing, which are formed under the conditions of the growing interest in virtual currencies, including Bitcoin.

Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats

RAND researchers consider the needs of terrorist groups and the advantages and disadvantages of the cryptocurrency technologies available to them.

The Brave New World of Bodacious Assumptions in Cryptography

This work states that the security of a public-key system rests upon the assumed difficulty of a certain mathematical problem, and shows that the problems that are used in security proofs come from a small set of extensively studied, natural problems.

Bitcoin: A Peer-to-Peer Electronic Cash System

This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.