• Corpus ID: 15644109

Cryptocurrencies and Bitcoin : Charting the Research Landscape Full Paper

@inproceedings{Morisse2015CryptocurrenciesAB,
  title={Cryptocurrencies and Bitcoin : Charting the Research Landscape Full Paper},
  author={Marcel Morisse},
  year={2015}
}
This systematic literature review examines cryptocurrencies (CCs) and Bitcoin. Because cryptocurrency research has not gained much attention from Information Systems (IS) researchers and needs a more vivid discussion, this review summarizes the main concepts of 42 papers and aligns them to IS Research. Although, cryptocurrency research has not reached IS mainstream yet, there is massive potential for multifaceted research ranging from protocol development to designing alternative digital… 
1 Citations

Tables from this paper

References

SHOWING 1-10 OF 82 REFERENCES

Issues and Risks Associated with Cryptocurrencies such as Bitcoin

This article analyses those features which transform such a cryptocurrency in a useful tool to perform any kind of transactions far from the control of any type of regulatory agency, as well as pinpoint some of the fields in which their usage can derive in new illicit behaviours.

An inquiry into money laundering tools in the Bitcoin ecosystem

A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.

Who Uses Bitcoin? An exploration of the Bitcoin community

  • J. BohrMasooda N. Bashir
  • Computer Science
    2014 Twelfth Annual International Conference on Privacy, Security and Trust
  • 2014
Results indicate that age, time of initial use, geographic location, mining status, engaging online discourse, and political orientation are all relevant factors that help explain various aspects of Bitcoin wealth, optimism, and attraction.

Zerocash: Decentralized Anonymous Payments from Bitcoin

This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.

Do libertarians dream of electric coins? The material embeddedness of Bitcoin

The new, decentralized, anonymous digital currency Bitcoin has in less than three years gone from a proof-of-concept to being traded for about €78 million on a daily basis. Its ascendancy offers up a

Bitcoin mining acceleration and performance quantification

  • Jega Anish Dev
  • Computer Science, Mathematics
    2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE)
  • 2014
Methods of performing Bitcoin mining on non-custom hardware which results in contextually faster mining by combined usage of computing elements within machines in mining networks, both illegal and legal are discussed.

Sybil-Resistant Mixing for Bitcoin

Xim is proposed, a two-party mixing protocol that is compatible with Bitcoin and related virtual currencies, and is the first decentralized protocol to simultaneously address Sybil attackers, denial-of-service attacks, and timing-based inference attacks.

Permacoin: Repurposing Bitcoin Work for Data Preservation

This work proposes a modification to Bit coin that repurposes its mining resources to achieve a more broadly useful goal: distributed storage of archival data and presents an alternative scratch-off puzzle for Bit coin based on Proofs-of-Retrievability (PORs).

Secure Multiparty Computations on Bitcoin

The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.

Deanonymisation of Clients in Bitcoin P2P Network

This work presents an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated and shows that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network.
...