Author:
Rosenquist Hampus,Hasselquist David,Arlitt Martin,Carlsson Niklas
Publisher
Springer Nature Switzerland
Reference42 articles.
1. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Proceedings of Financial Cryptography and Data Security (FC) (2013)
2. Australian Cyber Security Centre: Sextortion email campaign impacting Australians (2020). https://www.cyber.gov.au/about-us/alerts/sextortion-email-campaign-impacting-australians. Accessed 17 May 2023
3. Biryukov, A., Pustogarov, I.: Bitcoin over tor isn’t a good idea. In: Proceedings of IEEE Symposium on Security and Privacy (S &P) (2015)
4. BitcoinAbuse: Bitcoin Abuse Database (2023). https://www.bitcoinabuse.com. Accessed 08 May 2023
5. Blockchain: Blockchain Developer APIs (2023). https://www.blockchain.com/explorer/api. Accessed 25 May 2023