Author of the publication

The Graph Structure of Bitcoin.

, , and . COMPLEX NETWORKS (2), volume 813 of Studies in Computational Intelligence, page 547-558. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Based Access Control., , and . DAIS, volume 10320 of Lecture Notes in Computer Science, page 206-220. Springer, (2017)A blockchain based approach for the definition of auditable Access Control systems., , and . Computers & Security, (2019)Data-driven analysis of Bitcoin properties: exploiting the users graph., , and . Int. J. Data Sci. Anal., 6 (1): 63-80 (2018)Detecting artificial behaviours in the Bitcoin users graph., , and . Online Social Networks and Media, (2017)The bow tie structure of the Bitcoin users graph., , and . Applied Network Science, 4 (1): 56:1-56:22 (2019)The Graph Structure of Bitcoin., , and . COMPLEX NETWORKS (2), volume 813 of Studies in Computational Intelligence, page 547-558. Springer, (2018)Distributed Access Control Through Blockchain Technology., , and . ERCIM News, (2017)Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph., , and . DSAA, page 537-546. IEEE, (2016)Blockchain Based Access Control Services., , and . iThings/GreenCom/CPSCom/SmartData, page 1379-1386. IEEE, (2018)An analysis of the Bitcoin users graph: inferring unusual behaviours., , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 749-760. Springer, (2016)