Author of the publication

The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs.

, , and . Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 41-56. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Cost of Cybercrime., , , , , , , and . The Economics of Information Security and Privacy, Springer, (2013)Dowsing: A Tool Framework for Domain-Oriented Browsing of Software Artifacts., , and . ASE, page 204-. IEEE Computer Society, (1998)An Empirical Analysis of the Current State of Phishing Attack and Defence., and . WEIS, (2007)Improving Onion Notation.. Privacy Enhancing Technologies, volume 2760 of Lecture Notes in Computer Science, page 81-87. Springer, (2003)Experience Using a Low-Cost FPGA Design to Crack DES Keys., and . CHES, volume 2523 of Lecture Notes in Computer Science, page 579-592. Springer, (2002)Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task.. CEAS, (2006)Source Ports in Abuse Reporting Format (ARF) Reports., and . RFC, (July 2012)Evaluating the Wisdom of Crowds in Assessing Phishing Websites., and . Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, page 16-30. Springer, (2008)On the Knowledge Required to Understand a Program., , and . WCRE, page 69-78. IEEE Computer Society, (1998)The Impact of Incentives on Notice and Take-down., and . WEIS, (2008)