An inquiry into money laundering tools in the Bitcoin ecosystem

M Möser, R Böhme, D Breuker - 2013 APWG eCrime …, 2013 - ieeexplore.ieee.org
We provide a first systematic account of opportunities and limitations of anti-money
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …

Trained to accept? A field experiment on consent dialogs

R Böhme, S Köpsell - Proceedings of the SIGCHI conference on human …, 2010 - dl.acm.org
A typical consent dialog was shown in 2 x 2 x 3 experimental variations to 80,000 users of
an online privacy tool. We find that polite requests and button texts pointing to a voluntary …

A secure submission system for online whistleblowing platforms

V Roth, B Güldenring, E Rieffel, S Dietrich… - … Cryptography and Data …, 2013 - Springer
LNCS 7859 - A Secure Submission System for Online Whistleblowing Platforms Page 1 A
Secure Submission System for Online Whistleblowing Platforms Volker Roth1, Benjamin …

Cryptographic protocol analysis of an. on

B Westermann, R Wendolsky, L Pimenidis… - … Conference on Financial …, 2010 - Springer
This work presents a cryptographic analysis of AN. ON's anonymization protocols. We have
discovered three flaws of differing severity. The first is caused by the fact that the freshness …

Using linkability information to attack mix-based anonymity services

S Schiffner, S Clauß - International Symposium on Privacy Enhancing …, 2009 - Springer
There exist well established models for anonymity focusing on traffic analysis, ie, analysing
properties of single messages as, eg, timing. However there is only little work done that use …

[PDF][PDF] Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW

S Köpsell - 2010 - core.ac.uk
Da man im Internet nicht genau erkennen kann, wem man etwas schreibt, solltest du beim
Mailen oder Chatten nie deinen richtigen Namen, sondern immer einen Spitznamen …

Cybersecurity in the perspective of Internet traffic growth

HLM Kox - 2013 - mpra.ub.uni-muenchen.de
Private and public concern about digital security, cybercrime and data privacy is growing the
last few years. If Internet-related markets are flexible enough to cope with security concerns …

(More) Side Channels in Cloud Storage: Linking Data to Users

T Pulls - IFIP PrimeLife International Summer School on Privacy …, 2011 - Springer
Public cloud storage services are gaining in popularity and several commercial actors are
offering their services for users, however, not always with the security and privacy of their …

Secure logging of retained data for an anonymity service

S Köpsell, P Švenda - IFIP PrimeLife International Summer School on …, 2009 - Springer
The recently introduced legislation on data retention to aid prosecuting cyber-related crime
in Europe also affects the achievable security of systems for anonymous communication on …

Tracking the footprints of anonymous defamation in cyberspace: A review of the law and technology

R Placid, J Wynekoop - Journal of Information Privacy and Security, 2011 - Taylor & Francis
The rise of the Internet has made anonymous defamation a reality. Tracking the footprints of
anonymous defamation in cyberspace can be difficult from a legal and technological …