2017 APWG Symposium on Electronic Crime Research (eCrime) 2017
DOI: 10.1109/ecrime.2017.7945049
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain explorer: An analytical process and investigation environment for bitcoin

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
2

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(24 citation statements)
references
References 4 publications
0
20
0
2
Order By: Relevance
“…Initially, it was used in bitcoin proposed by Nakamoto (2008) as a data structure, becoming a technological solution that provides security in distributed systems (Jin et al, 2017). According to Kuzuno and Karam (2017), blockchain is an electronic records book that keeps a public record of all transactions processed in full transparency without revealing the identity of the transmitter and receiver. In this way, systems that use Blockchain are extremely secure, and can become what is needed to provide adequate security for the IoTs, and to protect user data in that environment.…”
Section: Security and Privacymentioning
confidence: 99%
“…Initially, it was used in bitcoin proposed by Nakamoto (2008) as a data structure, becoming a technological solution that provides security in distributed systems (Jin et al, 2017). According to Kuzuno and Karam (2017), blockchain is an electronic records book that keeps a public record of all transactions processed in full transparency without revealing the identity of the transmitter and receiver. In this way, systems that use Blockchain are extremely secure, and can become what is needed to provide adequate security for the IoTs, and to protect user data in that environment.…”
Section: Security and Privacymentioning
confidence: 99%
“…Investigations of cybercrime, in general, and of ransomware in particular, are increasingly relying on blockchain analytic tools since many attacks typically use cryptocurrency for harvesting ransom. For example, CryptoLocker campaigns have been under examination using blockchain information [17] [18]. Researchers have been able to identify embedded digital footprints that could reveal relevant information about identities behind them [19].…”
Section: A Thematic Taxonomy Of Blockchain Analytic Toolsmentioning
confidence: 99%
“…Các đoạn mã script này là mã lệnh dạng stack-based có nghĩa là các tham số đầu vào và kết quả trả về sẽ được đẩy vào ngăn xếp (stack). Ngôn ngữ script bao gồm 80 lệnh được liệt kê tại [11], bao gồm các lệnh về xử lý chuỗi, phép tính số học, mã hóa, hàm băm… Các giao dịch trong hệ thống Bitcoin được thực hiện thông qua các transaction được mô tả trong [12], [13]. Khi hình thành các giao dịch thì người tạo ra giao dịch cần phải ký số thông qua ECDSA toàn bộ dữ liệu của transaction (hình 1).…”
Section: áP Dụng Chữ Ký Số ủY Nhiệm Cho ủY Nhiệm Chi Trong Hệ Thốunclassified