@article{nakamoto2008bitcoin, title={Bitcoin: A peer-to-peer electronic cash system}, author={Nakamoto, Satoshi}, year={2008} } @InProceedings{apod, author = {Elli Androulaki and Steven Bellovin}, title = {APOD: Anonymous Physical Object Delivery}, booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)}, year = {2009}, } @Article{blum1981, author = {Manuel Blum}, title = {Coin Flipping by Telephone}, journal = {CRYPTO}, year = {1981}, pages = {11-15}, } @Misc{target, author = {Michael Riley and Ben Elgin and Dune Lawrence and Carol Matlack}, title = {Missed Alarms and 40 Million Stolen Credit Card Numbers: How {Target} Blew It}, howpublished = {\url{http://www.bloomberg.com/bw/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data}}, month = {March}, year = {2013}, } @Misc{greece2015cash, author = {Reuters}, title = {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday}, howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}}, month = {June}, year = {2015}, } @Misc{france2015cash, author = {Heinz-Peter Bader}, title = {France steps up monitoring of cash payments to fight low-cost terrorism}, howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}}, month = {Mar}, year = {2015}, } @Misc{fatf1997, title = {FATF-IX report on money laundering typologies}, howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}}, month = {feb}, year = {1998}, } @TechReport{, author = {}, title = {}, institution = {}, year = {}, OPTkey = {}, OPTtype = {}, OPTnumber = {}, OPTaddress = {}, OPTmonth = {}, OPTnote = {}, OPTannote = {} } @InProceedings{sander1999escrow, author = {Tomas Sander and Amnon Ta-Shma}, title = {On Anonymous Electronic Cash and Crime}, booktitle = {ISW'99}, year = {1999}, series = {LNCS 1729}, pages = {202--206}, } @Article{solms1992perfect, author = {Sebastiaan H. von Solms and David Naccache}, title = {On blind signatures and perfect crimes}, journal = {Computers \& Security}, year = {1992}, volume = {11}, number = {6}, pages = {581--583}, } @inproceedings{chaum1990untraceable, title={Untraceable electronic cash}, author={Chaum, David and Fiat, Amos and Naor, Moni}, booktitle={Proceedings on Advances in cryptology}, pages={319--327}, year={1990}, organization={Springer-Verlag New York, Inc.} } @inproceedings{chaum1983blind, title={Blind signatures for untraceable payments}, author={Chaum, David}, booktitle={Advances in cryptology}, pages={199--203}, year={1983}, organization={Springer} } @inproceedings{rivest2004peppercoin, title={Peppercoin micropayments}, author={Rivest, Ronald L}, booktitle={Financial Cryptography}, pages={2--8}, year={2004}, organization={Springer} } @InProceedings{fc2014murdoch, author = {Stephen Murdoch and Ross Anderson}, title = {Security Protocols and Evidence: Where Many Payment Systems Fail}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, } @book{ engels1844, author = "Friedrich Engels", title = "{Umrisse zu einer Kritik der National\"okonomie}", year = "1844", publisher = "Ruge and Marx, Paris", } @inproceedings{selby2004analyzing, title={Analyzing the Success and Failure of Recent e-Payment Schemes}, author={Selby, Jack R}, booktitle={Financial Cryptography}, pages={1--1}, year={2004}, organization={Springer} } @misc{brands1993efficient, title={An efficient off-line electronic cash system based on the representation problem}, author={Brands, Stefan A}, year={1993}, publisher={Centrum voor Wiskunde en Informatica} } @article{dent2008extensions, title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements}, author={Dent, AW and Paterson, KG and Wild, PR}, year={2008} } @article{dent2008preliminary, title={Preliminary Report on Chaum's Online E-Cash Architecture}, author={Dent, AW and Paterson, KG and Wild, PR}, journal={Royal Holloway, University of London}, year={2008} } @inproceedings{tor-design, title = {Tor: The Second-Generation Onion Router}, author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, booktitle = {Proceedings of the 13th USENIX Security Symposium}, year = {2004}, month = {August}, www_important = {1}, www_tags = {selected}, www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html}, www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf}, www_section = {Anonymous communication}, } @misc{brands1993efficient, title={An efficient off-line electronic cash system based on the representation problem}, author={Brands, Stefan A}, year={1993}, publisher={Centrum voor Wiskunde en Informatica} } @misc{NYA:CyberExtortionRisk, title = {Cyber Extortion Risk Report 2015}, author = {\relax NYA International}, month = {October}, year = {2015}, howpublished = {\url{http://www.nyainternational.com/sites/default/files/nya-publications/151027_Cyber_Extortion_Risk_Report_2015_0.pdf}} } @misc{ECB:TRoCF2014, title = {Third Report on Card Fraud}, author = {{\relax European Central Bank}}, month = {February}, year = {2014}, howpublished = {\url{https://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201402en.pdf}}, } @inproceedings{3DSsucks, author = {Murdoch, Steven J. and Anderson, Ross}, title = {Verified by Visa and Mastercard Securecode: Or, How Not to Design Authentication}, booktitle = {Proceedings of the 14th International Conference on Financial Cryptography and Data Security}, series = {FC'10}, year = {2010}, isbn = {3-642-14576-0, 978-3-642-14576-6}, location = {Tenerife, Spain}, pages = {336--342}, numpages = {7}, doi_url = {http://dx.doi.org/10.1007/978-3-642-14577-3_27}, doi = {10.1007/978-3-642-14577-3_27}, acmid = {2163598}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg}, url = {https://www.cl.cam.ac.uk/~rja14/Papers/fc10vbvsecurecode.pdf} }