PUSTOGAROV, I. (2015). Deanonymisation techniques for Tor and Bitcoin [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/21798 |
BIRYUKOV, A., & PUSTOGAROV, I. (2015). Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. In Financial Cryptography and Data Security - 19th International Conference (pp. 10). Springer International Publishing. Peer reviewed |
BIRYUKOV, A., KHOVRATOVICH, D., & PUSTOGAROV, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. Peer reviewed |
BIRYUKOV, A., & PUSTOGAROV, I. (2014). Bitcoin over Tor isn't a good idea. In 2015 IEEE Symposium on Security and Privacy (pp. 122-134). IEEE Computer Society. Peer reviewed |
BIRYUKOV, A., PUSTOGAROV, I., Thill, F., & WEINMANN, R.-P. (2014). Content and popularity analysis of Tor hidden services. In proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society. Peer reviewed |
BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15 Peer reviewed |
BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2012). TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News, (90), 29-29. Peer reviewed |
BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2012). TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (pp. 469-486). Springer. Peer reviewed |