Follow
Rainer Böhme
Title
Cited by
Cited by
Year
Bitcoin: Economics, technology, and governance
R Böhme, N Christin, B Edelman, T Moore
Journal of economic Perspectives 29 (2), 213-238, 2015
23432015
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
7952013
The'Dresden Image Database'for benchmarking digital image forensics
T Gloe, R Böhme
Proceedings of the 2010 ACM symposium on applied computing, 1584-1590, 2010
7692010
An inquiry into money laundering tools in the Bitcoin ecosystem
M Möser, R Böhme, D Breuker
2013 APWG eCrime researchers summit, 1-14, 2013
5022013
The technology of retail central bank digital currency
R Auer, R Böhme
BIS Quarterly Review, March, 2020
4622020
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
3252013
The challenges of personal data markets and privacy
S Spiekermann, A Acquisti, R Böhme, KL Hui
Electronic markets 25, 161-167, 2015
3222015
Modeling cyber-insurance: towards a unifying framework.
R Böhme, G Schwartz
WEIS, 2010
2962010
Can we trust digital image forensics?
T Gloe, M Kirchner, A Winkler, R Böhme
Proceedings of the 15th ACM international conference on Multimedia, 78-86, 2007
2702007
Perceived benefit and risk as multidimensional determinants of bitcoin use: A quantitative exploratory study
S Abramova, R Böhme
2672016
Models and measures for correlation in cyber-insurance.
R Böhme, G Kataria
WEIS 2, 3, 2006
2522006
Hiding traces of resampling in digital images
M Kirchner, R Bohme
IEEE Transactions on Information Forensics and Security 3 (4), 582-592, 2008
2492008
Revisiting weighted stego-image steganalysis
AD Ker, R Böhme
Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008
2462008
Exploiting preserved statistics for steganalysis
R Böhme, A Westfeld
International Workshop on Information Hiding, 82-96, 2004
2282004
Trained to accept? A field experiment on consent dialogs
R Böhme, S Köpsell
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
2092010
Counter-forensics: Attacking image forensics
R Böhme, M Kirchner
Digital Image Forensics: There is More to a Picture Than Meets the Eye, 327-366, 2012
1982012
Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency
J Becker, D Breuker, T Heide, J Holler, HP Rauer, R Böhme
The economics of information security and privacy, 135-156, 2013
1882013
Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees
M Möser, R Böhme
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
1642015
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
1642008
Cyber-Insurance Revisited.
R Böhme
Weis, 2005
1642005
The system can't perform the operation now. Try again later.
Articles 1–20