ssme-thesis/Thesis.bib

716 lines
22 KiB
BibTeX
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@online{moneroprojectgithub,
author = {Monero-project},
title = {{Monero}: the Secure, Private, Untraceable Cryptocurrency},
year = 2016,
url = {https://github.com/monero-project/monero},
urldate = {2018-07-02}
}
@online{cryptonotepaper,
author = {Nicolas van Saberhagen},
title = {{CryptoNote} v 2.0},
year = 2013,
url = {https://lab.getmonero.org/pubs/whitepaper.pdf},
urldate = {2018-07-02}
}
@online{monerokirk,
author = {Berta Bilbao},
title = {Kirk Ransomware},
year = 2017,
url = {https://sensorstechforum.com/kirk-ransomware-remove-restore-kirked-files/},
urldate = {2019-03-31}
}
@InProceedings{monerohistory,
author="Sun, Shi-Feng
and Au, Man Ho
and Liu, Joseph K.
and Yuen, Tsz Hon",
editor="Foley, Simon N.
and Gollmann, Dieter
and Snekkenes, Einar",
title="RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero",
booktitle="Computer Security -- ESORICS 2017",
year="2017",
publisher="Springer International Publishing",
address="Cham",
pages="456--474",
abstract="In this work, we initially study the necessary properties and security requirements of Ring Confidential Transaction (RingCT) protocol deployed in the popular anonymous cryptocurrency Monero. Firstly, we formalize the syntax of RingCT protocol and present several formal security definitions according to its application in Monero. Based on our observations on the underlying (linkable) ring signature and commitment schemes, we then put forward a new efficient RingCT protocol (RingCT 2.0), which is built upon the well-known Pedersen commitment, accumulator with one-way domain and signature of knowledge (which altogether perform the functions of a linkable ring signature). Besides, we show that it satisfies the security requirements if the underlying building blocks are secure in the random oracle model. In comparison with the original RingCT protocol, our RingCT 2.0 protocol presents a significant space saving, namely, the transaction size is independent of the number of groups of input accounts included in the generalized ring while the original RingCT suffers a linear growth with the number of groups, which would allow each block to process more transactions.",
isbn="978-3-319-66399-9"
}
@online{githubbytecoin,
author = {Antonio Juarez},
title = {{CryptoNote} - Bytecoin},
year = 2014,
url = {https://github.com/monero-project/monero/commit/296ae46ed8f8f6e5f986f978febad302e3df231a},
urldate = {2018-07-02}
}
@online{moneroattack,
author = {Antonio Juarez},
title = {{CryptoNote} - Bytecoin},
year = 2014,
url = {https://lab.getmonero.org/pubs/MRL-0002.pdf},
urldate = {2018-07-02}
}
@online{fluffyponyonbytecoin,
author = {Riccardo "fluffypony" Spagni},
title = {{Why Monero} and not Bytecoin?},
year = 2014,
url = {https://www.reddit.com/r/Monero/comments/26we1g/why_monero_and_not_bytecoin/chv5whf/},
urldate = {2018-07-02}
}
@online{bitmonero,
author = {Thankful\_for\_today},
title = {{Bitmonero} Release},
year = 2014,
url = {https://github.com/monero-project/monero/commit/1a8f5ce89a990e54ec757affff01f27d449640bc},
urldate = {2018-07-02}
}
@online{monerofork,
author = {Riccardo "fluffypony" Spagni},
title = {{Monero} New README},
year = 2014,
url = {https://github.com/monero-project/monero/commit/003b1f909d416ab2c869b76176380c5f133bdad4#diff-c47c7c7383225ab55ff591cb59c41e6b},
urldate = {2018-07-03}
}
@online{monerospamattack,
author = {Riccardo "fluffypony" Spagni},
title = {2014/08/24 {Monero} Blockchain Spam Attack - Post Mortem},
year = 2014,
url = {https://bitcointalk.org/index.php?topic=583449.msg8519146#msg8519146},
urldate = {2018-07-04}
}
@online{cryptonotemerkletree,
author = {
Cryptonotefoundation},
title = {CryptoC-3: Fix for Merkle Tree Root Issue},
year = 2014,
url = {https://github.com/cryptonotefoundation/cryptonote/commit/6be8153a8bddf7be43aca1efb829ba719409787a},
urldate = {2018-07-04}
}
@online{merkletreeexploit,
author = {
cryptonotefoundation},
title = {Counterfeiting via Merkle Tree Exploits within
Virtual Currencies Employing the CryptoNote
Protocol
},
year = 2014,
url = {https://lab.getmonero.org/pubs/MRL-0002.pdf},
urldate = {2018-07-04}
}
@online{macheta2014counterfeiting,
title={Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol},
author={Macheta, Jan and Noether, Sarang and Noether, Surae and Smooth, Javier},
year={2014},
url={https://static.coinpaprika.com/storage/cdn/whitepapers/6394331.pdf},
urldate = {2018-07-04}
}
@online{moneroalternativedash,
author = {Dash Core Group Inc.},
title = {Dash - Reinventing Cryptocurrency },
year = 2018,
url = {https://github.com/dashpay/dash},
urldate = {2018-07-10}
}
@online{moneroalternativedashdev,
author = {Dash Core Group Inc.},
title = {Dash - Developer Documentation},
year = 2018,
url = {https://dash-docs.github.io/},
urldate = {2018-07-10}
}
@online{moneroalternativeaeon,
author = {Aeon Team},
title = {AEON - AEON Source Code (post May 2018 Rebase)},
year = 2018,
url = {https://github.com/aeonix/aeon},
urldate = {2018-07-11}
}
@online{moneroalternativebytecoin,
author = {Amjuarez},
title = {Bytecoin - CryptoNote Protocol Implementation},
year = 2018,
url = {https://github.com/amjuarez/bytecoin},
urldate = {2018-07-12}
}
@online{moneroalternativepivx,
author = {PIVX-Project},
title = {PIVX Core Integration/Staging Repository},
year = 2018,
url = {https://github.com/PIVX-Project/PIVX},
urldate = {2018-07-12}
}
@online{moneroalternativeverge,
author = {Vergecurrency},
title = {VERGE [XVG] Source Code},
year = 2018,
url = {https://github.com/vergecurrency/VERGE},
urldate = {2018-07-12}
}
@inproceedings{javarone2018bitcoin,
author = {Javarone, Marco and Steven Wright, Craig},
year = {2018},
month = {06},
pages = {77-81},
title = {From Bitcoin to Bitcoin Cash: a network analysis},
doi = {10.1145/3211933.3211947}
}
@online{moneroalternativezcash,
author = {Zcash},
title = {Zcash 1.1.2},
year = 2018,
url = {https://github.com/zcash/zcash},
urldate = {2018-07-12}
}
@online{moneroalternativezcoin,
author = {Zcoinofficial},
title = {The Zerocoin Cryptocurrency},
year = 2018,
url = {https://github.com/zcoinofficial/zcoin},
urldate = {2018-07-12}
}
@online{farell2015analysis,
title={An Analysis of the Cryptocurrency Industry},
author={Farell, Ryan},
year={2015},
url={https://repository.upenn.edu/cgi/viewcontent.cgi?article=1133&context=wharton_research_scholars},
urldate = {2018-07-12}
}
@incollection{mccorry2017atomically,
title={Atomically trading with Roger: Gambling on the Success of a Hardfork},
author={McCorry, Patrick and Heilman, Ethan and Miller, Andrew},
booktitle={Data Privacy Management, Cryptocurrencies and Blockchain Technology},
pages={334--353},
year={2017},
publisher={Springer}
}
@article{iwamura2014bitcoin,
title={Is Bitcoin the only Cryptocurrency in the Town? Economics of Cryptocurrency and Friedrich A. Hayek},
author={Iwamura, Mitsuru and Kitamura, Yukinobu and Matsumoto, Tsutomu},
year={2014}
}
@article{elbahrawy2017evolutionary,
title={Evolutionary Dynamics of the Cryptocurrency Market},
author={ElBahrawy, Abeer and Alessandretti, Laura and Kandler, Anne and Pastor-Satorras, Romualdo and Baronchelli, Andrea},
journal={Royal Society open science},
volume={4},
number={11},
pages={170623},
year={2017},
publisher={The Royal Society}
}
@article{conti2018survey,
title={A Survey on Security and Privacy Issues of Bitcoin},
author={Conti, Mauro and Kumar, Sandeep and Lal, Chhagan and Ruj, Sushmita},
journal={IEEE Communications Surveys \& Tutorials},
year={2018},
publisher={IEEE}
}
@online{domingues2018allvor,
title={Allvor: Cryptocurrency for E-commerce powered by the XRP Ledger},
author={Domingues, Cleyton},
year={2018},
url={https://allvor.org/wp-content/uploads/2018/03/Allvor_White_Paper.pdf},
urldate = {2018-07-22}
}
@article{moser2018empirical,
title={An Empirical Analysis of Traceability in the Monero Blockchain},
author={M{\"o}ser, Malte and Soska, Kyle and Heilman, Ethan and Lee, Kevin and Heffan, Henry and Srivastava, Shashvat and Hogan, Kyle and Hennessey, Jason and Miller, Andrew and Narayanan, Arvind and others},
journal={Proceedings on Privacy Enhancing Technologies},
volume={2018},
number={3},
pages={143--163},
year={2018},
publisher={De Gruyter Open}
}
@online{monerov2release,
author = {Monero-project},
title = {Monero - Hydrogen Helix, Point Release 4},
year = 2016,
url = {https://github.com/monero-project/monero/releases/tag/v0.9.4},
urldate = {2018-07-22}
}
@online{monerov6release,
author = {Monero-project},
title = {Monero - Helium Hydra, Point Release 1},
year = 2016,
url = {https://github.com/monero-project/monero/releases/tag/v0.11.1.0},
urldate = {2018-07-22}
}
@book{dannen2017introducing,
title={Introducing Ethereum and Solidity},
author={Dannen, Chris},
year={2017},
publisher={Springer}
}
@article{noether2015ring,
title={Ring Signature Confidential Transactions for Monero.},
author={Noether, Shen},
journal={IACR Cryptology ePrint Archive},
volume={2015},
pages={1098},
year={2015}
}
@inproceedings{sun2017ringct,
title={RingCT 2.0: a compact accumulator-based (linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero},
author={Sun, Shi-Feng and Au, Man Ho and Liu, Joseph K and Yuen, Tsz Hon},
booktitle={European Symposium on Research in Computer Security},
pages={456--474},
year={2017},
organization={Springer}
}
@article{mercer2016privacy,
title={Privacy on the Blockchain: Unique Ring Signatures},
author={Rebekah Mercer},
journal={CoRR},
year={2016},
volume={abs/1612.01188}
}
@online{seguias2018monero,
title={Moneros Building Blocks Part 10 of 10--Stealth Addresses},
author={Seguias, Bassam El Khoury},
year={2018},
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part10.pdf},
urldate = {2018-07-22}
}
@online{monerokovri,
author = {Monero-project},
title = {Kovri - The Kovri I2P Router Project},
year = 2018,
url = {https://github.com/monero-project/kovri},
urldate = {2018-07-22}
}
@online{coinmetricsiocharts,
title={Network Data Charts},
author={CoinMetrics.io - Open source cryptoasset analytics},
year={2018},
url = {https://coinmetrics.io/charts},
urldate = {2018-07-22}
}
@online{seguias2018moneroa,
title={Moneros Building Blocks Part 9 of 10--RingCT and Anatomy of Monero Transactions},
author={Seguias, Bassam El Khoury},
year={2018},
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part9.pdf},
urldate = {2018-07-22}
}
@conference{courtois2017stealth,
author={Nicolas T. Courtois and Rebekah Mercer},
title={Stealth Address and Key Management Techniques in Blockchain Systems},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={559-566},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006270005590566},
isbn={978-989-758-209-7},
}
@article {miller2017empirical,
author = "Malte Möser and Kyle Soska and Ethan Heilman and Kevin Lee and Henry Heffan and Shashvat Srivastava and Kyle Hogan and Jason Hennessey and Andrew Miller and Arvind Narayanan and Nicolas Christin",
title = "An Empirical Analysis of Traceability in the Monero Blockchain",
journal = "Proceedings on Privacy Enhancing Technologies",
year = "2018",
volume = "2018",
number = "3",
pages = "143 - 163",
}
@online{cryptoshuffler,
author = {Kaspersky Lab},
title = {CryptoShuffler: Trojan stole \$140,000 in Bitcoin},
year = 2018,
url = {https://www.kaspersky.com/blog/cryptoshuffler-bitcoin-stealer/19976/},
urldate = {2018-07-28}
}
@online{ledgermonero,
author = {LedgerHQ},
title = {Monero Wallet Application for Ledger},
year = 2018,
url = {https://github.com/LedgerHQ/blue-app-monero},
urldate = {2018-07-29}
}
@inproceedings{schaupp2018cryptocurrency,
title={Cryptocurrency Adoption and the Road to Regulation},
author={Schaupp, Ludwig Christian and Festa, Mackenzie},
booktitle={Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age},
pages={78},
year={2018},
organization={ACM}
}
@article{caviglione2017covert,
title={Covert Channels in Personal Cloud Storage Services: The Case of Dropbox},
author={Caviglione, Luca and Podolski, Maciej and Mazurczyk, Wojciech and Ianigro, Massimo},
journal={IEEE Transactions on Industrial Informatics},
volume={13},
number={4},
pages={1921--1931},
year={2017},
publisher={IEEE}
}
@online{moneromultisig,
author = {Riccardo "fluffypony" Spagni},
title = {Monero - Multisig \#2134},
year = 2017,
url = {https://github.com/monero-project/monero/pull/2134},
urldate = {2018-08-05}
}
@online{moneromultisigrelease,
author = {Riccardo "fluffypony" Spagni},
title = {Monero - Lithium Luna, Point Release 3},
year = 2018,
url = {https://github.com/monero-project/monero/releases/tag/v0.12.3.0},
urldate = {2018-08-05}
}
@article{higbee2018role,
title={The role of Crypto-currency in Cybercrime},
author={Higbee, Aaron},
journal={Computer Fraud \& Security},
volume={2018},
number={7},
pages={13--15},
year={2018},
publisher={Elsevier}
}
@online{martin2017don,
title={Dont Let Your Business Be Digitally Kidnapped},
author={Martin, Kathleen},
year={2017},
url = {https://www.nist.gov/blogs/manufacturing-innovation-blog/dont-let-your-business-be-digitally-kidnapped},
urldate={2018-08-05}
}
@online{paquet2018ransomware,
title={Ransomware Payments in the Bitcoin Ecosystem},
author={Paquet-Clouston, Masarah and Haslhofer, Bernhard and Dupont, Beno{\^\i}t},
year={2018},
url = {http://infosecon.net/workshop/downloads/2018/pdf/Ransomware_payments_in_the_Bitcoin_ecosystem.pdf},
urldate = {2018-08-05}
}
@online{cusack2018points,
title={Points of Failure in the Ransomware Electronic Business Model},
author={Cusack, Brian and Ward, Gerard},
year={2018},
url={https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1365&context=amcis2018},
urldate = {2018-08-05}
}
@inproceedings{wijayamonero,
title={Monero Ring Attack: Recreating Zero Mixin Transaction Effect},
author={Wijaya, Dimaz Ankaa and Liu, Joseph and Steinfeld, Ron and Liu, Dongxi},
booktitle={2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
pages={1196--1201},
year={2018},
organization={IEEE}
}
@online{blackruby2018,
author = {Ravikant Tiwari},
title = {Black Ruby: Combining Ransomware and Coin Miner Malware},
year = 2018,
url = {https://www.acronis.com/en-us/blog/posts/black-ruby-combining-ransomware-and-coin-miner-malware},
urldate = {2018-08-11}
}
@inproceedings{krombholz2016other,
title={The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
author={Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={555--580},
year={2016},
organization={Springer}
}
@incollection{tarasiewicz2015cryptocurrencies,
title={Cryptocurrencies as Distributed Community Experiments},
author={Tarasiewicz, Matthias and Newman, Andrew},
booktitle={Handbook of digital currency},
pages={201--222},
year={2015},
publisher={Elsevier}
}
@techreport{cong2018decentralized,
title={Decentralized Mining in Centralized Pools},
author={Cong, Lin William and He, Zhiguo and Li, Jiasun},
year={2019},
institution={National Bureau of Economic Research}
}
@article{papadopoulos2018truth,
title={Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model},
author={Panagiotis Papadopoulos and Panagiotis Ilia and Evangelos P. Markatos},
journal={CoRR},
year={2018}
}
@inproceedings{tahir2017mining,
title={Mining on Someone Elses Dime: Mitigating Covert Mining Operations in Clouds and Enterprises},
author={Tahir, Rashid and Huzaifa, Muhammad and Das, Anupam and Ahmad, Mohammad and Gunter, Carl and Zaffar, Fareed and Caesar, Matthew and Borisov, Nikita},
booktitle={International Symposium on Research in Attacks, Intrusions, and Defenses},
pages={287--310},
year={2017},
organization={Springer}
}
@article{jaureguizar2018cryptocurrency,
title={The cryptocurrency market: A network analysis.},
author={Jaureguizar Franc{\'e}s, Carlos and Grau-Carles, Pilar and Jaureguizar Arellano, Diego},
journal={ESIC Market. Economic \& Business Journal},
volume={49},
number={3},
year={2018}
}
@online{monerolang2018,
author = {ErCiccione},
title = {All Languages Need to be Updated for 0.13 - Call for Translators},
year = 2018,
url = {https://github.com/monero-project/monero-gui/issues/1582},
urldate = {2018-10-14}
}
@mastersthesis{pialphapialphagammaiotaacutealphanunualpharhoovarsigma2016study,
title={A Study of Penetration Testing Procedures using Windows PowerShell: Introduction to Offensive PowerShell \& Assesment of PowerShell Security Tools},
author={$\Pi$$\alpha$$\pi$$\alpha$$\gamma$$\iota$$\acute{\alpha}$$\nu$$\nu$$\alpha$$\rho$o$\varsigma$, $\Gamma$$\varepsilon$$\acute{\omega}$$\rho$$\gamma$$\iota$o$\varsigma$ and Papagiannaros, Georgios},
year={2016},
school={$\Pi$$\alpha$$\nu$$\varepsilon$$\pi$$\iota$$\sigma$$\tau$$\acute{\eta}$$\mu$$\iota$o $\Pi$$\varepsilon$$\iota$$\rho$$\alpha$$\iota$$\acute{\omega}$$\varsigma$}
}
@online{xmrwalletgithub,
author = {Dimi "2049r" Divak},
title = {Monerujo},
year = 2018,
url = {https://github.com/m2049r/xmrwallet},
urldate = {2018-11-17}
}
@online{cakewalletgithub,
author = {Cake Technologies LLC.},
title = {CakeWallet},
year = 2018,
url = {https://github.com/fotolockr/CakeWallet},
urldate = {2018-11-17}
}
@online{freewallet,
author = {Wallet Services Ltd. },
title = {Freewallet},
year = 2018,
url = {https://freewallet.org/},
urldate = {2018-11-20}
}
@article{storage2012data,
title={Data Backup Options},
year={2012},
author={Ruggiero, Heckathorn},
journal={Computer Fraud \& Security},
publisher={Carnegie Mellon University}
}
@book{leemans2015red,
title={Red Hat Enterprise Linux Server Cookbook},
author={Leemans, William},
year={2015},
publisher={Packt Publishing Ltd}
}
@online{ansibleremoteps,
author = {{Ansible - Red Hat, Inc.}},
title = {Configure a Windows Host for Remote Management with Ansible},
year = 2018,
url = {https://github.com/ansible/ansible/blob/devel/examples/scripts/ConfigureRemotingForAnsible.ps1},
urldate = {2018-12-02}
}
@online{windowsansible,
author = {{Red Hat Summit}},
title = {Manage Windows like Linux with Ansible},
year = 2018,
url = {https://www.youtube.com/watch?v=FEdXUv02Dbg},
urldate = {2018-12-02}
}
@online{windowshostansible,
author = {{Red Hat, Inc.}},
title = {Ansible - Setting up a Windows Host},
year = 2018,
url = {https://docs.ansible.com/ansible/latest/user_guide/windows.html},
urldate = {2018-12-02}
}
@book{van2015red,
title={Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300)},
author={van Vugt, Sander},
year={2015},
publisher={Pearson IT Certification}
}
@book{hochstein2017ansible,
title={Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way},
author={Hochstein, Lorin and Moser, Rene},
year={2017},
publisher={" O'Reilly Media, Inc."}
}
@online{xmrstakcompile,
author = {{fireice-uk}},
title = {Compile Xmr-stak},
year = 2018,
url = {https://github.com/fireice-uk/xmr-stak/blob/master/doc/compile.md#build-system},
urldate = {2018-12-03}
}
@book{pelz2016centos,
title={CentOS 7 Linux Server Cookbook},
author={Pelz, Oliver and Hobson, Jonathan},
year={2016},
publisher={Packt Publishing Ltd}
}
@incollection{rhodes2016introduction,
title={An Introduction to Windows Installation Methodologies and Tools},
author={Rhodes, Chris and Bettany, Andrew},
booktitle={Windows Installation and Update Troubleshooting},
pages={1--27},
year={2016},
publisher={Springer}
}
@inproceedings{amarasinghe2019survey,
title={A Survey of Anonymity of Cryptocurrencies},
author={Amarasinghe, Niluka and Boyen, Xavier and McKague, Matthew},
booktitle={Proceedings of the Australasian Computer Science Week Multiconference},
pages={2},
year={2019},
organization={ACM}
}
@inproceedings{al2014investigating,
title={Investigating Factors behind choosing a Cryptocurrency},
author={Al Shehhi, Aamna and Oudah, Mayada and Aung, Zeyar},
booktitle={2014 IEEE International Conference on Industrial Engineering and Engineering Management},
pages={1443--1447},
year={2014},
organization={IEEE}
}
@inproceedings{le2018swimming,
title={Swimming in the Monero Pools},
author={Le Jamtel, Emilien},
booktitle={2018 11th International Conference on IT Security Incident Management \& IT Forensics (IMF)},
pages={110--114},
year={2018},
organization={IEEE}
}
@phdthesis{billman2018cryptojacking,
title={Cryptojacking: Abusing Computational Power for Profit},
author={Billman, Ashley},
year={2018},
school={Utica College}
}
@inproceedings{eskandari2018first,
title={A First Look at Browser-based Cryptojacking},
author={Eskandari, Shayan and Leoutsarakos, Andreas and Mursch, Troy and Clark, Jeremy},
booktitle={2018 IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
pages={58--66},
year={2018},
organization={IEEE}
}
@article{konoth2019malicious,
title={Malicious Cryptocurrency Miners: Status and Outlook},
author={Konoth, Radhesh Krishnan and van Wegberg, Rolf and Moonsamy, Veelasha and Bos, Herbert},
year={2019},
journal = {CoRR},
year = {2019},
eprint = {1901.10794}
}
@online{limesurvey,
author = {{LimeSurvey}},
title = {LimeSurvey - The most Popular FOSS Online Survey Tool on the Web},
year = 2019,
url = {https://github.com/LimeSurvey/LimeSurvey},
urldate = {2019-04-20}
}
@online{certbot,
author = {{Certbot}},
title = {The Certbot ACME Client},
year = 2019,
url = {https://github.com/certbot/certbot},
urldate = {2019-04-20}
}
@online{letsencrypt,
author = {{Let's Encrypt}},
title = {A Free, Automated, and Open Certificate Authority},
year = 2019,
url = {https://github.com/letsencrypt},
urldate = {2019-04-20}
}