HAPI Protocol
  • Introducing HAPI
  • Overview
    • AML and Cryptocurrency
    • Tracking Within Blockchain and DLT
    • Hacking Incursions on DApps and Liquidity
  • HAPI WP
    • HAPI - Core of Decentralized Cybersecurity
    • Data Providers
    • HAPI SC
    • Dual Categorization Mechanism in HAPI’s SC
    • Risk Assessment
    • HAPI Oracles
    • Example of Attack on CEX and the Framework of HAPI Protocol
    • Key Actors
    • Machine Learning
    • System Governance and Ability to Shape Cybersecurity Space Together
    • Bibliography
  • HAPI Tokenomics
    • Token distribution
    • Token sale details
    • Unlock schedule
  • HAPI Roadmap
    • Roadmap
  • HAPI Ecosystem
    • Blockchains
    • DeFi Projects
  • HAPI Public
    • Public resources
    • HAPI in media
  • HAPI Team
    • Core Team
    • Dev Team
  • Legal
    • Token Risks
  • HAPI Reporter
    • Working with reporter page
    • Reporter staking
    • How to Become an Official HAPI Reporter
    • How to get whitelisted
  • Developers
    • Integration pathways
    • API Integration
    • Accessing Solana contract via Javascript
    • HAPI Integration on NEAR
Powered by GitBook
On this page

Was this helpful?

  1. HAPI WP

Bibliography

“12 Month Review Revised FATF Standards Virtual Assets.” Second-12-Month-Review-Revised-FATF-Standards-Virtual-Assets-VASPS, www.fatf-gafi.org/media/fatf/documents/recommendations/Second-12-Month-Review-Revised-FATF-Standards-Virtual-Assets-VASPS.pdf.

“Are Centre Centralized Cryptocurrency Regulations the Answer? Are Cryptocurrecny Regulations the Answer? Three Countries; Three Different Directions .” Brooklynworks, brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1960&context=bjil.

Carrillo, Casey. “‘Probably the Largest Kyc Data Leak in History’ Demonstrates the Importance of Bitcoin Privacy.” Bitcoin Magazine: Bitcoin News, Articles, Charts, and Guides, Bitcoin Magazine: Bitcoin News, Articles, Charts, and Guides, 29 Mar. 2021, bitcoinmagazine.com/business/probably-the-largest-kyc-data-leak-in-history-demonstrates-the-importance-of-bitcoin-privacy.

“The Chainalysis 2021 Crypto Crime Report.” Chainalysis, go.chainalysis.com/2021-Crypto-Crime-Report.html.

“Crypto Compliance.” Crystal Blockchain Analytics for Crypto Compliance, crystalblockchain.com/investigations/how-crystal-investigations-truly-make-a-difference/.

“Crypto Crime.” Crypto Head, 5 July 2021, cryptohead.io/research/crypto-crime/.

“Crystal Blockchain Analytics 2021.” Crystal Blockchain Analytics for Crypto Compliance, crystalblockchain.com/investigations/darknet-interactions-bitcoin-a-crypto-activity-analysis-for-may-2021/.

Eisenbeis, Robert. “TNB and the Regulatory Dialectic.” Accelerating Progress, 14 Dec. 2018, www.spglobal.com/marketintelligence/en/news-insights/trending/bh8zuqyjenucv2z_azcaza2.

“EU's AMLD5 Is Not Enough.” Bruc Bond, 3 Jan. 2020, www.brucbond.com/article/eus-amld5-is-not-enough.

Hinteregger, Abraham, and Bernhard Haslhofer. “Short Paper: An Empirical Analysis of Monero CROSS-CHAIN TRACEABILITY.” Financial Cryptography and Data Security, 2019, pp. 150–157., doi:10.1007/978-3-030-32101-7_10.

Huang, Danny Yuxing, et al. “Tracking Ransomware End-to-End.” 2018 IEEE Symposium on Security and Privacy (SP), 2018, doi:10.1109/sp.2018.00047.

Huang, Sherena. “Cryptocurrency and Crime.” FinTech, Artificial Intelligence and the Law, 2021, pp. 125–143., doi:10.4324/9781003020998-11.

Perrin, Chad. “The CIA Triad.” TechRepublic, TechRepublic, 30 June 2008, www.techrepublic.com/blog/it-security/the-cia-triad/.

Tracing Transactions across Cryptocurrency Ledgers - Usenix. www.usenix.org/system/files/sec19-yousaf_0.pdf.

E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy, pages 459–474, Berkeley, CA, USA, May 18–21, 2014. IEEE Computer Society Press | S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 Internet Measurement Conference, pages 127–140. ACM, 2013

PreviousSystem Governance and Ability to Shape Cybersecurity Space TogetherNextToken distribution

Last updated 3 years ago

Was this helpful?