A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research
暂无分享,去创建一个
[1] Jude C. Nelson,et al. Blockstack : A New Decentralized Internet , 2017 .
[2] Alexander Mense,et al. Security Vulnerabilities in Ethereum Smart Contracts , 2018, iiWAS.
[3] Zibin Zheng,et al. Solutions to Scalability of Blockchain: A Survey , 2020, IEEE Access.
[4] Guy Pujolle,et al. A Vademecum on Blockchain Technologies: When, Which, and How , 2019, IEEE Communications Surveys & Tutorials.
[5] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[6] Greg N. Gregoriou,et al. Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data , 2015, The Journal of Wealth Management.
[7] Johan Pouwelse,et al. TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..
[8] Andrea Pinna,et al. A Massive Analysis of Ethereum Smart Contracts Empirical Study and Code Metrics , 2019, IEEE Access.
[9] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[10] Ahmad Akmaluddin Mazlan,et al. Scalability Challenges in Healthcare Blockchain System—A Systematic Review , 2020, IEEE Access.
[11] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[12] Hong Li,et al. Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.
[13] N. Kshetri. Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .
[14] Žiga Turk,et al. Potentials of Blockchain Technology for Construction Management , 2017 .
[15] Cristiano André da Costa,et al. OmniPHR: A distributed architecture model to integrate personal health records , 2017, J. Biomed. Informatics.
[16] Oliver Hinz,et al. Blockchain , 2020, Bus. Inf. Syst. Eng..
[17] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[18] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[19] Rachid El Bansarkhani,et al. PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats , 2018, IEEE Security & Privacy.
[20] Davide Castelvecchi,et al. Quantum computers ready to leap out of the lab in 2017 , 2017, Nature.
[21] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[22] E. O. Kiktenko,et al. Quantum-secured blockchain , 2017, Quantum Science and Technology.
[23] Ariel Gabizon,et al. Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.
[24] Tsuyoshi Murata,et al. {m , 1934, ACML.
[25] Kim-Kwang Raymond Choo,et al. Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..
[26] Eleanna Kafeza,et al. Proof Systems In Blockchains: A Survey , 2019, 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).
[27] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[28] Ravikiran Vatrapu,et al. Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning , 2018, HICSS.
[29] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[30] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[31] Nabil Bouzerna,et al. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[32] Henry Holden,et al. Proceeding with Caution - A Survey on Central Bank Digital Currency , 2019 .
[33] Pramod Singh Rathore,et al. An Overview of Blockchain Technology: Architecture, Consensus Algorithm, and Its Challenges , 2020, Blockchain Technology and the Internet of Things.
[34] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[35] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[36] Simon Josefsson,et al. Edwards-Curve Digital Signature Algorithm (EdDSA) , 2017, RFC.
[37] Michel Rauchs,et al. Global Cryptocurrency Benchmarking Study , 2017 .
[38] R. Brown. The Corda Platform : An Introduction , 2018 .
[39] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[40] Abdurrashid Ibrahim Sanka,et al. Efficient High Performance FPGA based NoSQL Caching System for Blockchain Scalability and Throughput Improvement , 2018, 2018 26th International Conference on Systems Engineering (ICSEng).
[41] Mohsen Guizani,et al. V-Chain: A Blockchain-Based Car Lease Platform , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[42] Arvind Narayanan,et al. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies , 2017, Proc. Priv. Enhancing Technol..
[43] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[44] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[45] Giovanni Schmid,et al. Beyond Bitcoin: A Critical Look at Blockchain-Based Systems , 2017, Cryptogr..
[46] Albert Levi,et al. A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.
[47] David Hausheer,et al. A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts , 2017, AIMS.
[48] Miss A.O. Penney. (b) , 1974, The New Yale Book of Quotations.
[49] Zyad Elkhadir,et al. A cyber network attack detection based on GM Median Nearest Neighbors LDA , 2019, Comput. Secur..
[50] Michel Rauchs,et al. 2017 Global Cryptocurrency Benchmarking Study , 2017 .
[51] Minyi Guo,et al. A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond , 2019, IEEE Internet of Things Journal.
[52] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[53] Xiao Wang,et al. Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach , 2018, IEEE Transactions on Computational Social Systems.
[54] Xin Chen,et al. The DAO attack paradoxes in propositional logic , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).
[55] Lin Chen,et al. Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain , 2017 .
[56] E. Gibney. Inside Microsoft’s quest for a topological quantum computer , 2016, Nature.
[57] Gregory Maxwell,et al. Borromean Ring Signatures ∗ , 2015 .
[58] Shuai Wang,et al. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[59] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[60] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[61] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .
[62] Danna Zhou,et al. d. , 1840, Microbial pathogenesis.
[63] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[64] Ye Guo,et al. Blockchain application and outlook in the banking industry , 2016, Financial Innovation.
[65] Leslie Lamport,et al. Constructing Digital Signatures from a One Way Function , 2016 .
[66] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[67] Sushmita Ruj,et al. A Blockchain Framework for Insurance Processes , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[68] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[69] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[70] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[71] A.W.G. de Vries. Bitcoin's Growing Energy Problem , 2018 .
[72] Ethan Heilman,et al. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.
[73] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[74] Wei Ni,et al. Survey on blockchain for Internet of Things , 2019, Comput. Commun..
[75] Jan Camenisch,et al. Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain , 2017, CCS.
[76] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[77] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild , 2017, DISC.
[78] Douglas C. Schmidt,et al. FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data , 2018, Computational and structural biotechnology journal.
[79] Jae Kwon,et al. Tendermint : Consensus without Mining , 2014 .
[80] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[81] P. Ciaian,et al. The economics of BitCoin price formation , 2014, 1405.4498.
[82] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[83] Cyril Grunspan,et al. On profitability of selfish mining , 2018, ArXiv.
[84] Massimo Bartoletti,et al. Financial Cryptography and Data Security , 2017, Lecture Notes in Computer Science.
[85] Jing Li,et al. Cryptographic primitives in blockchains , 2019, J. Netw. Comput. Appl..
[86] Michael Bedford Taylor,et al. Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).
[87] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[88] Jong-Hyouk Lee,et al. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment , 2016, The Journal of Supercomputing.
[89] Ralph Deters,et al. Security, Performance, and Applications of Smart Contracts: A Systematic Survey , 2019, IEEE Access.
[90] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[91] H. Mayer. ECDSA Security in Bitcoin and Ethereum : a Research Survey , 2016 .
[92] Ben A. Amaba,et al. Blockchain technology innovations , 2017, 2017 IEEE Technology & Engineering Management Conference (TEMSCON).
[93] Pedro Moreno-Sanchez,et al. P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.
[94] Harald Vranken,et al. Sustainability of bitcoin and blockchains , 2017 .
[95] Sherali Zeadally,et al. Blockchain for Internet of Energy management: Review, solutions, and challenges , 2020, Comput. Commun..
[96] Mark D. Button. Security , 2010, 5G Second Phase Explained.
[97] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.
[98] M. Sethumadhavan,et al. Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
[99] Matthew Green,et al. Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.
[100] Peter A. Chow-White,et al. Blockchain as a disruptive technology for business: A systematic review , 2020, Int. J. Inf. Manag..
[101] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[102] Yang Lu,et al. The blockchain: State-of-the-art and research challenges , 2019, J. Ind. Inf. Integr..
[103] Ali Shoker,et al. Brief Announcement: Sustainable Blockchains through Proof of eXercise , 2018, PODC.
[104] Michel Rauchs,et al. 2nd Global Enterprise Blockchain Benchmarking Study , 2019, SSRN Electronic Journal.
[105] Andrea Pinna,et al. Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology , 2017, Future Internet.
[106] Enis Karaarslan,et al. Blockchain Based DNS and PKI Solutions , 2018, IEEE Communications Standards Magazine.
[107] Marten Risius,et al. A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services , 2017, Bus. Inf. Syst. Eng..
[108] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[109] Werasak Kurutach,et al. State of the art and challenges facing consensus protocols on blockchain , 2018, 2018 International Conference on Information Networking (ICOIN).
[110] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[111] Mohammed Samaka,et al. Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.
[112] Ahmed Farouk,et al. Blockchain platform for industrial healthcare: Vision and future opportunities , 2020, Comput. Commun..
[113] Kapil Sharma,et al. Consensus Algorithms in Blockchain Technology: A Survey , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[114] Alex Biryukov,et al. Asymmetric proof-of-work based on the Generalized Birthday problem , 2017, IACR Cryptol. ePrint Arch..
[115] David Randall,et al. Chapter Five - Blockchain applications in healthcare and the opportunities and the advancements due to the new information technology framework , 2019, Adv. Comput..
[116] Alex Biryukov,et al. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem , 2016, NDSS.
[117] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[118] David Manset,et al. When Blockchain Meets the Right to Be Forgotten: Technology versus Law in the Healthcare Industry , 2018, 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI).
[119] Nicklas O. Stockton. China takes blockchain national: The state-sponsored platform will launch in 100 cities , 2020 .
[120] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[121] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[122] Jeremy Clark,et al. Bitcoin's academic pedigree , 2017, ACM Queue.
[123] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[124] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[125] Karl Andersson,et al. A Survey of Blockchain From the Perspectives of Applications, Challenges, and Opportunities , 2019, IEEE Access.
[126] Roger Wattenhofer,et al. ABC: Asynchronous Blockchain without Consensus , 2019, ArXiv.
[127] Thaier Hayajneh,et al. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring , 2018, Journal of Medical Systems.
[128] A. Juels,et al. PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) , 1999 .
[129] Chu-Sing Yang,et al. Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices , 2019, Comput. Secur..
[130] Vitalik Buterin,et al. Casper the Friendly Finality Gadget , 2017, ArXiv.
[131] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[132] Kishor S. Trivedi,et al. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[133] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[134] Ethan Heilman,et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.
[135] Aziz Mohaisen,et al. Exploring the Attack Surface of Blockchain: A Systematic Overview , 2019, ArXiv.
[136] Henry M. Kim,et al. Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack , 2017, J. Cases Inf. Technol..
[137] Xiaohong Jiang,et al. Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.