Study on Integrity and Privacy Requirements of Distributed Ledger Technologies
暂无分享,去创建一个
[1] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[2] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[3] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[4] Andreas M. Antonopoulos,et al. Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .
[5] Barbara Liskov,et al. Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.
[6] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[7] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[9] Harry Halpin,et al. Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[10] Atsushi Santo,et al. Applicability of Distributed Ledger Technology to Capital Market Infrastructure , 2016 .
[11] Craig Gentry,et al. Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..