Blockstack: A Global Naming and Storage System Secured by Blockchains
暂无分享,去创建一个
[1] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[2] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[3] Drummond Reed,et al. OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.
[4] Ivan Beschastnikh,et al. Scalable consistency in Scatter , 2011, SOSP.
[5] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[6] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[7] Srinivasan Keshav,et al. Efficient and decentralized computation of approximate global state , 2006, CCRV.
[8] Emin Gün Sirer,et al. Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays , 2004, NSDI.
[9] John Kubiatowicz,et al. Efficiently binding data to owners in distributed content-addressable storage systems , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[10] Siddhartha Annapureddy,et al. Shark: scaling file servers via cooperative caching , 2005, NSDI.
[11] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[12] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[13] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[14] Robert Tappan Morris,et al. Persistent personal names for globally connected mobile devices , 2006, OSDI '06.
[15] Larry L. Peterson,et al. Syndicate: virtual cloud storage through provider composition , 2014, BigSystem '14.
[16] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[17] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[18] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.
[19] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[20] Michael J. Freedman,et al. CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.
[21] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[22] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[23] Ben Y. Zhao,et al. Pond: The OceanStore Prototype , 2003, FAST.
[24] Scott Shenker,et al. Tiered Fault Tolerance for Long-Term Integrity , 2009, FAST.
[25] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[26] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .