暂无分享,去创建一个
[1] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[2] Jan Chomicki,et al. Query Answering in Inconsistent Databases , 2003, Logics for Emerging Applications of Databases.
[3] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[4] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[5] George Danezis,et al. Pinocchio coin: building zerocoin from a succinct pairing-based proof system , 2013, PETShop '13.
[6] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[7] Leopoldo E. Bertossi,et al. The consistency extractor system: Answer set programs for consistent query answering in databases , 2010, Data Knowl. Eng..
[8] Aviv Zohar. Bitcoin , 2015, Commun. ACM.
[9] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[10] Yoad Lewenberg,et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..
[11] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[12] Renée J. Miller,et al. First-order query rewriting for inconsistent databases , 2005, J. Comput. Syst. Sci..
[13] Ittai Abraham,et al. The Blockchain Consensus Layer and BFT , 2017, Bull. EATCS.
[14] Phokion G. Kolaitis,et al. Efficient Querying of Inconsistent Databases with Binary Integer Programming , 2013, Proc. VLDB Endow..
[15] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[16] Michael Pittarelli,et al. The Theory of Probabilistic Databases , 1987, VLDB.
[17] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[18] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[19] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[20] Kartik Nayak,et al. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus , 2016, ArXiv.
[21] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[22] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[23] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[24] Jan Chomicki,et al. Computing consistent query answers using conflict hypergraphs , 2004, CIKM '04.
[25] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[26] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[27] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[28] Jan Chomicki,et al. Consistent query answers in inconsistent databases , 1999, PODS '99.
[29] Jan Chomicki,et al. Prioritized repairing and consistent query answering in relational databases , 2012, Annals of Mathematics and Artificial Intelligence.
[30] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[31] Dan Suciu,et al. Efficient query evaluation on probabilistic databases , 2004, The VLDB Journal.
[32] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[33] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[34] Prithviraj Sen,et al. Representing and Querying Correlated Tuples in Probabilistic Databases , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[35] Moshe Y. Vardi,et al. The Implication Problem for Functional and Inclusion Dependencies is Undecidable , 1985, SIAM J. Comput..
[36] Leopoldo E. Bertossi,et al. Consistent query answering in databases , 2006, SGMD.