BlueWallet: The Secure Bitcoin Wallet
暂无分享,去创建一个
Christian Decker | Roger Wattenhofer | Tobias Bamert | Samuel Welten | Christian Decker | Roger Wattenhofer | Tobias Bamert | S. Welten
[1] Franziska Boehm,et al. Bitcoin: A First Legal Analysis - With Reference to German and US-American Law , 2014, Financial Cryptography Workshops.
[2] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[3] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[4] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[5] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[6] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[7] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[8] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[9] Philippe Fouquart,et al. ASN.1 Communication Between Heterogeneous Systems , 2000 .
[10] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[11] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[12] Thomas Weigold,et al. Secure Internet banking authentication , 2006, IEEE Security & Privacy.
[13] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[14] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[15] Carles Gomez,et al. Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology , 2012, Sensors.