A Survey on the Security of Blockchain Systems
暂无分享,去创建一个
Peng Jiang | Qiaoyan Wen | Xiapu Luo | Ting Chen | Xiaoqi Li | Ting Chen | Xiaoqi Li | Xiapu Luo | H. Hoos | Peng Jiang | Qiaoyan Wen | Q. Wen
[1] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[2] Ethan Heilman,et al. An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..
[3] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[4] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[5] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[6] Kevin Lee,et al. An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.
[7] Massimo Bartoletti,et al. Financial Cryptography and Data Security , 2017, Lecture Notes in Computer Science.
[8] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[9] Xiapu Luo,et al. Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[10] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Aggelos Kiayias,et al. Edinburgh Research Explorer On Trees, Chains and Fast Transactions in the Blockchain , 2017 .
[12] Vincent Gramoli,et al. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example , 2016, ArXiv.
[13] Kem Z. K. Zhang,et al. Blockchain-based sharing services: What blockchain technology can contribute to smart cities , 2016, Financial Innovation.
[14] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[15] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[16] Elaine Shi,et al. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts , 2016, CCS.
[17] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[18] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[19] Martin White,et al. Internet of Things, Blockchain and Shared Economy Applications , 2016, EUSPN/ICTH.
[20] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[21] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[22] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.
[23] Cesare Pautasso,et al. The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).
[24] Arthur Gervais,et al. Ethereum Eclipse Attacks , 2016 .
[25] K. Wüst. Security of Blockchain Technologies , 2016 .
[26] Andrew Lippman,et al. A Case Study for Blockchain in Healthcare : “ MedRec ” prototype for electronic health records and medical research data , 2016 .
[27] H. Mayer. ECDSA Security in Bitcoin and Ethereum : a Research Survey , 2016 .
[28] Bruce M. Kapron,et al. On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..
[29] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[30] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[31] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[32] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[33] Erik Nordström,et al. Personal Clouds: Concedo , 2015 .
[34] Rob Jansen,et al. A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays , 2014 .
[35] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[36] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[37] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[38] Lixia Zhang,et al. BGPmon: A Real-Time, Scalable, Extensible Monitoring System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[39] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[40] Đuro Kurepa. On A-Trees , 1968 .