暂无分享,去创建一个
Yonggang Wen | Dinh Thai Hoang | Dusit Niyato | Zehui Xiong | Ping Wang | Wenbo Wang | Peizhao Hu | D. Niyato | Yonggang Wen | Zehui Xiong | Ping Wang | D. Hoang | Peizhao Hu | Wenbo Wang
[1] Zekeriya Erkin,et al. A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[2] Aggelos Kiayias,et al. Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.
[3] George Danezis,et al. SoK: Consensus in the Age of Blockchains , 2017, AFT.
[4] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[5] Nicolas Courtois,et al. On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies , 2014, ArXiv.
[6] Ke Xiao,et al. A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.
[7] Joseph J. LaViola,et al. Byzantine Consensus from Moderately-Hard Puzzles : A Model for Bitcoin , 2014 .
[8] Damon McCoy,et al. Stressing Out: Bitcoin "Stress Testing" , 2016, Financial Cryptography Workshops.
[9] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[10] T. Moran,et al. Rational Proofs of Space-Time , 2017 .
[11] Hari Balakrishnan,et al. Secure Incentivization for Decentralized Content Delivery , 2018, HotEdge.
[12] Aggelos Kiayias,et al. Speed-Security Tradeoffs in Blockchain Protocols , 2015, IACR Cryptol. ePrint Arch..
[13] Guido Caldarelli,et al. Blockchain inefficiency in the Bitcoin peers network , 2017, EPJ Data Science.
[14] Alysson Bessani,et al. A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2017, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[15] S. Athey,et al. Bitcoin Pricing, Adoption, and Usage: Theory and Evidence , 2016 .
[16] Miguel Correia,et al. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures , 2006, Comput. J..
[17] Hong-Sheng Zhou,et al. Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond , 2016, TCC.
[18] Victor C. M. Leung,et al. Computation Offloading and Content Caching in Wireless Blockchain Networks With Mobile Edge Computing , 2018, IEEE Transactions on Vehicular Technology.
[19] Shai Halevi,et al. Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).
[20] Dong In Kim,et al. Competitive Data Trading in Wireless-Powered Internet of Things (IoT) Crowdsensing Systems with Blockchain , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).
[21] Nicola Dimitri,et al. Bitcoin Mining as a Contest , 2017, Ledger.
[22] Brent Waters,et al. How to Generate and Use Universal Samplers , 2016, ASIACRYPT.
[23] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[24] Garrick Hileman,et al. 2017 Global Blockchain Benchmarking Study , 2017 .
[25] Mariana Raykova,et al. RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.
[26] Ali Shoker,et al. Sustainable blockchain through proof of exercise , 2017, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA).
[27] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[28] Haipeng Yao,et al. A Survey of Mobile Information-Centric Networking: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.
[29] Daniel Kraft,et al. Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..
[30] Miao Pan,et al. A Survey of Contract Theory-Based Incentive Mechanism Design in Wireless Networks , 2017, IEEE Wireless Communications.
[31] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[32] George Danezis,et al. Consensus in the Age of Blockchains , 2017, ArXiv.
[33] Simon Duquennoy,et al. Towards Blockchain-based Auditable Storage and Sharing of IoT Data , 2017, CCSW.
[34] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[35] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[36] Zhetao Li,et al. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[37] Serguei Popov,et al. Equilibria in the Tangle , 2017, Comput. Ind. Eng..
[38] Khashayar Kotobi,et al. Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.
[39] Massimo Bartoletti,et al. An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.
[40] Austin Mohr,et al. A Survey of Zero-Knowledge Proofs with Applications to Cryptography , 2007 .
[41] Kouichi Sakurai,et al. Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools , 2016, ISC.
[42] Rainer Böhme,et al. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.
[43] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[44] Dusit Niyato,et al. Decentralized Caching for Content Delivery Based on Blockchain: A Game Theoretic Perspective , 2018, 2018 IEEE International Conference on Communications (ICC).
[45] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[46] Joel J. P. C. Rodrigues,et al. Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues , 2018, IEEE Access.
[47] Dusit Niyato,et al. Optimal Auction for Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach , 2017, 2018 IEEE International Conference on Communications (ICC).
[48] Ning Zhang,et al. A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain , 2019, IEEE Internet of Things Journal.
[49] F. Sun,et al. Solving Byzantine Problems in Synchronized Systems using Bitcoin , 2014 .
[50] Sachin Shetty,et al. ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[51] Andreas M. Antonopoulos,et al. Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .
[52] A. Juels,et al. PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) , 1999 .
[53] James H. Davenport,et al. Cryptographic Hash Functions: Recent Design Trends and Security Notions , 2011, IACR Cryptol. ePrint Arch..
[54] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[55] Aggelos Kiayias,et al. Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..
[56] Dusit Niyato,et al. On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach , 2018, IEEE Transactions on Services Computing.
[57] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[58] N. Houy. The Economics of Bitcoin Transaction Fees , 2014 .
[59] Ghassan O. Karame,et al. Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.
[60] Peter Richtárik,et al. Federated Optimization: Distributed Machine Learning for On-Device Intelligence , 2016, ArXiv.
[61] Song Guo,et al. Information and Communications Technologies for Sustainable Development Goals: State-of-the-Art, Needs and Perspectives , 2018, IEEE Communications Surveys & Tutorials.
[62] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[63] Prashant Nalini Vasudevan,et al. Proofs of Useful Work , 2017, IACR Cryptol. ePrint Arch..
[64] L. Ren. Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .
[65] Matthew Green,et al. Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.
[66] Jitender S. Deogun,et al. Identity management using blockchain for cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[67] Christian Decker,et al. Bitcoin meets strong consistency , 2014, ICDCN.
[68] Stefano Secci,et al. Securing virtual machine orchestration with blockchains , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[69] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[70] Emin Gün Sirer,et al. (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work , 2017, Financial Cryptography Workshops.
[71] Jere Backman,et al. Blockchain network slice broker in 5G: Slice leasing in factory of the future use case , 2017, 2017 Internet of Things Business Models, Users, and Networks.
[72] Kai Wang,et al. Enabling Collaborative Edge Computing for Software Defined Vehicular Networks , 2018, IEEE Network.
[73] Stefan Dziembowski,et al. Proofs of Space , 2015, CRYPTO.
[74] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[75] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[76] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[77] Shanzhi Chen,et al. A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain , 2018, IEEE Access.
[78] Zhu Han,et al. Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).
[79] Michel Raynal,et al. Communication and Agreement Abstractions for Fault-Tolerant Asynchronous Distributed Systems , 2010, Synthesis Lectures on Distributed Computing Theory.
[80] Bogdan Carbunar,et al. Hardening Stratum, the Bitcoin Pool Mining Protocol , 2017, Proc. Priv. Enhancing Technol..
[81] Aggelos Kiayias,et al. Proofs of Work for Blockchain Protocols , 2017, IACR Cryptol. ePrint Arch..
[82] Oded Goldreich,et al. Zero-Knowledge twenty years after its invention , 2002, Electron. Colloquium Comput. Complex..
[83] Yoad Lewenberg,et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..
[84] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[85] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[86] Victor C. M. Leung,et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.
[87] Jagdeep Sidhu,et al. Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[88] Shrisha Rao,et al. Distributed Systems: An Algorithmic Approach , 2008, IEEE Distributed Systems Online.
[89] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[90] Xiang Zhang,et al. BlockNDN: A bitcoin blockchain decentralized system over named data networking , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[91] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[92] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[93] Aggelos Kiayias,et al. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain , 2018, EUROCRYPT.
[94] Victor Shoup,et al. Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.
[95] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[96] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild , 2017, DISC.
[97] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[98] Silvio Micali,et al. Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[99] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[100] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[101] Lei Fan,et al. A Scalable Proof-of-Stake Blockchain in the Open Se ing ∗ ( or , How to Mimic Nakamoto ’ s Design via Proof-of-Stake ) , 2018 .
[102] Zhu Han,et al. Performance Analysis and Application of Mobile Blockchain , 2017, 2018 International Conference on Computing, Networking and Communications (ICNC).
[103] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[104] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.
[105] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[106] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[107] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[108] Hiroyuki Yamada,et al. What’s So Different about Blockchain? — Blockchain is a Probabilistic State Machine , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[109] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[110] Moshe Babaioff,et al. On bitcoin and red balloons , 2011, EC '12.
[111] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[112] A. Poelstra. Distributed Consensus from Proof of Stake is Impossible , 2015 .
[113] F. Richard Yu,et al. Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios , 2010, IEEE Network.
[114] Lin Chen,et al. On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.
[115] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[116] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[117] Gang Chen,et al. Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.
[118] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[119] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[120] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[121] Elaine Shi,et al. Snow White: Provably Secure Proofs of Stake , 2016, IACR Cryptol. ePrint Arch..
[122] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[123] Erik Blasch,et al. Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain , 2018, 2018 IEEE International Smart Cities Conference (ISC2).
[124] Rob Jansen,et al. A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays , 2014 .
[125] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[126] Michael K. Reiter. A Secure Group Membership Protocol , 1996, IEEE Trans. Software Eng..
[127] Robert H. Deng,et al. CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing , 2019, IEEE Transactions on Parallel and Distributed Systems.
[128] Frank Kargl,et al. KopperCoin - A Distributed File Storage with Financial Incentives , 2016, ISPEC.
[129] Carlos V. Rozas,et al. Intel® Software Guard Extensions: EPID Provisioning and Attestation Services , 2016 .
[130] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[131] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[132] Zhu Han,et al. Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.
[133] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[134] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[135] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[136] Nicolas Houy,et al. The Bitcoin Mining Game , 2014, Ledger.
[137] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild (Keynote Talk) , 2017, DISC.
[138] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[139] Cesare Pautasso,et al. A Taxonomy of Blockchain-Based Systems for Architecture Design , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).
[140] Wei Xu,et al. Scaling Nakamoto Consensus to Thousands of Transactions per Second , 2018, ArXiv.
[141] Dusit Niyato,et al. Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.
[142] Kartik Nayak,et al. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus , 2016, ArXiv.
[143] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[144] Elaine Shi,et al. Hybrid Consensus: Efficient Consensus in the Permissionless Model , 2016, DISC.
[145] Davor Svetinovic,et al. Data Analysis of Digital Currency Networks: Namecoin Case Study , 2016, 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS).
[146] Nicolas Houy,et al. It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency , 2014 .
[147] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[148] Warren He,et al. Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.
[149] Björn Tackmann,et al. Moderately Hard Functions: Definition, Instantiations, and Applications , 2017, TCC.
[150] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[151] Song Guo,et al. Big Data Meet Green Challenges: Big Data Toward Green Applications , 2016, IEEE Systems Journal.
[152] Yan Zhang,et al. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.
[153] Peter R. Rizun,et al. Subchains: A Technique to Scale Bitcoin and Improve the User Experience , 2016, Ledger.
[154] Michael Bedford Taylor,et al. The Evolution of Bitcoin Hardware , 2017, Computer.
[155] Dusit Niyato,et al. Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).
[156] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[157] Kun Wang,et al. Intelligent Resource Management in Blockchain-Based Cloud Datacenters , 2018, IEEE Cloud Computing.
[158] Emin Gün Sirer,et al. Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.
[159] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[160] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[161] Jitender S. Deogun,et al. Design and analysis of elastic handoff in cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[162] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[163] Nikos Fotiou,et al. Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[164] Aggelos Kiayias,et al. Edinburgh Research Explorer On Trees, Chains and Fast Transactions in the Blockchain , 2017 .
[165] Ariel Gabizon,et al. Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.
[166] PRADIP KUMAR SHARMA,et al. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.
[167] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[168] Nesrine Kaaniche,et al. A blockchain-based data usage auditing architecture with enhanced privacy and availability , 2017, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA).
[169] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[170] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[171] C. Jaag,et al. The Bitcoin Mining Game: On the Optimality of Honesty in Proof-of-work Consensus Mechanism , 2017 .
[172] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[173] Praveen Gauravaram,et al. LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.
[174] Mehmet A. Orgun,et al. A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services , 2019, IEEE Transactions on Services Computing.
[175] Ghassan O. Karame,et al. Securing Proof-of-Stake Blockchain Protocols , 2017, DPM/CBT@ESORICS.
[176] Hong Li,et al. Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.
[177] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[178] Sushmita Ruj,et al. Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.
[179] Benjamin Aziz,et al. A Temporal Blockchain: A Formal Analysis , 2016, 2016 International Conference on Collaboration Technologies and Systems (CTS).
[180] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[181] Khashayar Kotobi,et al. Blockchain-enabled spectrum access in cognitive radio networks , 2017, 2017 Wireless Telecommunications Symposium (WTS).
[182] Muneeb Ali,et al. Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.
[183] Adam Mackenzie,et al. MRL-0004 Improving Obfuscation in the CryptoNote Protocol , 2015 .
[184] C. Cachin. Yet Another Visit to Paxos , 2010 .
[185] Vitalik Buterin,et al. Casper the Friendly Finality Gadget , 2017, ArXiv.
[186] Fan Zhang,et al. REM: Resource-Efficient Mining for Blockchains , 2017, IACR Cryptol. ePrint Arch..
[187] P. Rizun. A Transaction Fee Market Exists Without a Block Size Limit , 2016 .
[188] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[189] Mehdi Bennis,et al. On-Device Federated Learning via Blockchain and its Latency Analysis , 2018, ArXiv.
[190] Alex Biryukov,et al. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem , 2016, NDSS.
[191] Zekeriya Erkin,et al. Information Propagation on Permissionless Blockchains , 2017, ArXiv.
[192] Marko Vukolic,et al. XFT: Practical Fault Tolerance beyond Crashes , 2015, OSDI.
[193] Sachin Shetty,et al. Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[194] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[195] Zhu Han,et al. When Mobile Blockchain Meets Edge Computing: Challenges and Applications , 2017, ArXiv.
[196] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[197] Florian Glaser,et al. Pervasive Decentralisation of Digital Infrastructures: A Framework for Blockchain enabled System and Use Case Analysis , 2017, HICSS.
[198] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[199] Zhu Han,et al. When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.
[200] Nicolas Herbaut,et al. A Model for Collaborative Blockchain-Based Video Delivery Relying on Advanced Network Services Chains , 2017, IEEE Communications Magazine.
[201] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[202] Michael O. Rabin,et al. Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..
[203] Michael J. Fischer,et al. Scalable Bias-Resistant Distributed Randomness , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[204] J. Aspnes,et al. Exposing Computationally-Challenged Byzantine Impostors , 2005 .
[205] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[206] Pan Hui,et al. FlopCoin: A Cryptocurrency for Computation Offloading , 2018, IEEE Transactions on Mobile Computing.
[207] Georg Fuchsbauer,et al. SpaceMint: A Cryptocurrency Based on Proofs of Space , 2018, ERCIM News.
[208] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.