暂无分享,去创建一个
[1] Jim Gray,et al. The Transaction Concept: Virtues and Limitations (Invited Paper) , 1981, VLDB.
[2] Divyakant Agrawal,et al. Atomic commitment across blockchains , 2019, Proc. VLDB Endow..
[3] Alexander Lipton,et al. Blockchain and Distributed Ledgers - Mathematics, Technology, and Economics , 2021, Blockchain and Distributed Ledgers.
[4] Thomas Hardjono,et al. Blockchain Gateways, Bridges and Delegated Hash-Locks , 2021, ArXiv.
[5] Giulio Caldarelli,et al. Understanding the Blockchain Oracle Problem: A Call for Action , 2020, Inf..
[6] Maurice Herlihy,et al. Blockchains from a distributed computing perspective , 2019, Commun. ACM.
[7] Maurice Herlihy,et al. Adding Concurrency to Smart Contracts , 2017, PODC.
[8] Patrick Valduriez,et al. Principles of distributed database systems (2nd ed.) , 1999 .
[9] Michael J. Coblenz. Obsidian: A Safer Blockchain Programming Language , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[10] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[11] Eve Maler,et al. Decentralized Identity: Where Did It Come From and Where Is It Going? , 2019, IEEE Commun. Stand. Mag..
[12] Fredrik Milani,et al. Blockchain Oracles: A Framework for Blockchain-Based Applications , 2020, BPM.
[13] Cyril S. Ku,et al. Design Patterns , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[14] Alex Pentland,et al. Toward an Interoperability Architecture for Blockchain Autonomous Systems , 2020, IEEE Transactions on Engineering Management.
[15] Liuba Shrira,et al. Cross-chain deals and adversarial commerce , 2019, The VLDB Journal.
[16] Stefan Sauer,et al. Crypto-Assets: Implications for Financial Stability, Monetary Policy, and Payments and Market Infrastructures , 2019, SSRN Electronic Journal.
[17] Thomas Hardjono,et al. Federated Authorization over Access to Personal Data for Decentralized Identity Management , 2019, IEEE Communications Standards Magazine.
[18] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[19] Dan Boneh. Solidity , 1973 .
[20] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[21] Alexei Zamyatin,et al. XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[22] 簡聰富,et al. 物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .
[23] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[24] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[25] William Stallings,et al. PGP Message Exchange Formats , 1996, RFC.
[26] Andreas Reuter,et al. Principles of transaction-oriented database recovery , 1983, CSUR.
[27] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[28] dizayn İç dekor. Design by Contract , 2010 .
[29] Divyakant Agrawal,et al. Towards Global Asset Management in Blockchain Systems , 2019, ArXiv.
[30] Warwick Ford,et al. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 2003, RFC.