An Experimental Investigation Into the Hash Functions Used in Blockchains
暂无分享,去创建一个
Wei Zheng | Yijiang Chen | Bugingo Emmanuel | Ruochen Wang | Akindipe Olusegun Francis | Fuqin Wang | Jinjun Chen | Wei Zheng | Yijiang Chen | Ruochen Wang | Jinjun Chen | B. Emmanuel | Fuqin Wang
[1] Roula A. J. Kadhim,et al. Incorporating SHA-2 256 with OFB to realize a novel encryption method , 2015, 2015 World Symposium on Computer Networks and Information Security (WSCNIS).
[2] Andrew Newman,et al. Cryptocurrencies as Distributed Community Experiments , 2015 .
[3] Jarek Nabrzyski,et al. A Comparative Evaluation of Blockchain Systems for Application Sharing Using Containers , 2017, 2017 IEEE 13th International Conference on e-Science (e-Science).
[4] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[5] Jinjun Chen,et al. Host-Based Intrusion Detection System with System Calls , 2018, ACM Comput. Surv..
[6] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[7] Jianming Zhu,et al. Research on the Security Criteria of Hash Functions in the Blockchain , 2018, BCC '18.
[8] Elif Bilge Kavun,et al. A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications , 2010, RFIDSec.
[9] MurvayPal-Stefan,et al. Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms , 2013 .
[10] Jagdish Bhatta,et al. Performance Analysis of Sha-2 and Sha-3 Finalists , 2013 .
[11] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[12] Sachin Shetty,et al. CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).
[13] Sungwon Kang,et al. Poster: Architecture Reconstruction and Evaluation of Blockchain Open Source Platform , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).
[14] Roberto Baldoni,et al. A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database , 2017, 2017 13th European Dependable Computing Conference (EDCC).
[15] Ali Dehghantanha,et al. Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security , 2018, ICBC.
[16] Qassim Nasir,et al. Performance Analysis of Hyperledger Fabric Platforms , 2018, Secur. Commun. Networks.
[17] Jinjun Chen,et al. Hybrid multi-objective cuckoo search with dynamical local search , 2017, Memetic Computing.
[18] Jiann-Min Yang,et al. Bibliometrics-based evaluation of the Blockchain research trend: 2008 – March 2017 , 2018, Technol. Anal. Strateg. Manag..
[19] Guido Governatori,et al. Evaluation of Logic-Based Smart Contracts for Blockchain Systems , 2016, RuleML.
[20] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[21] Hsing-Chung Chen,et al. A Cooperative Evaluation Approach Based on Blockchain Technology for IoT Application , 2018, IMIS.
[22] Jinjun Chen,et al. Detection of Malicious Code Variants Based on Deep Learning , 2018, IEEE Transactions on Industrial Informatics.
[23] Anastas Mishev,et al. Blockchain Implementation Quality Challenges: A Literature Review , 2017, SQAMIA.
[24] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild , 2017, DISC.
[25] Roberto Baldoni,et al. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.
[26] Zhu Han,et al. Performance Analysis and Application of Mobile Blockchain , 2017, 2018 International Conference on Computing, Networking and Communications (ICNC).
[27] David Metcalf,et al. The Hyperledger Project , 2017 .
[28] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.
[29] Jacky Akoka,et al. A Method for Emerging Technology Evaluation. Application to Blockchain and Smart Data Discovery , 2017, Conceptual Modeling Perspectives.
[30] Dmitry Khovratovich,et al. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family , 2012, IACR Cryptol. ePrint Arch..
[31] Alan Fekete,et al. The Cost of Serializability on Platforms That Use Snapshot Isolation , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[32] Beng Chin Ooi,et al. BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.
[33] Jinjun Chen,et al. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..
[34] Suporn Pongnumkul,et al. Performance Analysis of Private Blockchain Platforms in Varying Workloads , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[35] Bogdan Groza,et al. Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms , 2013, Int. J. Secur. Softw. Eng..
[36] Xiangjian He,et al. P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications , 2019, IEEE Journal on Selected Areas in Communications.
[37] Jeremy Rubin,et al. BTCSpark : Scalable Analysis of the Bitcoin Blockchain using Spark , 2015 .
[38] Ingo Weber,et al. Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).
[39] Cesare Pautasso,et al. A Taxonomy of Blockchain-Based Systems for Architecture Design , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).
[40] Johannes Behl,et al. Scalable BFT for Multi-Cores: Actor-Based Decomposition and Consensus-Oriented Parallelization , 2014, HotDep.
[41] Roman Beck,et al. Beyond Bitcoin: The Rise of Blockchain World , 2018, Computer.
[42] Reuben Grinberg. Bitcoin: An Innovative Alternative Digital Currency , 2011 .