Efficient topology control of blockchain peer to peer network based on SDN paradigm
暂无分享,去创建一个
[1] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[4] Zibin Zheng,et al. Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.
[5] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[6] Jiaqi Yan,et al. Overview of business innovations and research opportunities in blockchain and introduction to the special issue , 2016, Financial Innovation.
[7] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[8] Laurent Lefèvre,et al. A survey on techniques for improving the energy efficiency of large-scale distributed systems , 2014, ACM Comput. Surv..
[9] Aleksandr Ometov,et al. An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future Trends , 2020, IEEE Access.
[10] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[11] Mudhakar Srivatsa,et al. Large Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing , 2006, IEEE Transactions on Parallel and Distributed Systems.
[12] Yingjie Wang,et al. A Survey on Privacy Protection of Blockchain: The Technology and Application , 2020, IEEE Access.
[13] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[14] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[15] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[16] Aggelos Kiayias,et al. Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..
[17] Alan M. Frieze,et al. The diameter of randomly perturbed digraphs and some applications , 2007, International Workshop and International Workshop on Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques.
[18] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[19] Jorge Bernal Bernabe,et al. Privacy-Preserving Solutions for Blockchain: Review and Challenges , 2019, IEEE Access.
[20] Ying Zhao,et al. EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts , 2018, IEEE Internet of Things Journal.
[21] Lin Chen,et al. On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.
[22] Alexandru Lavric,et al. Long Range SigFox Communication Protocol Scalability Analysis Under Large-Scale, High-Density Conditions , 2019, IEEE Access.
[23] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[24] Hakim Badis,et al. PulSec: Secure Element based framework for sensors anomaly detection in Industry 4.0 , 2019 .