Realizing privacy aspects in blockchain networks
暂无分享,去创建一个
[1] Silvio Micali,et al. Computationally Sound Proofs , 2000, SIAM J. Comput..
[2] Tal Z. Zarsky,et al. Incompatible: The GDPR in the Age of Big Data , 2017 .
[3] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[4] J. Gans,et al. Some simple economics of the blockchain , 2016, Commun. ACM.
[5] Prateek Saxena,et al. Obscuro: A Bitcoin Mixer using Trusted Execution Environments , 2018, IACR Cryptol. ePrint Arch..
[6] S. Matthew Weinberg,et al. Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.
[7] Pawel Rotter,et al. RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.
[8] Jens Groth,et al. Short Non-interactive Zero-Knowledge Proofs , 2010, ASIACRYPT.
[9] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[10] Thomas N. Theis,et al. The End of Moore's Law: A New Beginning for Information Technology , 2017, Computing in Science & Engineering.
[11] Eli Ben-Sasson,et al. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture , 2014, USENIX Security Symposium.
[12] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[13] Ghassan O. Karame,et al. On the privacy provisions of Bloom filters in lightweight bitcoin clients , 2014, IACR Cryptol. ePrint Arch..
[14] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[15] J. Slemrod,et al. Taxes on the Internet: Deterrence Effects of Public Disclosure , 2013, SSRN Electronic Journal.
[16] Martin Hirt,et al. Perfectly-Secure MPC with Linear Communication Complexity , 2008, TCC.
[17] Jason Teutsch,et al. A scalable verification solution for blockchains , 2019, ArXiv.
[18] Anuraag A Vazirani,et al. Blockchain vehicles for efficient Medical Record management , 2020, npj Digital Medicine.
[19] Emmanuel Stapf,et al. Trusted Execution Environments: Properties, Applications, and Challenges , 2020, IEEE Security & Privacy.
[20] Michael Friedewald,et al. Seven Types of Privacy , 2013, European Data Protection.
[21] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[22] Pedro Moreno-Sanchez,et al. SoK: Layer-Two Blockchain Protocols , 2020, Financial Cryptography.
[23] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[24] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[25] Yuval Ishai,et al. On Efficient Zero-Knowledge PCPs , 2012, TCC.
[26] Fan Zhang,et al. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[27] Carsten Lund,et al. Proof verification and the hardness of approximation problems , 1998, JACM.
[28] Steve Kremer,et al. An Extensive Formal Analysis of Multi-factor Authentication Protocols , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[29] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[30] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[31] Janet Zandy. Universal Declaration of Human Rights , 2019, Radical Teacher.
[32] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.