On BlockChain Technology: Overview of Bitcoin and Future Insights
暂无分享,去创建一个
Abed Ellatif Samhat | Ahmed Serhrouchni | Maroun Chamoun | Hussein El Ghor | Hussein Hellani | A. Serhrouchni | A. Samhat | M. Chamoun | Hussein Hellani
[1] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[2] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] A. Narayanan,et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .
[5] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[6] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[7] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[8] Michael S. Kester,et al. Bitcoin Transaction Graph Analysis , 2015, ArXiv.
[9] Nicolas Courtois,et al. On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies , 2014, ArXiv.
[10] Joshua A. Kroll,et al. Securing Bitcoin wallets via threshold signatures , 2014 .
[11] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[12] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[13] .. Massias,et al. DESIGN OF A SECURE TIMESTAMPING SERVICEWITH MINIMAL TRUST REQUIREMENTH , 1999 .
[14] Christian Decker,et al. BlueWallet: The Secure Bitcoin Wallet , 2014, STM.
[15] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[16] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[17] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[18] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[19] Ronald L. Rivest,et al. Peppercoin Micropayments , 2004, Financial Cryptography.
[20] Berry Schoenmakers,et al. Security Aspects of the EcashTM Payment System , 1997, State of the Art in Applied Cryptography.
[21] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[22] Dennis Shasha,et al. The many faces of consensus in distributed systems , 1992, Computer.