FalconDB: Blockchain-based Collaborative Database
暂无分享,去创建一个
Yanqing Peng | Min Du | Feifei Li | Raymond Cheng | Dawn Song | D. Song | Raymond Cheng | Feifei Li | Yanqing Peng | Min Du
[1] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[2] Roberto Tamassia,et al. Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.
[3] Jonathan Lee,et al. Veritas: Shared Verifiable Databases and Tables in the Cloud , 2019, CIDR.
[4] Hicham G. Elmongui,et al. Secure supply-chain protocols , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[5] Ying-Chang Liang,et al. A Survey on Applications of Game Theory in Blockchain , 2019, ArXiv.
[6] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[7] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[8] Mikhail J. Atallah,et al. Private collaborative forecasting and benchmarking , 2004, WPES '04.
[9] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[10] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[11] Emin Gün Sirer,et al. A vision for autonomous blockchains backed by secure hardware , 2019, SysTEX '19.
[12] Kuang-Ching Wang,et al. The Design and Operation of CloudLab , 2019, USENIX ATC.
[13] Philippe Camacho,et al. On the Impossibility of Batch Update for Cryptographic Accumulators , 2010, LATINCRYPT.
[14] Yin Yang,et al. Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.
[15] Michael T. Goodrich,et al. Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems , 2009, Algorithmica.
[16] George Danezis,et al. Chainspace: A Sharded Smart Contracts Platform , 2017, NDSS.
[17] Feifei Li,et al. Authenticated Index Structures for Aggregation Queries , 2010, TSEC.
[18] Omer Paneth,et al. Verifiable Set Operations over Outsourced Databases , 2014, IACR Cryptol. ePrint Arch..
[19] Kevin Crowston,et al. From Conservation to Crowdsourcing: A Typology of Citizen Science , 2011, 2011 44th Hawaii International Conference on System Sciences.
[20] Wei Xu,et al. Scaling Nakamoto Consensus to Thousands of Transactions per Second , 2018, ArXiv.
[21] Ken Eguro,et al. Concerto: A High Concurrency Key-Value Store with Integrity , 2017, SIGMOD Conference.
[22] Michael J. Pazzani,et al. Learning Collaborative Information Filters , 1998, ICML.
[23] Elaine Shi,et al. Authenticated data structures, generically , 2014, POPL.
[24] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[25] Jianliang Xu,et al. GEM^2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[26] Cong Wang,et al. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[27] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[28] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.
[29] Shouhuai Xu,et al. Efficient query integrity for outsourced dynamic databases , 2012, CCSW '12.
[30] Ittai Abraham,et al. HotStuff: BFT Consensus with Linearity and Responsiveness , 2019, PODC.
[31] Jonathan Katz,et al. IntegriDB: Verifiable SQL for Outsourced Databases , 2015, CCS.
[32] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[33] Stavros Papadopoulos,et al. Taking Authenticated Range Queries to Arbitrary Dimensions , 2014, CCS.
[34] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[35] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[36] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[37] Jonathan Katz,et al. vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[38] Jianliang Xu,et al. vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases , 2018, SIGMOD Conference.
[39] Jonathan Katz,et al. ALITHEIA: Towards Practical Verifiable Graph Processing , 2014, CCS.
[40] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[41] Elaine Shi,et al. TRUESET: Faster Verifiable Set Computations , 2014, USENIX Security Symposium.
[42] Ethan Buchman,et al. The latest gossip on BFT consensus , 2018, ArXiv.
[43] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[44] Yoad Lewenberg,et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..
[45] George Danezis,et al. ZQL: A Compiler for Privacy-Preserving Data Processing , 2013, USENIX Security Symposium.
[46] Michael J. Fischer,et al. Scalable Bias-Resistant Distributed Randomness , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[47] Feifei Li,et al. Solar: Towards a Shared-Everything Database on Distributed Log-Structured Storage , 2018, USENIX Annual Technical Conference.
[48] Roberto Tamassia,et al. Practical Authenticated Pattern Matching with Optimal Proof Size , 2015, Proc. VLDB Endow..