暂无分享,去创建一个
[1] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[2] Michael T. Goodrich,et al. Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.
[3] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[4] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[5] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[6] Andreas Haeberlen,et al. The Case for Byzantine Fault Detection , 2006, HotDep.
[7] Elaine Shi,et al. Authenticated data structures, generically , 2014, POPL.
[8] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[9] Victor Shoup,et al. Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.
[10] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[11] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[12] Jeffrey S. Chase,et al. The role of accountability in dependable distributed systems , 2005 .
[13] Jagan Singh Meena,et al. Overview of emerging nonvolatile memory technologies , 2014, Nanoscale Research Letters.
[14] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[15] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[16] Andreas Haeberlen,et al. PeerReview: practical accountability for distributed systems , 2007, SOSP.
[17] Michael K. Reiter,et al. How to securely replicate services , 1992, TOPL.