Recent advances in consensus protocols for blockchain: a survey
暂无分享,去创建一个
Chen Wang | Gaoyang Liu | Shaohua Wan | Meijun Li | Chen Wang | Shaohua Wan | Gaoyang Liu | Meijun Li
[1] Chen Wang,et al. Classifying transportation mode and speed from trajectory data via deep multi-scale learning , 2019, Comput. Networks.
[2] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[3] Lei Zhang,et al. Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment , 2019, IEEE Internet of Things Journal.
[4] Danda B. Rawat,et al. Wireless Network Virtualization by Leveraging Blockchain Technology and Machine Learning , 2019, WiseML@WiSec.
[5] Chen Wang,et al. Trajectory-based multi-dimensional outlier detection in wireless sensor networks using Hidden Markov Models , 2014, Wirel. Networks.
[6] Yang Xu,et al. A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.
[7] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[8] Qiang Ni,et al. Cognitive computing and wireless communications on the edge for healthcare service robots , 2020, Comput. Commun..
[9] Wei Cai,et al. Proof-of-Play: A Novel Consensus Model for Blockchain-based Peer-to-Peer Gaming System , 2019, BSCI.
[10] Tong Shen,et al. Proof of Sincerity: A New Lightweight Consensus Approach for Mobile Blockchains , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[11] Cong Wang,et al. Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[12] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[13] Chen Wang,et al. SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[14] Chen Wang,et al. ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.
[15] Nicolas Houy,et al. It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency , 2014 .
[16] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[17] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[18] Butler W. Lampson,et al. How to Build a Highly Available System Using Consensus , 1996, WDAG.
[19] Chen Wang,et al. SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks , 2017, IEEE Transactions on Mobile Computing.
[20] John Tromp,et al. Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work , 2015, Financial Cryptography Workshops.
[21] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[22] Elaine Shi,et al. The Sleepy Model of Consensus , 2017, ASIACRYPT.
[23] Elaine Shi,et al. Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..
[24] Chen Wang,et al. CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.
[25] Jie Fan,et al. Research on the Technologies of Byzantine System: Research on the Technologies of Byzantine System , 2014 .
[26] Aggelos Kiayias,et al. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..
[27] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[28] Yueshen Xu,et al. QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..
[29] Yueshen Xu,et al. Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.
[30] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[31] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.
[32] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[33] Yu Wang,et al. Mitigating Interference via Power Control for Two-Tier Femtocell Networks: A Hierarchical Game Approach , 2019, IEEE Transactions on Vehicular Technology.
[34] Qian He,et al. Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.
[35] Leslie Lamport,et al. Proving the Correctness of Multiprocess Programs , 1977, IEEE Transactions on Software Engineering.
[36] Fan Jie. Research on the Technologies of Byzantine System , 2013 .
[37] Andrew S. Tanenbaum,et al. Distributed systems: Principles and Paradigms , 2001 .
[38] Eric Wustrow,et al. DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work , 2016, WOOT.
[39] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[40] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[41] Lin Chen,et al. On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.
[42] Yu Wang,et al. Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks , 2018, IEEE Internet of Things Journal.
[43] Fabian Schuh,et al. BITSHARES 2.0: FINANCIAL SMART CONTRACT PLATFORM , 2015 .
[44] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[45] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[46] Yucong Duan,et al. Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..
[47] Leandro Navarro-Moldes,et al. Towards Blockchain-enabled Wireless Mesh Networks , 2018, CRYBLOCK@MobiSys.
[48] Honghao Gao,et al. Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba’s Yu’e Bao , 2018, IEEE Transactions on Computational Social Systems.
[49] Kyungbaek Kim,et al. A Survey about Consensus Algorithms Used in Blockchain , 2018, J. Inf. Process. Syst..
[50] Xiaolong Xu,et al. Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks , 2019, The Journal of Supercomputing.
[51] Warren He,et al. Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.
[52] A.W.G. de Vries. Bitcoin's Growing Energy Problem , 2018 .
[53] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[54] Aggelos Kiayias,et al. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain , 2018, EUROCRYPT.
[55] Geyong Min,et al. Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks , 2018, IEEE Transactions on Mobile Computing.
[56] Elaine Shi,et al. Snow White: Provably Secure Proofs of Stake , 2016, IACR Cryptol. ePrint Arch..
[57] Chen Wang,et al. Slide: Towards Fast and Accurate Mobile Fingerprinting for Wi-Fi Indoor Positioning Systems , 2018, IEEE Sensors Journal.
[58] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .