Scripting smart contracts for distributed ledger technology
暂无分享,去创建一个
[1] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[2] Simon L. Peyton Jones,et al. Composing contracts: an adventure in financial engineering (functional pearl) , 2000, ICFP '00.
[3] Matthias Radestock,et al. A Reflective Higher-order Calculus , 2005, FInCo@ETAPS.
[4] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[5] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Andreas M. Antonopoulos,et al. Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .
[7] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[9] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[10] L. Goodman,et al. Tezos : A Self-Amending Crypto-Ledger Position Paper , 2014 .
[11] Jon Howell,et al. Geppetto: Versatile Verifiable Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] Karl Crary,et al. Peer-to-peer affine commitment using bitcoin , 2015, PLDI.
[14] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[15] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[16] Guido Governatori,et al. Evaluation of Logic-Based Smart Contracts for Blockchain Systems , 2016, RuleML.
[17] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[18] Jan Mendling,et al. Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.
[19] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[20] Alin Deutsch,et al. Towards a Shared Ledger Business Collaboration Language Based on Data-Aware Processes , 2016, ICSOC.
[21] Cécile Pierrot,et al. Malleability of the blockchain’s entropy , 2016, Cryptography and Communications.
[22] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.