暂无分享,去创建一个
[1] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[2] Jan A. Bergstra,et al. Instruction sequence processing operators , 2009, Acta Informatica.
[3] Jan A. Bergstra,et al. Programming an Interpreter Using Molecular Dynamics , 2008, Sci. Ann. Comput. Sci..
[4] Jan A. Bergstra,et al. Transmission Protocols for Instruction Streams , 2009, ICTAC.
[5] A. Barros,et al. A constructive version of AIP revisited , 2008 .
[6] Jan A. Bergstra,et al. Instruction sequences and non-uniform complexity theory , 2008, ArXiv.
[7] Martin Doerr,et al. Information Carriers and Identification of Information Objects: An Ontological Approach , 2012, ArXiv.
[8] Jan A. Bergstra,et al. Bitcoin and Beyond: Exclusively Informational Monies , 2013, ArXiv.
[9] Nikolei M. Kaplanov. Nerdy Money: Bitcoin, the Private Digital Currency, and the Case Against Its Regulation , 2012 .
[10] Jan A. Bergstra,et al. Timed Tuplix Calculus and the Wesseling and van den Bergh Equation , 2009, Sci. Ann. Comput. Sci..
[11] Jan A. Bergstra,et al. Thread Extraction for Polyadic Instruction Sequences , 2008, Sci. Ann. Comput. Sci..
[12] 廖宏梓,et al. On the Elliptic Curve Digital Signature Algorithm , 2006 .
[13] E. Anderson. Is women's labor a commodity? , 1990, Philosophy & public affairs.
[14] Luciano Floridi,et al. What is the Philosophy of Information , 2002 .
[15] John Frow,et al. Information as gift and commodity , 1996 .
[16] Jan A. Bergstra,et al. Outsourcing Competence , 2011, ArXiv.
[17] Elke Greifender,et al. The History of Information Security: A Comprehensive Handbook , 2008 .
[18] Karl Maria,et al. The History of Information Security: A Comprehensive Handbook , 2007 .
[19] Jan A. Bergstra,et al. Partial Komori fields and imperative Komori fields , 2009, ArXiv.
[20] R. Epstein. Possession as the Root of Title , 1979 .
[21] T. Merrill. Property and the Right to Exclude , 1998 .
[22] Joseph P. Kopachevsky,et al. Interpretations of tourism as commodity. , 1994 .
[23] Pieter W. Adriaans,et al. Philosophy of information , 2008 .
[24] B. Maurer,et al. “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin , 2013 .
[25] Chris Christensen. Review of The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra , 2008, Cryptologia.
[26] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[27] Jerry Brito,et al. Bitcoin: A Primer for Policymakers , 2016 .
[28] Brian P. Hanley,et al. The False Premises and Promises of Bitcoin , 2013, ArXiv.
[29] Jan A. Bergstra,et al. Meadow Enriched ACP Process Algebras , 2009, ArXiv.
[30] Angela Rogojanu,et al. The issue of competing currencies. Case study – Bitcoin , 2014 .
[31] Jan A. Bergstra,et al. Questions related to Bitcoin and other Informational Money , 2013, ArXiv.
[32] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[33] M. Herrmann. Implementation, evaluation and detection of a doublespend-attack on Bitcoin , 2012 .
[34] H. Williams. Kant's Concept of Property , 1977 .
[35] Reuben Grinberg. Bitcoin: An Innovative Alternative Digital Currency , 2011 .
[36] Jan A. Bergstra,et al. Autosolvability of halting problem instances for instruction sequences , 2009, ArXiv.
[37] David I. Spivak. Ologs: A Categorical Framework for Knowledge Representation , 2011, PloS one.
[38] Jan A. Bergstra,et al. Formaleuros, formalcoins and virtual monies , 2010, ArXiv.
[39] Jan A. Bergstra,et al. Instruction sequence expressions for the secure hash algorithm SHA-256 , 2013, ArXiv.
[40] Profit-Driven Abuses of Virtual Currencies , 2013 .
[41] Jan A. Bergstra,et al. The rational numbers as an abstract data type , 2007, JACM.
[42] Jan A. Bergstra,et al. Instruction sequence notations with probabilistic instructions , 2009, ArXiv.
[43] Jan A. Bergstra,et al. Inversive meadows and divisive meadows , 2009, J. Appl. Log..
[44] Kees Middelburg,et al. Interest Prohibition and Financial Product Innovation , 2011, 1104.2471.
[45] Michael Uschold,et al. The Enterprise Ontology , 1998, The Knowledge Engineering Review.
[46] Sami Al‐Suwailem. Preliminaries to an Investigation of Reduced Product Set Finance , 2011 .
[47] Jan A. Bergstra,et al. A static theory of promises , 2008, ArXiv.
[48] Nicolas Courtois,et al. The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining , 2013, ArXiv.
[49] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[50] Ian Horrocks,et al. From SHIQ and RDF to OWL: the making of a Web Ontology Language , 2003, J. Web Semant..
[51] Raymond T. Nimmer,et al. Information as a Commodity: New Imperatives of Commercial Law , 1992 .
[52] Jan A. Bergstra. Informaticology: combining Computer Science, Data Science, and Fiction Science , 2012, ArXiv.
[53] Jan A. Bergstra,et al. On the Expressiveness of Single-Pass Instruction Sequences , 2010, Theory of Computing Systems.
[54] Ellen G. Detlefsen. User costs: Information as a social good vs. information as a commodity , 1984 .