Cryptographic Currencies Crash Course (C4): Tutorial
暂无分享,去创建一个
[1] Dragos Velicanu,et al. A Decentralized Public Key Infrastructure with Identity Retention , 2014, IACR Cryptol. ePrint Arch..
[2] Jeremy Clark,et al. A first look at the usability of bitcoin key management , 2018, ArXiv.
[3] Moshe Babaioff,et al. On Bitcoin and red balloons , 2011, SECO.
[4] Joint Task Force on Computing Curricula. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science , 2013 .
[5] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[6] Andrew Miller,et al. Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .
[7] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[8] Jeremy Clark,et al. Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.
[9] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[10] J. D. Bruce. Purely P2P Crypto-Currency With Finite Mini-Blockchain , 2013 .
[11] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[12] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[13] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[14] Abhi Shelat,et al. Micropayments for Decentralized Currencies , 2015, IACR Cryptol. ePrint Arch..
[15] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[16] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[17] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[18] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[19] Aniket Kate,et al. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.
[20] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[21] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[22] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[23] Gus Gutoski,et al. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage , 2015, Financial Cryptography.
[24] Sally Fincher,et al. Computer Science Curricula 2013 , 2013 .
[25] A. Narayanan,et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .
[26] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[27] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[28] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[29] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[30] Christian Decker,et al. Making Bitcoin Exchanges Transparent , 2015, ESORICS.
[31] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[32] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[33] T. Maugh. Why buy when you can rent? , 1984, Science.