Blockchain for the Internet of Things: A systematic literature review
暂无分享,去创建一个
[1] L. Ren. Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .
[2] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[3] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[5] Measuring the Information Society Report , 2015 .
[6] Jordi Herrera-Joancomartí,et al. Research and Challenges on Bitcoin Anonymity , 2014, DPM/SETOP/QASA.
[7] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[8] David Vandervort,et al. Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System , 2014, Financial Cryptography Workshops.
[9] Muneeb Ali,et al. Blockstack: Design and Implementation of a Global Naming System with Blockchains , 2016 .
[10] Gareth W. Peters,et al. Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money , 2015, ArXiv.
[12] Dragos Velicanu,et al. CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .
[13] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[14] Goutam Paul,et al. Towards a More Democratic Mining in Bitcoins , 2014, ICISS.
[15] Yu Zhang,et al. An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[16] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[17] Norman Meuschke,et al. Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.
[18] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[19] Sebastian Feld,et al. Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.
[20] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[21] Giuseppe Ateniese,et al. From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain , 2015, NSS.
[22] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[23] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[24] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[25] Trond Hønsi. SpaceMint - A Cryptocurrency Based on Proofs of Space , 2017 .
[26] Brian Neil Levine,et al. Sybil-Resistant Mixing for Bitcoin , 2014, WPES.
[27] Alan T. Litchfield,et al. A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology , 2015, ACSC.
[28] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[29] Louise Axon,et al. Privacy-awareness in blockchain-based PKI , 2015 .
[30] Luke Valenta,et al. Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.
[31] Jega Anish Dev. Bitcoin mining acceleration and performance quantification , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[32] Dominic Wörner,et al. When your sensor earns money: exchanging data for cash with Bitcoin , 2014, UbiComp Adjunct.
[33] Ian Goldberg,et al. Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage , 2017, Financial Cryptography.
[34] Ethan Heilman,et al. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.
[35] Michael T. Goodrich,et al. Accountable Storage , 2014, ACNS.