Simulation of transaction malleability attack for blockchain-based e-Voting
暂无分享,去创建一个
[1] Khaled Salah,et al. Monetization of IoT data using smart contracts , 2019, IET Networks.
[2] Feng Hao,et al. A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.
[3] Marcin Andrychowicz,et al. On the Malleability of Bitcoin Transactions , 2015, Financial Cryptography Workshops.
[4] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[5] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[6] Feng Hao,et al. Anonymous voting by two-round public discussion , 2010, IET Inf. Secur..
[7] Feng Hao,et al. Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting , 2014, EVT/WOTE.
[8] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[9] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[10] T.-H. Hubert Chan,et al. How to Vote Privately Using Bitcoin , 2015, ICICS.
[11] Heekuck Oh,et al. A Solution towards Eliminating Transaction Malleability in Bitcoin , 2018, J. Inf. Process. Syst..
[12] Aggelos Kiayias,et al. Self-tallying Elections and Perfect Ballot Secrecy , 2002, Public Key Cryptography.
[13] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[14] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[15] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[16] Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..
[17] Jon Crowcroft,et al. Trustworthy Electronic Voting Using Adjusted Blockchain Technology , 2019, IEEE Access.
[18] Muhammad Mubashir Khan,et al. Secure Digital Voting System Based on Blockchain Technology , 2018, Int. J. Electron. Gov. Res..
[19] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[20] Khaled Salah,et al. Decentralized document version control using ethereum blockchain and IPFS , 2019, Comput. Electr. Eng..
[21] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.