Beyond Bitcoin - Part I: A critical look at blockchain-based systems
暂无分享,去创建一个
[1] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[2] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[3] H. Viswanathan,et al. THE FUTURE of THE INTERNET of THINGS , 2016 .
[4] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] R. Weber. Internet Corporation For Assigned Names And Numbers , 2010 .
[7] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[8] Colin Percival. STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .
[9] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[10] Primavera De Filippi,et al. Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .
[11] A. Takura,et al. A secure and trusted time stamping authority , 1999, 1999 Internet Workshop. IWS99. (Cat. No.99EX385).
[12] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[13] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[14] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[15] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[16] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[17] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[18] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[19] G. Laccetti,et al. Brute force attacks on hash functions , 2007 .
[20] Hermann Kopetz,et al. Real-time systems , 2018, CSC '73.
[21] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[22] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.