暂无分享,去创建一个
[1] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[2] Jonathan Katz,et al. Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions , 2011, TCC.
[3] David Bollier. Reinventing law for the commons , 2017 .
[4] Peeter Laud,et al. Preprocessing Based Verification of Multiparty Protocols with Honest Majority , 2015, Proc. Priv. Enhancing Technol..
[5] Bela Gipp,et al. Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain , 2016, MCIS.
[6] Kaji Yuichi,et al. The Bitcoin Network as Platform for Trans-Organizational Attribute Authentication , 2015 .
[7] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[8] Ariel Ekblaw,et al. MedRec: Medical Data Management on the Blockchain , 2016 .
[9] Jeff M. Phillips,et al. Chernoff-Hoeffding Inequality and Applications , 2012, ArXiv.
[10] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[11] Conrad C. Huang,et al. UCSF Chimera—A visualization system for exploratory research and analysis , 2004, J. Comput. Chem..
[12] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[13] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[14] Robert R. Downs,et al. The importance of data set provenance for science , 2015 .
[15] Marc Buyse,et al. Data fraud in clinical trials. , 2015, Clinical investigation.
[16] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[17] Carole A. Goble,et al. Micropublications: a semantic model for claims, evidence, arguments and annotations in biomedical communications , 2013, Journal of Biomedical Semantics.
[18] Peter Linder. DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors , 2016, IACR Cryptol. ePrint Arch..
[19] Sachin Shetty,et al. ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).