共 20 条
[11]
Jia X., Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage, IACR Cryptology ePrint Archive, (2016)
[12]
Jia Y., Tople S., Moataz T., Gong D., Saxena P., Liang Z., Robust Synchronous P2P Primitives Using SGX Enclaves, (2017)
[13]
Johnson S., Scarlata V., Rozas C., Brickell E., Mckeen F., Intel Software Guard Extensions: EPID Provisioning and Attestation Services, (2016)
[14]
Lind J., Eyal I., Pietzuch P., Sirer E.G., Teechan: Payment Channels Using Trusted Execution Environments, (2016)
[15]
McKeen F., Alexandrovich I., Berenzon A., Rozas C.V., Shafi H., Shanbhogue V., Savagaonkar U.R., Innovative instructions and software model for isolated execution, HASP@ISCA, (2013)
[16]
Milutinovic M., He W., Wu H., Kanwal M., Proof of luck: an efficient blockchain consensus protocol, Proceedings of the 1st Workshop on System Software for Trusted Execution, (2016)
[17]
Nakamoto S., Bitcoin: A Peer-to-Peer Electronic Cash System, (2008)
[18]
Pretre B., Attacks on Peer-to-Peer Networks, (2005)
[19]
van Renesse R., A Blockchain Based on Gossip?, (2017)
[20]
Walport M., Distributed Ledger Technology: Beyond Blockchain, (2016)