共 190 条
[1]
Abadi M., Burrows M., Manasse M., Wobber T., Moderately hard, memory-bound functions, ACM Transactions on Internet Technology (TOIT), 5, 2, pp. 299-327, (2005)
[2]
Abliz M., Znati T., A guided tour puzzle for denial of service prevention, 2009 Annual Computer Security Applications Conference, pp. 279-288, (2009)
[3]
Akcora C.G., Gel Y.R., Kantarcioglu M., Blockchain networks: data structures of bitcoin, monero, zcash, ethereum, ripple, and iota, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 12, 1, (2022)
[4]
Al-Bassam M., SCPKI: A smart contract-based PKI and identity system, Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35-40, (2017)
[5]
Altarawneh A., Herschberg T., Medury S., Kandah F., Skjellum A., Buterin’s scalability trilemma viewed through a state-change-based classification for common consensus algorithms, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0727-0736, (2020)
[6]
Alturki M.A., Chen J., Luchangco V., Moore B., Palmskog K., Pena L., Rosu G., Towards a verified model of the Algorand consensus protocol in Coq, Formal Methods. FM 2019 International Workshops, pp. 362-367, (2019)
[7]
Androulaki E., Barger A., Bortnikov V., Cachin C., Christidis K., De Caro A., Enyeart D., Et al., Hyperledger fabric: a distributed operating system for permissioned blockchains, Proceedings of the Thirteenth EuroSys conference, pp. 1-15, (2018)
[8]
Arroyo-Figueroa J.A., MiftyCoin (MFT): a cryptocurrency mined with proof of human work, (2022)
[9]
Azaria A., Ekblaw A., Vieira T., Lippman A., Medrec: using blockchain for medical data access and permission management, 2016 2nd International Conference on Open and Big Data (OBD), pp. 25-30, (2016)
[10]
Azouvi S., Danezis G., Nikolaenko V., Winkle: foiling long-range attacks in proof-of-stake systems, Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 189-201, (2020)