共 47 条
[21]
An Empirical Analysis of Privacy in the Lightning Network
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I,
2021, 12674
:167-186
[22]
REVIVE: Rebalancing Off-Blockchain Payment Networks
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:439-453
[23]
Khalil Rami, 2018, Paper 2018/642
[24]
THE BYZANTINE GENERALS PROBLEM
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
1982, 4 (03)
:382-401
[25]
Teechain: A Secure Payment Network with Asynchronous Blockchain Access
[J].
PROCEEDINGS OF THE TWENTY-SEVENTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '19),
2019,
:63-79
[26]
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
[J].
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019),
2019,
[27]
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks Not Every Permissionless Payment Network Requires a Blockchain
[J].
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017),
2017,
[28]
Concurrency and Privacy with Payment-Channel Networks
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:455-471
[29]
Matetic S, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P783
[30]
Matetic S, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1289