共 55 条
[1]
Albertini A, 2022, 31 USENIX SEC S USEN, P3291
[2]
Alizadeh F, 2019, P MENSCH COMPUTER 20, P811, DOI DOI 10.1145/3340764.3344913
[3]
Blockchain Vulnerabilities in Practice
[J].
DIGITAL THREATS: RESEARCH AND PRACTICE,
2021, 2 (02)
[4]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]
Making Smart Contracts Predict and Scale
[J].
2022 FOURTH INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA),
2022,
:127-134
[6]
Barinov I, 2019, PROOF STAKE DECENTRA
[7]
Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781
[8]
Benet J., 2014, CoRR
[9]
Bhat SA, 2022, AGRICULTURE-BASEL, V12, DOI [10.9734/ajrcs/2021/v6i430125, 10.3390/agriculture12010040]