共 38 条
- [1] Abeywardena K.Y., 2020, P 2020 2 INT C ADV C, P458
- [3] [Anonymous], 2017, Cryptol. Eprint Arch
- [4] Ateniese Giuseppe, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P538, DOI 10.1007/978-3-319-10879-7_31
- [5] MedRec: Using Blockchain for Medical Data Access and Permission Management [J]. PROCEEDINGS 2016 2ND INTERNATIONAL CONFERENCE ON OPEN AND BIG DATA - OBD 2016, 2016, : 25 - 30
- [6] Ball M., PROOFS USEFUL WORK
- [7] Practical byzantine fault tolerance and proactive recovery [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
- [8] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [10] Ezeafulukwe UA, 2018, INT J MATH COMPUT SC, V13, P171