共 59 条
[1]
Abraham I, 2017, Arxiv, DOI arXiv:1612.02916
[2]
Ali I., 2019, INT C P2P PAR GRID C, P82
[3]
Bahack L, 2013, Arxiv, DOI arXiv:1312.7013
[4]
Boreiri Zahra, 2022, 2022 8th International Conference on Web Research (ICWR), P82, DOI 10.1109/ICWR54782.2022.9786224
[5]
Budish E., 2018, Technical report, DOI DOI 10.3386/W24717
[6]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[7]
On Security Analysis of Proof-of-Elapsed-Time (PoET)
[J].
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2017,
2018, 10616
:282-297
[8]
Cheng Z, 2018, Arxiv, DOI arXiv:1808.04142
[9]
da Silva F.J.C., 2019, EUROPEAN WIRELESS 20, P1