共 54 条
[31]
Groth J, 2006, LECT NOTES COMPUT SC, V4284, P444
[32]
Groth J, 2008, LECT NOTES COMPUT SC, V4965, P415
[33]
Hopkins C., If You Own Bitcoin, You Also Own Links to Child Porn
[34]
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:231-242
[35]
Krawczyk H., 2000, PROC NDSS, P143
[36]
How to Use Bitcoin to Play Decentralized Poker
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:195-206
[37]
Manzano A. C., 2011, THESIS
[38]
Moonie H., MANS RIGHT BE FORGOT
[39]
Nakamoto S., 2009, BITCOIN CORE
[40]
Naor Moni, 2001, P 33 ANN ACM S THEOR, P492, DOI DOI 10.1145/380752.380844