共 10 条
[2]
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[3]
The Bitcoin Backbone Protocol: Analysis and Applications
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:281-310
[4]
THE BYZANTINE GENERALS PROBLEM
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
1982, 4 (03)
:382-401
[5]
Lamport L, 2011, LECT NOTES COMPUT SC, V6950, P211, DOI 10.1007/978-3-642-24100-0_22
[6]
Inclusive Block Chain Protocols
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8975
:528-547
[8]
FruitChains: A Fair Blockchain
[J].
PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17),
2017,
:315-324
[9]
Optimal Selfish Mining Strategies in Bitcoin
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016,
2017, 9603
:515-532
[10]
Secure High-Rate Transaction Processing in Bitcoin
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8975
:507-527