共 21 条
[1]
Ahram T, 2017, 2017 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT SOCIETY CONFERENCE (TEMSCON), P137, DOI 10.1109/TEMSCON.2017.7998367
[2]
[Anonymous], NETW COMM SYST BRANC
[3]
On Security Analysis of Proof-of-Elapsed-Time (PoET)
[J].
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2017,
2018, 10616
:282-297
[4]
Dey A, 2018, 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P505, DOI 10.1109/WF-IoT.2018.8355119
[5]
Hejazi H., 2018, 2018 IEEE International Conference on Future IoT Technologies (Future IoT), P1
[8]
A Secure Sharding Protocol For Open Blockchains
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:17-30
[10]
Montresor Alberto, 2017, Wiley encyclopedia of electrical and electronics engineering, V1