共 11 条
[1]
Bentov Iddo, 2014, ACM SIGMETRICS Performance Evaluation Review, V42, P34
[2]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[4]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[6]
King S., 2012, PPCOIN PEER TO UNPUB
[7]
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
[J].
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID),
2017,
:468-477
[8]
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[9]
Nguyen J. P. D., 2012, DEPENDENCY PATH PATT
[10]
Shetty S., 2017, SPIE DEF SEC C