共 39 条
[11]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[12]
Conoscenti M., 2016, P 2016 IEEE ACS 13 I, P1, DOI [10.1109/AICCSA.2016 .7945805, DOI 10.1109/AICCSA.2016.7945805]
[13]
Stealth Address and Key Management Techniques in Blockchain Systems
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:559-566
[14]
Dai W., 2009, CRYPTO LIB 8 0
[15]
Dorri A, 2016, BLOCKCHAIN INTERNET
[16]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[17]
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[19]
World of Empowered IoT Users
[J].
PROCEEDINGS 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION IOTDI 2016,
2016,
:13-24
[20]
Karafiloski E, 2017, 17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES - IEEE EUROCON 2017 CONFERENCE PROCEEDINGS, P763, DOI 10.1109/EUROCON.2017.8011213