共 43 条
[1]
ALFAYOUMI M, 2010, IJCSI, P18
[2]
Anderson R., 1997, Security Protocols. International Workshop Proceedings, P49
[4]
[Anonymous], 2012, CONSULTED
[5]
[Anonymous], 2013, An analysis of anonymity in the bitcoin system
[6]
Balan RK, 2009, MOBISYS'09: PROCEEDINGS OF THE 7TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P291
[7]
Bamert T, 2013, IEEE INT CONF PEER
[9]
Boly J.-P., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P217
[10]
Brands S., 1994, LNCS, V773, P302, DOI [DOI 10.1007/3-540-48329-2-26, DOI 10.1007/3-540-48329-226]