共 242 条
- [1] Abadi M., 2005, ACM Trans. Internet Technol., V5, P299
- [2] Aguilera MK, 2010, LECT NOTES COMPUT SC, V5959, P59, DOI 10.1007/978-3-642-11294-2_4
- [3] ZombieCoin: Powering Next-Generation Botnets with Bitcoin [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 34 - 48
- [4] Anderson R., 1998, Operating Systems Review, V32, P9, DOI 10.1145/302350.302353
- [5] Andresen G., 2011, BIP 13 ADDRESS FORMA
- [6] Androulaki Elli, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P161, DOI 10.1007/978-3-319-08593-7_11
- [7] Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
- [8] On the Malleability of Bitcoin Transactions [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 1 - 18
- [9] Secure Multiparty Computations on Bitcoin [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 443 - 458
- [10] Fair Two-Party Computations via Bitcoin Deposits [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 105 - 121