共 242 条
[1]
Abadi M., 2005, ACM Trans. Internet Technol., V5, P299
[2]
Aguilera MK, 2010, LECT NOTES COMPUT SC, V5959, P59, DOI 10.1007/978-3-642-11294-2_4
[3]
ZombieCoin: Powering Next-Generation Botnets with Bitcoin
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8976
:34-48
[4]
Anderson R., 1998, Operating Systems Review, V32, P9, DOI 10.1145/302350.302353
[5]
Andresen G., 2011, BIP 13 ADDRESS FORMA
[6]
Androulaki Elli, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P161, DOI 10.1007/978-3-319-08593-7_11
[7]
Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
[8]
On the Malleability of Bitcoin Transactions
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8976
:1-18
[9]
Secure Multiparty Computations on Bitcoin
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:443-458
[10]
Fair Two-Party Computations via Bitcoin Deposits
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014,
2014, 8438
:105-121