共 34 条
[1]
[Anonymous], CONSENSUS AGE BLOCKC
[2]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[3]
Buneman P, 2001, LECT NOTES COMPUT SC, V1973, P316
[4]
Buneman P., 2006, P 2006 ACM SIGMOD IN, P539, DOI [10.1145/1142473.1142534, DOI 10.1145/1142473.1142534]
[5]
Cachin C., 2016, ARXIV160307351
[6]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[7]
Distributed Provenance Compression
[J].
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA,
2017,
:203-218
[8]
Provenance in Databases: Why, How, and Where
[J].
FOUNDATIONS AND TRENDS IN DATABASES,
2007, 1 (04)
:379-474
[9]
Chiticariu L. W.-C., 2005, ACM SIGMOD International Conference on Management of Data, P942, DOI DOI 10.1145/1066157.1066296
[10]
Dang H., 2018, ARXIV PREPRINT ARXIV