共 34 条
[11]
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016,
2016, 9604
:79-94
[12]
Deutch D, 2017, PROC VLDB ENDOW, V10, P577, DOI 10.14778/3055540.3055550
[13]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[14]
Feng Tian, 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM), P1, DOI 10.1109/ICSSSM.2016.7538424
[15]
Hopper A, 2013, TAPP
[16]
Ikeda R., 2011, PROVENANCE GEN MAP R
[17]
Interlandi M, 2015, PROC VLDB ENDOW, V9, P216
[19]
Korpela K, 2017, PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P4182
[20]
Luu L., 2015, CCS