共 55 条
- [2] [Anonymous], 2004, LECT NOTES COMPUT SC
- [3] Ripple: Overview and Outlook [J]. TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 163 - 180
- [4] Ateniese Giuseppe, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P538, DOI 10.1007/978-3-319-10879-7_31
- [5] Ball M., 2017, IACR Cryptology ePrint Archive
- [6] Bardet M., 2004, P INT C POL SYST SOL, P71
- [7] Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
- [9] Biryukov A, 2017, LEDGER-PITTSBURGH, V2, P1, DOI 10.5195/LEDGER.2017.48
- [10] Bissias G., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, P149, DOI DOI 10.1145/2665943.2665955