共 31 条
[2]
On the Malleability of Bitcoin Transactions
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8976
:1-18
[4]
Bentov Iddo, 2014, ACM SIGMETRICS Performance Evaluation Review, V42, P34
[6]
Bissias G., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, P149, DOI DOI 10.1145/2665943.2665955
[8]
Decker C, 2014, LECT NOTES COMPUT SC, V8713, P313, DOI 10.1007/978-3-319-11212-1_18
[9]
Fuqaha A., 2015, IEEE COMMUN SURV TUT, V17, P2347, DOI [DOI 10.1109/COMST.2015.2444095, DOI 10.1109/C0MST.2015.2444095, 10.1109/COMST.2015.2444095]
[10]
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
[J].
IEEE ACCESS,
2018, 6
:27205-27213