首页
科研方向
实验室成员
实验室文化
学术活动
学术成果
区块链论文收集
新闻动态
栏目分类
当前位置: 主页 > 区块链论文收集 >
2016
  • [HL16] Hari A, Lakshman T V. The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet //Proceedings of the 15th ACM Workshop on Hot Topics in Networks. ACM, 2016: 204-210.
  • [HCW16] Huang H, Chen X, Wu Q, et al. Bitcoin-based fair payments for outsourcing computations of fog devices. Future Generation Computer Systems, 2016.
  • [KH16] Kim K J, Hong S P. Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks. International Journal of Security and Its Applications, 2016, 10(11): 201-210.
  • [RM16] Ruffing T, Moreno-Sanchez P. Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin*.
  • [NG16] Natoli C, Gramoli V. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example. arXiv preprint arXiv:1612.09426, 2016.
  • [AMV16] Ateniese G, Magri B, Venturi D, et al. Redactable Blockchain–or–Rewriting History in Bitcoin and Friends. IACR Cryptology ePrint Archive, 2016.
  • [AMN16] Abraham I, Malkhi D, Nayak K, et al. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. arXiv preprint arXiv:1612.02916, 2016.
  • [WL16] Wijaya D A, Liu J K, Steinfeld R, et al. Anonymizing Bitcoin Transaction //International Conference on Information Security Practice and Experience. Springer International Publishing, 2016: 271-283.
  • [BCM16] Bogner A, Chanson M, Meeuw A. A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain //Proceedings of the 6th International Conference on the Internet of Things. ACM, 2016: 177-178.
  • [HL16] Hari A, Lakshman T V. The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet //Proceedings of the 15th ACM Workshop on Hot Topics in Networks. ACM, 2016: 204-210.
  • [BK16] Biryukov A, Khovratovich D. Equihash: Asymmetric proof-of-work based on the generalized birthday problem. NDSS, 2016.
  • [ZCC16] Zhang F, Cecchetti E, Croman K, et al. Town crier: An authenticated data feed for smart contracts //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 270-282.
  • [LCO16] Luu L, Chu D H, Olickel H, et al. Making smart contracts smarter //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 254-269.
  • [KJG16] Kogias E K, Jovanovic P, Gailly N, et al. Enhancing bitcoin security and performance with strong consistency via collective signing //25th USENIX Security Symposium (USENIX Security 16). USENIX Association, 2016: 279-296.
  • [BHM16] Baqer K, Huang D Y, McCoy D, et al. Stressing Out: Bitcoin “Stress Testing” //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 3-18.
  • [Bonneau16] Bonneau J. Why buy when you can rent? //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 19-26.
  • [TVR16] Turuani M, Voegtlin T, Rusinowitch M. Automated Verification of Electrum Wallet //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 27-42.
  • [HBG16] Heilman E, Baldimtsi F, Goldberg S. Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 43-60.
  • [KLS16] Kiayias A, Lamprou N, Stouka A P. Proofs of Proofs of Work with Sublinear Complexity //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 61-78.
  • [DAK16] Delmolino K, Arnett M, Kosba A, et al. Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 79-94.
  • [Bonneau16] Bonneau J. EthIKS: Using Ethereum to audit a CONIKS key transparency log //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 95-105.
  • [CDE16] Croman K, Decker C, Eyal I, et al. On scaling decentralized blockchains //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 106-125.
  • [MES16] Möser M, Eyal I, Sirer E G. Bitcoin covenants //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 126-141.
  • [BGM16] Bentov I, Gabizon A, Mizrahi A. Cryptocurrencies without proof of work //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 142-157.
  • [LNZ16] Luu L, Narayanan V, Zheng C, et al. A secure sharding protocol for open blockchains //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 17-30.
  • [Karame16] Karame G. On the Security and Scalability of Bitcoin's Blockchain //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 1861-1862.
  • [BSL16] Beck R, Stenum Czepluch J, Lollike N, et al. Blockchain–The Gateway to Trust-Free Cryptographic Transactions. ECIS 2016 Proceedings, 2016: 1-14.
  • [GKW16] Gervais A, Karame G O, Wüst K, et al. On the security and performance of proof of work blockchains //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 3-16.
  • [MHH16] Matzutt R, Hohlfeld O, Henze M, et al. POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 1769-1771.
地址:湖北省武汉市武昌区珞珈山,武汉大学国家网络安全学院

Tel:186-7403-6424   Fax:   Email:cpeng@whu.edu.cn (彭聪)