|
栏目分类
|
|
2016
-
[HL16] Hari A, Lakshman T V. The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet //Proceedings of the 15th ACM Workshop on Hot Topics in Networks. ACM, 2016: 204-210.
-
[HCW16] Huang H, Chen X, Wu Q, et al. Bitcoin-based fair payments for outsourcing computations of fog devices. Future Generation Computer Systems, 2016.
-
[KH16] Kim K J, Hong S P. Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks. International Journal of Security and Its Applications, 2016, 10(11): 201-210.
-
[RM16] Ruffing T, Moreno-Sanchez P. Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin*.
-
[NG16] Natoli C, Gramoli V. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example. arXiv preprint arXiv:1612.09426, 2016.
-
[AMV16] Ateniese G, Magri B, Venturi D, et al. Redactable Blockchain–or–Rewriting History in Bitcoin and Friends. IACR Cryptology ePrint Archive, 2016.
-
[AMN16] Abraham I, Malkhi D, Nayak K, et al. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. arXiv preprint arXiv:1612.02916, 2016.
-
[WL16] Wijaya D A, Liu J K, Steinfeld R, et al. Anonymizing Bitcoin Transaction //International Conference on Information Security Practice and Experience. Springer International Publishing, 2016: 271-283.
-
[BCM16] Bogner A, Chanson M, Meeuw A. A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain //Proceedings of the 6th International Conference on the Internet of Things. ACM, 2016: 177-178.
-
[HL16] Hari A, Lakshman T V. The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet //Proceedings of the 15th ACM Workshop on Hot Topics in Networks. ACM, 2016: 204-210.
-
[BK16] Biryukov A, Khovratovich D. Equihash: Asymmetric proof-of-work based on the generalized birthday problem. NDSS, 2016.
-
[ZCC16] Zhang F, Cecchetti E, Croman K, et al. Town crier: An authenticated data feed for smart contracts //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 270-282.
-
[LCO16] Luu L, Chu D H, Olickel H, et al. Making smart contracts smarter //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 254-269.
-
[KJG16] Kogias E K, Jovanovic P, Gailly N, et al. Enhancing bitcoin security and performance with strong consistency via collective signing //25th USENIX Security Symposium (USENIX Security 16). USENIX Association, 2016: 279-296.
-
[BHM16] Baqer K, Huang D Y, McCoy D, et al. Stressing Out: Bitcoin “Stress Testing” //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 3-18.
-
[Bonneau16] Bonneau J. Why buy when you can rent? //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 19-26.
-
[TVR16] Turuani M, Voegtlin T, Rusinowitch M. Automated Verification of Electrum Wallet //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 27-42.
-
[HBG16] Heilman E, Baldimtsi F, Goldberg S. Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 43-60.
-
[KLS16] Kiayias A, Lamprou N, Stouka A P. Proofs of Proofs of Work with Sublinear Complexity //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 61-78.
-
[DAK16] Delmolino K, Arnett M, Kosba A, et al. Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 79-94.
-
[Bonneau16] Bonneau J. EthIKS: Using Ethereum to audit a CONIKS key transparency log //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 95-105.
-
[CDE16] Croman K, Decker C, Eyal I, et al. On scaling decentralized blockchains //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 106-125.
-
[MES16] Möser M, Eyal I, Sirer E G. Bitcoin covenants //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 126-141.
-
[BGM16] Bentov I, Gabizon A, Mizrahi A. Cryptocurrencies without proof of work //International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2016: 142-157.
-
[LNZ16] Luu L, Narayanan V, Zheng C, et al. A secure sharding protocol for open blockchains //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 17-30.
-
[Karame16] Karame G. On the Security and Scalability of Bitcoin's Blockchain //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 1861-1862.
-
[BSL16] Beck R, Stenum Czepluch J, Lollike N, et al. Blockchain–The Gateway to Trust-Free Cryptographic Transactions. ECIS 2016 Proceedings, 2016: 1-14.
-
[GKW16] Gervais A, Karame G O, Wüst K, et al. On the security and performance of proof of work blockchains //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 3-16.
-
[MHH16] Matzutt R, Hohlfeld O, Henze M, et al. POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 1769-1771.
|