Computer Science ›› 2018, Vol. 45 ›› Issue (2): 8-14.doi: 10.11896/j.issn.1002-137X.2018.02.002
Special Issue: Block Chain Technology
Previous Articles Next Articles
LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao
[1] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[R].2008. [2] TSAI W T,YU L,WANG R,et al.Blockchain Application Development Techniques[J].Journal of Software,2017,28(6):1474-1487.(in Chinese) 蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487. [3] HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7. [4] BASTIAAN M.Preventing the 51%-attack:a stochastic analysis of two phase proof of work in bitcoin.http://referaat.cs.utwente.nl/conference/22/paper/7473/preventingthe-51-attack-a-stochasticanalysis-of-two-phase-proof-of-work-in-bitcoin.pdf.2015. [5] MALHOTRA Y.Bitcoin Protocol:Model of Cryptographic ProofBased Global Crypto-Currency & Electronic Payments System.http://www.yogeshmalhotra.com/BitcoinProtocol.html. [6] KARAME G O,ANDROULAKI E,CAPKUN S.Double-spen-ding fast payments in bitcoin[C]∥Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM,2012:906-917. [7] JOHNSON B,LASZKA A,GROSSKLAGS J,et al.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools[C]∥International Conference on Financial Cryptography and Data Security.Springer,2014:72-86. [8] HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse Attacks on Bitcoin’s Peer-to-Peer Network[C]∥USENIX Security Symposium.2015:129-144. [9] HARMER P K,WILLIAMS P D,GUNSCH G H,et al.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-280. |
No related articles found! |
|