[1] |
NAKAMOTO S. Bitcoin: A Peer-to-peer Electronic Cash System[EB/OL]. , 2019-4-9.
|
[2] |
LAMPORT L, SHOSTAK R, PEASE M.The Byzantine Generals Problem[J]. ACM Trans on Programming Languages & Systems, 1982, 4(3): 382-401.
|
[3] |
WANG Xiliang, LIU Xuefeng, ZHAO Gansen, et al.Overview of Blockchain: Technology and Challenges[J]. Radio Communications Technology, 2018, 44(6): 531-537.
|
|
王锡亮,刘学枫,赵淦森,等.区块链综述:技术与挑战[J].无线电通信技术,2018,44(6):531-537.
|
[4] |
SUN Yi,FAN Lingjun, HONG Xuehai.Technology Development and Application of Blockchain: Current Status and Challenges[J]. Engineering Science,2018, 20(2): 27-32.
|
|
孙毅,范灵俊,洪学海.区块链技术发展及应用:现状与挑战[J].中国工程科学,2018,20(2):35-40.
|
[5] |
WOOD G. Ethereum: A Secure Decentralised Generalised Transaction Ledger[EB/OL]. , 2019-4-11.
|
[6] |
BUTERIN V[EB/OL]., 2019-4-13.
|
[7] |
Hyperledger[EB/OL]., 2019-4-14.
|
[8] |
YANG Yuguang, ZHANG Shuxin.Review and Research for Consensus Mechanism of Block Chain[J]. Journal of Information Securyity Research, 2018(4): 369-379.
|
|
杨宇光,张树新.区块链共识机制综述[J].信息安全研究,2018(4):369-379.
|
[9] |
GAO Zhihao.Introduction to Cross-chain Technology of Blockchain[J]. Cards World, 2016(11): 46-51
|
|
高志豪. 区块链之跨链技术介绍[J].金卡工程,2016(11):46-51.
|
[10] |
GERVAIS A, KARAME G O, WÜST K, et al. On the Security and Performance of Proof of Work Blockchains[C]// ACM. The 2016 ACM SIGSAC Conference, October 24-28, 2016 , Vienna, Austria. New York: ACM, 2016: 3-16.
|
[11] |
MA Chunguang, AN Jing, BI Wei, et al.Smart Contract in Blockchain[J]. Netinfo Security, 2018, 18(11): 8-17.
|
|
马春光,安婧,毕伟,等. 区块链中的智能合约[J].信息网络安全,2018,18(11):8-17.
|
[12] |
Blockstream[EB/OL]., 2019-2019-4-12.
|
[13] |
Mark Friedenbach, Compact SPV Proofs via Block Header Commitments[EB/OL]. , 2019-4-15.
|
[14] |
HERLIHY M. Atomic Cross-Chain Swaps[EB/OL]. , 2019-4-16.
|
[15] |
TAN Senpeng, YANG Chao.Research and Improvement of Blockchain DPoS Consensus Mechanism[J]. Modern Computer, 2019(6): 11-14.
|
|
谈森鹏,杨超.区块链DPoS共识机制的研究与改进[J].现代计算机(专业版),2019(6):11-14.
|
[16] |
KARAME G O, ANDROULAKI E, CAPKUN S.Double-spending Fast Payments in Bitcoin[C]//ACM. The 2012 ACM Conference on Computer & Communications Security, October 16-18, 2012, Raleigh, North Carolina, USA. New York: ACM, 2012: 906-917.
|
[17] |
ZHANG Shitong, QIN Bo, ZHENG Haibin.Research on Multi-party Cross-chain Protocol Based on Hash Locking[J]. Cyberspace Security, 2018, 9(11): 57-62, 67.
|
|
张诗童,秦波,郑海彬.基于哈希锁定的多方跨链协议研究[J].网络空间安全,2018,9(11):57-62,67.
|
[18] |
HOPE-BAILIE A, THOMAS S.Interledger: Creating a Standard for Payments[C]//International World Wide Web Conferences Steering Committee. The 25th International Conference Companion on World Wide Web, April 11-15, 2016, Montréal, Québec, Canada. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2016: 281-282.
|
[19] |
Vitalik Buterin. Chain Interoperability[EB/OL]. , 2016-9-9/2019-4-7.
|
[20] |
BACK A, CORALLO M, DASHJR L, et al. Enabling Blockchain Innovations with Pegged Sidechains[EB/OL]. , 2019-4-17.
|
[21] |
BUCHMAN E, KWON J. Cosmos: A Network of Distributed Ledgers[EB/OL]. , 2019-4-17.
|
[22] |
Fusion[EB/OL]. ,2019-4-15.
|
[23] |
PAN Chen, LIU Zhiqiang, LIU Zhen, et al.Research on Scalability of Blockchain Technology: Problems and Methods[J]. Journal of Computer Research and Development, 2018, 55(10): 2099-2110.
|
|
潘晨,刘志强,刘振,等.区块链可扩展性研究:问题与方法[J].计算机研究与发展,2018,55(10):2099-2110.
|
[24] |
BAHACK L. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)[EB/OL]. ,2019-4-18.
|
[25] |
WANG Hao, SONG Xiangfu, KE Junming, et al.Blockchain and Privacy Preserving Mechanisms in Cryptocurrency[J]. Netinfo Security, 2017, 17(7): 32-39.
|
|
王皓,宋祥福,柯俊明,等. 数字货币中的区块链及其隐私保护机制[J].信息网络安全,2017,17(7):32-39.
|
[26] |
GORDON W J, CATALINI C. Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability[EB/OL]. , 2019-4-12.
|
[27] |
ZHAO Kuo, XING Yongheng.Security Survey of Internet of Things Driven by Block Chain Technology[J]. Netinfo Security, 2017, 17(5): 1-6.
|
|
赵阔,邢永恒.区块链技术驱动下的物联网安全研究综述[J].信息网络安全,2017,17(5):1-6.
|