[1]Bonneau J, Miller A, Clark J, et al. Research perspectives and challenges for Bitcoin and cryptocurrencies[C] Proc of IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2015: 104121[2]Nakamoto S. Bitcoin: A peertopeer electronic cash system[ROL]. 2008[20170110]. http:bitcoin.orgbitcoin.pdf[3]Kiayias A, Panagiotakos G. On trees, chains and fast transactions in the Blockchain[OL]. 2016 [20170110]. http:eprint.iacr.org2016545.pdf[4]Lewenberg Y, Bachrach Y, Sompolinsky Y, et al. Bitcoin mining pools: A cooperative game theoretic analysis[C] Proc of Int Conf on Autonomous Agents and Multiagent Systems. Istanbul, Turkey: International Foundation for Autonomous Agents and Multiagent Systems, 2015: 919927[5]Franco P. Understanding Bitcoin: Cryptography, Engineering and Economics[M]. Hoboken: John Wiley & Sons, 2014[6]Eyal I, Sirer E G. Majority is not enough: Bitcoin mining is vulnerable[C] Proc of Int Conf on Financial Cryptography and Data Security. Berlin: Springer, 2014: 436454[7]Katz J, Koo C Y. On expected constantround protocols for Byzantine agreement[J]. Journal of Computer and System Sciences, 2009, 75(2): 91112[8]Lamport L, Shostak R, Pease M. The Byzantine generals problem[J]. ACM Trans on Programming Languages and Systems, 1982, 4(3): 382401[9]Karame G O, Androulaki E, Capkun S. Doublespending fast payments in bitcoin[C] Proc of ACM Conf on Computer and Communications Security. New York: ACM, 2012: 906917[10]Kumaresan R, Bentov I. How to use Bitcoin to incentivize correct computations[C] Proc of ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2014: 3041[11]Heilman E, Kendler A, Zohar A, et al. Eclipse attacks on Bitcoins peertopeer network[C] USENIX Security. Berkeley: USENIX Association, 2015: 129144[12]Decker C, Wattenhofer R. Information propagation in the bitcoin network[C] Proc of the 13th IEEE Int Conf on PeertoPeer Computing (P2P). Piscataway, NJ: IEEE, 2013: 110[13]Gervais A, Ritzdorf H, Karame G O, et al. Tampering with the delivery of blocks and transactions in bitcoin[C] Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security. New Tork: ACM, 2015: 692705[14]Nakamoto S. Bitcoin open source implementation of P2P currency[OL]. 2009 [20170110]. http:p2pfoundation.ning.comforumtopicsbitcoinopensource[15]Sompolinsky Y, Zohar A. Accelerating Bitcoins transaction processing. Fast money grows on trees, not chains[OL]. 2013 [20170110]. https:eprint.iacr.org2013881[16]Fitzi M, Garay J A. Efficient playeroptimal protocols for strong and differential consensus[C] Proc of the 22nd Annual Symp on Principles of Distributed Computing. New York: ACM, 2003: 211220[17]Miller A, LaViola Jr J J. Anonymous byzantine consensus from moderatelyhard puzzles: A model for bitcoin[OL]. 2014 [20170110]. http:nakamotoinstitute.orgresearchanonymousbyzantineconsensus[18]Sompolinsky Y, Zohar A. Secure highrate transaction processing in bitcoin[C] Proc of Int Conf on Financial Cryptography and Data Security. Berlin: Springer, 2015: 507527[19]Bhme R, Christin N, Edelman B, et al. Bitcoin: Economics, technology, and governance[J]. The Journal of Economic Perspectives, 2015, 29(2): 213238[20]Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized anonymous payments from bitcoin[C] Proc of IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2014: 459474[21]Bentov I, Kumaresan R. How to use bitcoin to design fair protocols[C] Proc of Int Cryptology Conf. Berlin: Springer, 2014: 421439
|