[1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. 2008[2018-03-20]. https://bitcoin.org/bitcoin.pdf
[2] Bitcoin Core.integration/staging tree [CP].GitHub,2009[2018-03-20], https://github.com/bitcoin/bitcoin
[3] W. Dai. b-money[EB/OL]. 1998[2018-03-20]. http://www.weidai.com/bmoney.txt
[4] Back A. Hashcash-A Denial of Service Counter-Measure[C]// USENIX Technical Conference. 2002
[5] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494.
[6] ADEPT: An IoT Practitioner Perspective DRAFT COPY FOR ADVANCE REVIEW[EB/OL]. IBM,2015[2018-03-19]. ibm.biz/devicedemocracy
[7] 蔡维德, 赵梓皓, 张弛,等. 英国央行数字货币RSCoin探讨[J]. 金融电子化, 2016(10):78-81.
[8] Two-phase commit protocol[EB/OL]. Wikipedia,(2018-1-23) [2018-03-23].https://en.wikipedia.org/wiki/Two-phase_commit_protocol
[9] Underwood S. Blockchain Beyond Bitcoin[J]. Communications of the Acm, 2016, 59(11):15-17
[10] Baliga, Arati. Understanding Blockchain Consensus Models[EB/OL]. Persistent Systems Ltd, 2017[2018-03-21]. https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf
[11] Fischer M J, Lynch N A, Paterson M S. Impossibility of distributed consensus with one faulty process[C]// ACM Sigact-Sigmod Symposium on Principles of Database Systems. ACM, 1983:1-7
[12] Lamport L, Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transactions on Programming Languages and Systems, 1982, 4(3): 382–401
[13] Lamport L,. The part-time parliament[J]. ACM Transactions on Computer Systems, 1998, 16(2): 133–169[2018-03-19]
[14] Ongaro D, Ousterhout J. In search of an understandable consensus algorithm[C]// Usenix Conference on Usenix Technical Conference. USENIX Association, 2014:305-320
[15] Castro M O T D. Practical byzantine fault tolerance[M]. Massachusetts Institute of Technology, 2000[2018-03-23]
[16] Schwartz D, Youngs N, Britto A. The Ripple Protocol Consensus Algorithm[EB/OL]. Ripple Labs Inc, 2014[2018-03-22]. https://ripple.com/files/ripple_consensus_whitepaper.pdf
[17] 周邺飞. 区块链核心技术演进之路——共识机制演进(1)[J]. 计算机教育, 2017(4):155-158
[18] Antonopoulos A M. Mastering Bitcoin: Unlocking Digital Crypto-Currencies[M]. O'Reilly Media, Inc. 2014
[19] Houy N. It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency[J]. Social Science Electronic Publishing, 2014, 34(2)[2018-03-22]
[20] Ren, Larry. Proof of stake velocity: Building the social currency of the digital age[EB/OL]. Reddcoin, 2014[2018-03-23]. https://www.reddcoin.com/papers/PoSV.pdf
[21] Delegated Proof of Stake Consensus[EB/OL].BitShares,[2018-03-22]. https://bitshares.org/technology/delegated-proof-of-stake-consensus/
[22] Waves platform[EB/OL]. Wikipedia,(2018-3-19)[2018-03-23]. https://en.wikipedia.org/wiki/Waves_platform
[23] Bentov I, Lee C, Mizrahi A, et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake[J]. ACM SIGMETRICS Performance Evaluation Review, 2014, 42(3): 34–37
[24] Casper Proof of Stake FAQ[EB/OL]. Ethereum Community,(2018-03-04)[2018-03-23]. https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ
[25] NEM(cryptocurrency)[EB/OL]. Wikipedia,(2018-03-08)[2018-03-23]. https://en.wikipedia.org/wiki/NEM_(cryptocurrency)
[26] Kwon,Jae. Tendermint: Consensus without Mining[EB/OL]. (2014)[2018-03-23]. https://www.github.com/tendermint/tendermint/wiki
[27] Wustrow E, Vandersloot B. DDoSCoin: cryptocurrency with a malicious proof-of-work[C]// Usenix Conference on Offensive Technologies. USENIX Association, 2016:168-177
[28] P4Titan. Slimcoin A Peer-to-Peer Crypto-Currency with Proof-of-Burn,Mining without Powerful Hardware[EB/OL]. 2014[2018-03-23]. http://www.doc.ic.ac.uk/~ids/realdotdot/crypto_papers_etc_worth_reading/proof_of_burn/slimcoin_whitepaper.pdf
[29] Jansen R. A TorPath to TorCoin:Proof-of-Bandwidth Altcoins for Compensating Relays[J]. 2014[2018-03-23]
[30] Burstcoin-The green innovative cryptocurrency[EB/OL]. BurstProject,2017[2018-03-23]. https://www.burst-coin.org/proof-of-capacity
[31] Ethan Heilman, Alison Kendler, Aviv Zohar. Eclipse attacks on Bitcoin's peer-to-peer network[C]// Usenix Conference on Security Symposium. USENIX Association, 2015:129-144
[32] Eyal I, Sirer E G. Majority Is Not Enough: Bitcoin Mining Is Vulnerable[J]. 2013,8437:436-454
[33] 全球算力分布[EB/OL]. 区块网(2018-03-20).http://qukuai.com/pools
[34] Ball, Marshall, et al. Proofs of Useful Work[J]. IACR Cryptology ePrint Archive2017 (2017):203[2018-03-23]
[35] Wacław Banasik, Stefan Dziembowski, Daniel Malinowski. Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts[C]//European Symposium on Research in Computer Security. Springer International Publishing, 2016:261-280
[36] Baird, Leemon. Hashgraph consensus: fair, fast, byzantine fault tolerance[J].Swirlds Tech Report, 2016[2018-03-23]
|