[1]Yuan Yong, Wang Feiyue. Blockchain: The State of the Art and Future Trends[J]. Acta Automatica Sinica, 2016, 42(4): 481−494
(袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(04):481-494)
[2]Shen Xin, Pei Qingqi, Liu Xuefeng. Survey of block chain[J].Chinese Journal of Network and Information Security, 2016,2(11):11-20
(沈鑫,裴庆祺,刘雪峰.区块链技术综述[J].网络与信息安全学报,2016,2(11):11-20)
[3]Shao Qifeng, Jin Cheqing, Zhang Zhao, et al. Blockchain:Architecture and Research Progress[J/OL]. CHINESE JOURNAL OF COMPUTERS, 2017:1-20 [2018-03-23].http://kns.cnki.net/kcms/detail/11.1826.TP.20171115.2302.006.html
(邵奇峰,金澈清,张召等.区块链技术:架构及进展[J/OL].计算机学报,2017:1-20[2018-03-23].http://kns.cnki.net/kcms/detail/11.1826.TP.20171115.2302.006.html)
[4]Wang Xiaoguang. Summary of the Consensus Algorithm of Block Chain Technology[J]. China Computer&Communication,2017(09):72-74
(王晓光.区块链技术共识算法综述[J].信息与电脑(理论版),2017(09):72-74)
[5] Markus Kaulartz, Jörn Heckmann. Smart Contracts – Anwendungen der Blockchain-Technologies[J]. Computer und Recht, 2016,32(9)
[6]Kuang Hua. Secure Hash Algorithm SHA[J]. Financial Computer of Huanan, 2003(06):24-26
(旷华.安全哈希算法SHA[J].华南金融电脑,2003(06):24-26)
[7]He Runmin, Ma Jun. Analysis safety of SHA-256 algorithm[J].Electronic Design Engineering, 2014,22(03):31-33
(何润民,马俊.SHA-256算法的安全性分析[J].电子设计工程,2014,22(03):31-33)
[8]Luo Hao, Qiao Qinbao, Liu Jinlong, et al. Elliptic curve signature scheme[J]. J. Wuhan Univ.(Nat. Sci. Ed.), 2003(01):95-98
(罗皓,乔秦宝,刘金龙等.椭圆曲线签名方案[J].武汉大学学报(理学版),2003(01):95-98)
[9]Sun Guomao. A Study of the Essential Characteristics of the Block Chaining Technique and Its Application in the Financial Field[J].Theory Journal, 2017(02):58-67
(孙国茂.区块链技术的本质特征及其金融领域应用研究[J].理论学刊,2017(02):58-67)
[10]Yao Zhongjiang, Ge Jingguo. A Summary of the Theory and Application of BlockChain[J]. e-Science Technology & Application, 2017,8(02):3-17
(姚忠将,葛敬国.关于区块链原理及应用的综述[J].科研信息化技术与应用,2017,8(02):3-17)
[11]Zhu Jianming, Fu Yonggui. Progress in blockchain application research[J]. Science & Technology Review, 2017,35(13):70-76
(朱建明,付永贵.区块链应用研究进展[J].科技导报,2017,35(13):70-76)
[12]Zhang Bin. Security risk study of blockchain[J]. Telecom Engineering Technics and Standardization, 2017,30(11):1-5
(张滨.区块链安全风险研究[J].电信工程技术与标准化,2017,30(11):1-5)
|