[1] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008: 1-49.
|
[2] |
PERCIVAL C , JOSEFSSON S . The scrypt password-based key derivation function[R]. 2016.
|
[3] |
WOOD G . Ethereum:a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014,151: 1-32.
|
[4] |
DRYJA T . Hashimoto:I/O bound proof of work[R]. 2014.
|
[5] |
BUTERIN V . Dagger:a memory-hard to compute,memory-easy to verify scrypt alternative[R]. 2013.
|
[6] |
KING S . Primecoin:cryptocurrency with prime number proof-of-work[R]. 2013.
|
[7] |
BIRYUKOV A , KHOVRATOVICH D . Equihash:asymmetric proof-of-work based on the generalized birthday problem[J]. Ledger, 2017,2: 1-30.
|
[8] |
ANDRYCHOWICZ M , DZIEMBOWSKI S . Distributed cryptography based on the proofs of work[J]. IACR Cryptology ePrint Archive, 2014: 796.
|
[9] |
BONNEAU J , CLARK J , GOLDFEDER S . On Bitcoin as a public randomness source[J]. IACR Cryptology ePrint Archive, 2015: 1015.
|
[10] |
APOSTOLAKI M , ZOHAR A , VANBEVER L . Hijacking bitcoin:Routing attacks on cryptocurrencies[C]// Security and Privacy (SP). 2017: 375-392.
|
[11] |
BAQER K , HUANG D Y , MCCOY D ,et al. Stressing out:Bitcoin“stress testing”[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2016: 3-18.
|
[12] |
MILLER A , XIA Y , CROMAN K ,et al. The honey badger of BFT protocols[C]// The 2016 ACM SIGSAC Conference on Computer andCommunications Security. 2016: 31-42.
|
[13] |
LARIMER D . Delegated proof-of-stake (dpos)[R]. Bitshare whitepaper. 2014.
|
[14] |
CASTRO M , LISKOV B . Practical Byzantine fault tolerance[C]// OSDI. 1999: 173-186.
|
[15] |
LAMPORT L . Paxos made simple[J]. ACM Sigact News, 2001,32(4): 18-25.
|
[16] |
Szabo N . Smart contracts:building blocks for digital markets[J]. EXTROPY:The Journal of Transhumanist Thought, 1996,(16).
|
[17] |
MCCORRY P , SHAHANDASHTI S F , HAO F . A smart contract for boardroom voting with maximum voter privacy[C]// International Conference on Financial Cryptography and Data Security. 2017: 357-375.
|
[18] |
LUU L , CHU D H , OLICKEL H ,et al. Making smart contracts smarter[C]// The 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 254-269.
|
[19] |
KOSBA A , MILLER A , SHI E ,et al. Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[C]// ecurity and Privacy (SP). 2016: 839-858.
|
[20] |
DELMOLINO K , ARNETT M , KOSBA A ,et al. Step by step towards creating a safe smart contract:Lessons and insights from a cryptocurrency lab[C]// International Conference on Financial Cryptography and Data Security.Springer. 2016: 79-94.
|
[21] |
DLA P . Blockchain and the law:practical implications of a revolutionary technology for financial markets and beyond[R]. 2016.
|
[22] |
Accenture. Banking in a world of programmable assets[R]. 2016.
|
[23] |
ECB. Distributed ledger technologies in securities post-trading[R]. 2016.
|
[24] |
ECB . A brave new world? What impact will distributed ledger technology have on the financial industry?[J]. 2016.
|
[25] |
BRAINARD L . The use of distributed ledger technologies in payment,clearing,and settlement[J]. Speech, 2016.
|
[26] |
杨东, 潘曌东 . 区块链带来金融与法律优化[J]. 中国金融, 2016(8): 25-26.
|
|
YANG D , PAN Z D . Block chain bring financial and legal optimization[J]. China finance , 2016(8): 25-26.
|
[27] |
DUNPHY P , PETITCOLAS F A P . A First Look at Identity Management Schemes on the Blockchain[C]// IEEE Security and Privacy Magazine special issue on Blockchain Security and Privacy. 2018.
|
[28] |
吴健, 高力, 朱静宁 . 基于区块链技术的数字版权保护[J]. 广播电视信息, 2016(7): 60-62.
|
|
WU J , GAO L , ZHU J N . Digital copyright protection based on block chain technology[J]. Radio and Television Information , 2016(7): 60-62.
|
[29] |
金义富 . 区块链+教育的需求分析与技术框架[J]. 中国电化教育, 2017(9): 62-68.
|
|
JIN Y F . Block chain + education demand analysis and technical framework[J]. China Educational Technology , 2017(9): 62-68.
|
[30] |
AITZHAN N Z , SVETINOVIC D . Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams[C]// Transactions on Dependable and Secure Computing. 2016.
|
[31] |
SIKORSKI J J , HAUGHTON J , KRAFT M . Blockchain technology in the chemical industry:Machine-to-machine electricity market[J]. Applied Energy, 2017,195: 234-246.
|
[32] |
张宁, 王毅, 康重庆 ,等. 能源互联网中的区块链技术:研究框架与典型应用初探[J]. 中国电机工程学报, 2016,36(15): 4011-4022.
|
|
ZHANG N , WANG Y , KANG C Q ,et al. Blockchain technique in the energy Internet:preliminary research framework and typical applications[J]. Proceedings of the CSEE. 2016,36(15): 4011-4022.
|
[33] |
TIAN F , . An agri-food supply chain traceability system for China based on RFID &blockchain technology[C]// Service Systems and Service Management (ICSSSM). 2016: 1-6.
|
[34] |
KORPELA K , HALLIKAS J , DAHLBERG T . Digital supply chain transformation toward blockchain integration[C]// proceedings of the 50th Hawaii international conference on system sciences. 2017.
|
[35] |
KIM H M , LASKOWSKI M . Towards an Ontology-driven blockchain design for supply chain provenance[C]// Submitted:workshop on information technology and systems. 2016.
|
[36] |
HEILMAN E , BALDIMTSI F , GOLDBERG S . Blindly signed contracts:anonymous on-blockchain and off-blockchain bitcoin transactions[C]// International Conference on Financial Cryptography and Data Security. 2016: 43-60.
|
[37] |
ZYSKIND G , NATHAN O . Decentralizing privacy:using blockchain to protect personal data[C]// Security and Privacy Workshops (SPW). 2015: 180-184.
|
[38] |
方滨兴 . 从“国家网络主权”谈基于国家联盟的自治根域名解析体系[J]. 信息安全与通信保密, 2014,12: 35-38.
|
|
FANG B X . Country autonomous root domain name resolution architecture from the perfective of country cyber sovereignty[J]. Information Security and Communi-cation Privacy, 2014,12: 35-38.
|
[39] |
张宇, 夏重达, 方滨兴 ,等. 一个自主开放的互联网根域名解析体系[J]. 信息安全学报, 2017,2(4): 57-69.
|
|
FANG B X , XIA C D , FANG B X . An autonomous open root resolution architecture for domain name system in the internet[J]. Journal of Cyber Security, 2017,2(4): 57-69.
|
[40] |
刘井强 . 基于私有根域名的 DNS 解析试验系统设计与实现[D]. 哈尔滨:哈尔滨工业大学, 2017.
|
|
LIU J Q . Design and implementation of DNS resolution test system based on private root domain[D]. Harbin:Harbin Institute of Technology, 2017.
|
[41] |
朱国库, 蒋文保 . 一种去中心化的网络域名服务系统模型[J]. 网络空间安全, 2017,8(1): 14-18.
|
|
ZHU G K , JIANG W B . A decentralized domain name system for the network[J]. Cyberspace Security, 2017,8(1): 14-18.
|
[42] |
蒋文保, 朱国库 . 一种安全可信的网络互联协议(STiP)模型研究[J]. 网络空间安全, 2017,8(1): 24-31.
|
|
JIANG W B , ZHU G K . Research on the secure and trusted Internet protocol[J]. Cyberspace Security, 2017,8(1): 24-31.
|