共 10 条
[5]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[6]
Untraceable electronic mail, return addresses, and digital pseudonyms[J] . David L. Chaum.Communications of the ACM . 1981 (2)
[7]
Identifying bitcoin users by transaction behavior .2 Monaco J V. Proc of 2015SPIE DSS . 2015
[8]
An analysis of anonymity in the bitcoin system .2 Reid F,Harrigan M. Proc of the 3rd IEEE Int Conf on Privacy,Security,Risk and Trust . 2011
[9]
A fistful of bitcoins:Characterizing payments among men with no names .2 Meiklejohn S,Pomarole M,Jordan G,et al. Proc of the 13th ACM Internet Measurement Conf . 2013
[10]
Bitcoin:a peer-to-peer electronic cash system .2 Nakamoto S. http://www.bitcoin.org . 2017