[1]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2018-10-12].https://bitcoin.org/bitcoin.pdf.
[2]ANDRYCHOWICZ M,DZIEMBOWSKI S,MALINOWSI D.Secure multiparty computations on bitcoin[C]//Proceedings of 2014 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2014:55-64.
[3]邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报2018,41(5):969-988.
[4]韩璇,刘亚敏.区块链技术中的共识机制研究[J].信息网络安全,2017(9):147-152.
[5]加雄伟,严斌峰.区块链思维、物联网区块链及其参考框架与应用分析[J].电信网技术,2017(5):61-65.
[6]杨宇光,张树新.区块链共识机制综述[J].信息安全研究,2018,4(4):369-379.
[7]沈鑫,裴庆祺,刘雪峰.区块链技术综述[J].网络与信息安全学报,2016(11):11-20.
[8]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):1-8.
[9]刘童桐.区块链共识机制研究与分析[J].信息通信技术与政策,2018(7):481-494.
[10]GILBERT S,LYNCH N.Brewer\\"s conjecture and the feasibility of consistent,available,partition-tolerant web services[J].ACM SIGACT News,2002,33(2):51.
[11]陈明.分布系统设计的CAP理论[J].计算机教育,2013,195(15):109-112.
[12]LAMPORT L,SHOSTAK R,PEASE M.The byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,2002,4(3):120-135.
[13]DOUCEUR J R.The sybil attack[C]//Proceedings of International Workshop on Peer-to-peer Systems.Berlin,Germany:Springer,2002:251-260.
[14]BUTERIN V.A next-generation smart contract and decentralized application platform[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2014:79-81.
[15]KING S,NADAL S.Ppcoin:peer-to-peer crypto-currency with proof-of-stake[EB/OL].(2012-08-19).[2018-10-21].http://download.csdn.net/download/vinsuan1993/9963770.
[16]夏清,张凤军,左春.加密数字货币系统共识机制综述[J].计算机系统应用,2017,26(4):1-8.
[17]申屠青春.区块链开发指南[M].北京:机械工业出版社,2017:109-146.
[18]杨保华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:93-97.
[19]NARUMANCHI H,EMMADI N.Reinforcing immutability of permissioned blockchains with keyless signatures infrastructure[C]//Proceedings of the 18th International Conference on Distributed Computing and Networking.New York,USA:ACM Press,2017:124-135.
[20]王锡亮,刘学枫,赵淦森.区块链综述:技术与挑战[J].无线电通信技术,2018(6):9-16.
[21]MORADI M,AHMADI A.Reducing energy consumption in wireless sensor networks using Hash distribution table[J].Journal of Electrical Engineering and Technology,2013(1):2-12. |