[1] TSCHORSCH F,SCHEUERMANN B.Bitcoin and beyond:a technical survey on decentralized digital currencies[J].IEEE Communications Surveys & Tutorials,2016,18(3):2084-2123. [2] ZHANG Liang,LIU Baixiang,ZHANG Ruyi,et al.Overview of blockchain technology[J].Computer Engineering,2019,45(5):7-18.(in Chinese)张亮,刘百祥,张如意,等.区块链技术综述[J].计算机工程,2019,45(5):7-18. [3] RON D,SHAMIR A.Quantitative analysis of the full Bitcoin transaction graph[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2012:6-24. [4] ATHEY S,PARASHKEVOV I,SARUKKAI V,et al.Bitcoin pricing,adoption,and usage:theory and evidence[EB/OL].[2019-10-12].https://siepr.stanford.edu/sites/default/files/publications/17-033_1.pdf. [5] PINNA A,TONELLI R,ORRÚ M,et al.A Petri nets model for blockchain analysis[J].The Computer Journal,2017,61(9):1374-1388. [6] SPAGNUOLO M.BitIodine:extracting intelligence from the Bitcoin network[M]//CLARK J,MEIKLEJOHN S,RYAN P Y A.Financial Cryptography and Data Security.Berlin,Germany:Springer,2014:457-468. [7] KAKADIARIS I A,KUMAR A,SCHEIRER W J,et al.Biometric and surveillance technology for human and activity identification XII-identifying bitcoin users by transaction behavior[M]//KAKADIARIS I,KUMAR A,SCHEIRER W.Biometric and Surveillance Technology for Human and Activity Identification XII.Bellingham,USA:SPIE,2015:1-5. [8] LIAO K,ZHAO Z,DOUPE A,et al.Behind closed doors:measurement and analysis of CryptoLocker ransoms in Bitcoin[C]//Proceedings of Conference on Electronic Crime Research.Washington D.C.,USA:IEEE Press,2016:1-5. [9] ANDROULAKI E,KARAME G O,ROESCHLIN M,et al.Evaluating user privacy in Bitcoin[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2013:34-51. [10] HARRIGAN M,FRETTER C.The unreasonable effectiveness of address clustering[C]//Proceedings of UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2017.Washington D.C.,USA:IEEE Press,2017:1-5. [11] MEIKLEJOHN S,POMAROLE M,JORDAN G,et al.A fistful of Bitcoins:characterizing payments among men with no names[C]//Proceedings of 2013 Conference on Internet Measurement.New York,USA:ACM Press,2013:1-12. [12] ZHAO Chen,GUAN Yong.A graph-based investigation of Bitcoin transactions[C]//Proceedings of IFIP International Conference on Digital Forensics.Berlin,Germany:Springer,2015:79-95. [13] FREDERIQUE O,SILIVANXAY P,DATTA A.BiVA:Bitcoin network visualization & analysis[C]//Proceedings of 2018 IEEE International Conference on Data Mining Workshops.Washington D.C.,USA:IEEE Press,2018:1-5. [14] SHAO Qifeng,JIN Cheqing,ZHANG Shao,et al.Blockchain:architecture and research progress[J].Chinese Journal of Computers,2018,41(5):3-22.(in Chinese)邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018,41(5):3-22. [15] LU Yao,WEN Jie.Scheme of supply chain control and traceability based on Bitcoin technology[J].Computer Engineering,2018,44(12):91-99,107.(in Chinese)陆尧,文捷.基于比特币技术的供应链管控与溯源方案[J].计算机工程,2018,44(12):91-99,107. [16] DEEPAK P,NISHA M,MOHANTY S P,et al.Everything you wanted to know about the blockchain:its promise,components,processes,and problems[J].IEEE Consumer Electronics Magazine,2018,7(4):6-14. [17] ALQASSEM I,RAHWAN I,SVETINOVIC D.The anti-social system properties:Bitcoin network data analysis[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2018,50(1):21-31. [18] SOSKA K,CHRISTIN N.Measuring the longitudinal evolution of the online anonymous marketplace ecosystem[C]//Proceedings of USENIX Conference on Security Symposium.[S.l.]:USENIX Association,2015:32-48. [19] TASCA P,LIU S,HAYES A.The evolution of the Bitcoin economy:extracting and analyzing the network of payment relationships[EB/OL].[2019-10-12].https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2808762. [20] MATTHIAS L,BENJAMIN F.Analyzing the Bitcoin network:the first four years[J].Future Internet,2016,8(4):7. [21] CHRISTIN N.Traveling the silk road:a measurement analysis of a large anonymous online marketplace[EB/OL].[2019-10-12].https://www.docin.com/p-1644257050.html. |