1 |
王群, 李馥娟, 王振力, 等. 区块链原理及关键技术. 计算机科学与探索, 2020, 14 (10): 1621- 1643.
URL
|
|
WANG Q, LI F J, WANG Z L, et al. Principle and core technology of blockchain. Journal of Frontiers of Computer Science and Technology, 2020, 14 (10): 1621- 1643.
URL
|
2 |
张亮, 刘百祥, 张如意, 等. 区块链技术综述. 计算机工程, 2019, 45 (5): 1- 12.
URL
|
|
ZHANG L, LIU B X, ZHANG R Y, et al. Overview of blockchain technology. Computer Engineering, 2019, 45 (5): 1- 12.
URL
|
3 |
AGGARWAL S, KUMAR N. Blockchain 2.0: smart contracts. Advances in Computers, 2021, 121, 301- 322.
doi: 10.1016/bs.adcom.2020.08.015
|
4 |
DHILLON V, METCALF D, HOOPER M. Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. New York, USA: Apress, 2021: 247- 288.
|
5 |
陈伟利, 郑子彬. 区块链数据分析: 现状、趋势与挑战. 计算机研究与发展, 2018, 55 (9): 1853- 1870.
URL
|
|
CHEN W L, ZHENG Z B. Blockchain data analysis: a review of status, trends and challenges. Journal of Computer Research and Development, 2018, 55 (9): 1853- 1870.
URL
|
6 |
曹雪莲, 张建辉, 刘波. 区块链安全、隐私与性能问题研究综述. 计算机集成制造系统, 2021, 27 (7): 2078- 2094.
URL
|
|
CAO X L, ZHANG J H, LIU B. Review on security, privacy, and performance issues of blockchain. Computer Integrated Manufacturing Systems, 2021, 27 (7): 2078- 2094.
URL
|
7 |
陈丽燕, 芮廷先, 吕光金. 基于区块链智能合约的个人征信隐私保护方案. 计算机工程, 2020, 46 (7): 30- 35.
URL
|
|
CHEN L Y, RUI T X, LÜ G J. Privacy protection scheme of personal credit based on smart contract in blockchain. Computer Engineering, 2020, 46 (7): 30- 35.
URL
|
8 |
|
9 |
|
10 |
AXON L, GOLDSMITH M, CREESE S. Privacy requirements in cybersecurity applications of blockchain. Advances in Computers, 2018, 111, 229- 278.
|
11 |
|
12 |
王群, 李馥娟, 倪雪莉, 等. 区块链共识算法及应用研究. 计算机科学与探索, 2022, 16 (6): 1214- 1242.
URL
|
|
WANG Q, LI F J, NI X L, et al. Survey on blockchain consensus algorithms and application. Journal of Frontiers of Computer Science and Technology, 2022, 16 (6): 1214- 1242.
URL
|
13 |
ZHENG Z B, XIE S A, DAI H N, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]//Proceedings of IEEE International Congress on Big Data. Washington D. C., USA: IEEE Press, 2017: 557-564.
|
14 |
武岳, 李军祥. 区块链P2P网络协议演进过程. 计算机应用研究, 2019, 36 (10): 2881-2886, 2929
URL
|
|
WU Y, LI J X. Evolution process of blockchain P2P network protocol. Application Research of Computers, 2019, 36 (10): 2881-2886, 2929
URL
|
15 |
|
16 |
|
17 |
STOICA I, MORRIS R, LIBEN-NOWELL D, et al. Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking, 2003, 11 (1): 17- 32.
|
18 |
ROWSTRON A, DRUSCHEL P. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems[C]//Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed. Berlin, Germany: Springer, 2001: 329-350.
|
19 |
ZHANG W, CHEN Z X, GLOWINSKI R, et al. Measurements and understanding of the KaZaA P2P network[C]//Proceedings of International Conference on High Performance Computing and Applications. Berlin, Germany: Springer, 2004: 425-429.
|
20 |
BRÜNJES L, GABBAY M J. UTxO- vs account-based smart contract blockchain programming paradigms[C]//Proceedings of International Symposium on Leveraging Applications of Formal Methods. Berlin, Germany: Springer, 2020: 73-88.
|
21 |
PÎRLEA G, SERGEY I. Mechanising blockchain consensus[C]//Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs. New York, USA: ACM Press, 2018: 78-90.
|
22 |
|
23 |
VESELÝ V, ŽÁDNÍK M. How to detect cryptocurrency miners? By traffic forensics!. Digital Investigation, 2019, 31, 100884.
|
24 |
|
25 |
WANG P, SUN G Y, JIANG S, et al. An efficient design and implementation of LSM-tree based key-value store on open-channel SSD[C]//Proceedings of the 9th European Conference on Computer Systems. New York, USA: ACM Press, 2014: 1-14.
|
26 |
OLSON M A, BOSTIS K, SELTZER M. Berkeley DB[C]//Proceedings of USENIX Annual Technical Conference. Berkeley, USA: USENIX Association, 1999: 1-10.
|
27 |
JOE L. Beginning CouchDB. New York, USA: Apress, 2020.
|
28 |
|
29 |
|
30 |
KRISHNAN H, ELAYIDOM M, SANTHANAKRISHNAN T. MongoDB—a comparison with NoSQL databases. International Journal of Scientific and Engineering Research, 2016, 7 (5): 1035- 1037.
|
31 |
王丹, 龙士工. 权重社交网络隐私保护中的差分隐私算法. 计算机工程, 2019, 45 (4): 114- 118.
URL
|
|
WANG D, LONG S G. Differential privacy algorithm for privacy protection in weighted social network. Computer Engineering, 2019, 45 (4): 114- 118.
URL
|
32 |
ANDOLA N, YADAV V K, VENKATESAN S, et al. Anonymity on blockchain based e-cash protocols—a survey. Computer Science Review, 2021, 40 (2): 1- 18.
|
33 |
CLIFTON C, KANTARCIOGLU M, VAIDYA J. Defining privacy for data mining[C]//Proceedings of National Science Foundation Workshop on Next Generation Data Mining. Baltimore, USA: [s. n. ], 2003: 126-133.
|
34 |
REID F, HARRIGAN M. An analysis of anonymity in the Bitcoin system[C]//Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust and the 3rd International Conference on Social Computing. Washington D. C., USA: IEEE Press, 2012: 1318-1326.
|
35 |
ERMILOV D, PANOV M, YANOVICH Y. Automatic Bitcoin address clustering[C]//Proceedings of the 16th IEEE International Conference on Machine Learning and Applications. Washington D. C., USA: IEEE Press, 2018: 461-466.
|
36 |
MEIKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of Bitcoins. Communications of the ACM, 2016, 59 (4): 86- 93.
|
37 |
WEI Q W, LI S J, LI W, et al. Decentralized hierarchical authorized payment with online wallet for blockchain[C]//Proceedings of International Conference on Wireless Algorithms, Systems, and Applications. Berlin, Germany: Springer, 2019: 358-361.
|
38 |
VAN DER HORST L, CHOO K K R, LE-KHAC N A. Process memory investigation of the Bitcoin clients Electrum and Bitcoin Core. IEEE Access, 2017, 5, 22385- 22398.
|
39 |
HELLANI H, SAMHAT A E, CHAMOUN M, et al. On blockchain technology: overview of Bitcoin and future insights[C]//Proceedings of IEEE International Multidisciplinary Conference on Engineering Technology. Washington D. C., USA: IEEE Press, 2019: 1-8.
|
40 |
|
41 |
GENNARO R, GOLDFEDER S, NARAYANAN A. Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security[C]//Proceedings of International Conference on Applied Cryptography and Network Security. Berlin, Germany: Springer, 2016: 156-174.
|
42 |
|
43 |
|
44 |
TURUANI M, VOEGTLIN T, RUSINOWITCH M. Automated verification of Electrum wallet[C]//Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer, 2016: 27-42.
|
45 |
ALMUTAIRI E, AL-MEGREN S. Usability and security analysis of the KeepKey wallet[C]//Proceedings of IEEE International Conference on Blockchain and Cryptocurrency. Washington D. C., USA: IEEE Press, 2019: 149-153.
|
46 |
BAMERT T, DECKER C, WATTENHOFER R, et al. Bluewallet: the secure Bitcoin wallet[C]//Proceedings of International Workshop on Security and Trust Management. Berlin, Germany: Springer, 2014: 65-80.
|
47 |
|
48 |
|
49 |
JARECKI S, KIAYIAS A, KRAWCZYK H, et al. Highly-efficient and composable password-protected secret sharing(or: how to protect your Bitcoin wallet online)[C]//Proceedings of IEEE European Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2016: 276-291.
|
50 |
VOLETY T, SAINI S, MCGHIN T, et al. Cracking Bitcoin wallets: I want what you have in the wallets. Future Generation Computer Systems, 2019, 91 (2): 136- 143.
|
51 |
ANDROULAKI E, KARAME G O, ROESCHLIN M, et al. Evaluating user privacy in Bitcoin[C]//Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer, 2013: 34-51.
|
52 |
HE S L, LU Y, TANG Q, et al. Blockchain-based P2P content delivery with monetary incentivization and fairness guarantee. IEEE Transactions on Parallel and Distributed Systems, 2023, 34 (2): 746- 765.
|
53 |
BONNEAU J, MILLER A, CLARK J, et al. SoK: research perspectives and challenges for Bitcoin and cryptocurrencies[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2015: 104-121.
|
54 |
KOSHY P, KOSHY D, MCDANIEL P. An analysis of anonymity in Bitcoin using P2P network traffic[C]//Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer, 2014: 469-485.
|
55 |
MAYMOUNKOV P, MAZIÈRES D. Kademlia: a peer-to-peer information system based on the XOR metric[C]//Proceedings of International Workshop on Peer-to-Peer Systems. Berlin, Germany: Springer, 2002: 53-65.
|
56 |
LIU B S, LIU Z Y, ZHANG J Y, et al. How many eyes are spying on your shared folders?[C]//Proceedings of 2012 ACM Workshop on Privacy in the Electronic Society. New York, USA: ACM Press, 2012: 109-116.
|
57 |
|