| 1 | 王群, 李馥娟, 王振力, 等. 区块链原理及关键技术. 计算机科学与探索, 2020, 14 (10): 1621- 1643.  URL
 | 
																													
																							|  | WANG Q, LI F J, WANG Z L, et al. Principle and core technology of blockchain. Journal of Frontiers of Computer Science and Technology, 2020, 14 (10): 1621- 1643.  URL
 | 
																													
																							| 2 | 张亮, 刘百祥, 张如意, 等. 区块链技术综述. 计算机工程, 2019, 45 (5): 1- 12.  URL
 | 
																													
																							|  | ZHANG L, LIU B X, ZHANG R Y, et al. Overview of blockchain technology. Computer Engineering, 2019, 45 (5): 1- 12.  URL
 | 
																													
																							| 3 | AGGARWAL S, KUMAR N. Blockchain 2.0: smart contracts. Advances in Computers, 2021, 121, 301- 322.  doi: 10.1016/bs.adcom.2020.08.015
 | 
																													
																							| 4 | DHILLON V, METCALF D, HOOPER M. Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. New York, USA: Apress, 2021: 247- 288. | 
																													
																							| 5 | 陈伟利, 郑子彬. 区块链数据分析: 现状、趋势与挑战. 计算机研究与发展, 2018, 55 (9): 1853- 1870.  URL
 | 
																													
																							|  | CHEN W L, ZHENG Z B. Blockchain data analysis: a review of status, trends and challenges. Journal of Computer Research and Development, 2018, 55 (9): 1853- 1870.  URL
 | 
																													
																							| 6 | 曹雪莲, 张建辉, 刘波. 区块链安全、隐私与性能问题研究综述. 计算机集成制造系统, 2021, 27 (7): 2078- 2094.  URL
 | 
																													
																							|  | CAO X L, ZHANG J H, LIU B. Review on security, privacy, and performance issues of blockchain. Computer Integrated Manufacturing Systems, 2021, 27 (7): 2078- 2094.  URL
 | 
																													
																							| 7 | 陈丽燕, 芮廷先, 吕光金. 基于区块链智能合约的个人征信隐私保护方案. 计算机工程, 2020, 46 (7): 30- 35.  URL
 | 
																													
																							|  | CHEN L Y, RUI T X, LÜ G J. Privacy protection scheme of personal credit based on smart contract in blockchain. Computer Engineering, 2020, 46 (7): 30- 35.  URL
 | 
																													
																							| 8 |  | 
																													
																							| 9 |  | 
																													
																							| 10 | AXON L, GOLDSMITH M, CREESE S. Privacy requirements in cybersecurity applications of blockchain. Advances in Computers, 2018, 111, 229- 278. | 
																													
																							| 11 |  | 
																													
																							| 12 | 王群, 李馥娟, 倪雪莉, 等. 区块链共识算法及应用研究. 计算机科学与探索, 2022, 16 (6): 1214- 1242.  URL
 | 
																													
																							|  | WANG Q, LI F J, NI X L, et al. Survey on blockchain consensus algorithms and application. Journal of Frontiers of Computer Science and Technology, 2022, 16 (6): 1214- 1242.  URL
 | 
																													
																							| 13 | ZHENG Z B, XIE S A, DAI H N, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]//Proceedings of IEEE International Congress on Big Data. Washington D. C., USA: IEEE Press, 2017: 557-564. | 
																													
																							| 14 | 武岳, 李军祥. 区块链P2P网络协议演进过程. 计算机应用研究, 2019, 36 (10): 2881-2886, 2929  URL
 | 
																													
																							|  | WU Y, LI J X. Evolution process of blockchain P2P network protocol. Application Research of Computers, 2019, 36 (10): 2881-2886, 2929  URL
 | 
																													
																							| 15 |  | 
																													
																							| 16 |  | 
																													
																							| 17 | STOICA I, MORRIS R, LIBEN-NOWELL D, et al. Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking, 2003, 11 (1): 17- 32. | 
																													
																							| 18 | ROWSTRON A, DRUSCHEL P. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems[C]//Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed. Berlin, Germany: Springer, 2001: 329-350. | 
																													
																							| 19 | ZHANG W, CHEN Z X, GLOWINSKI R, et al. Measurements and understanding of the KaZaA P2P network[C]//Proceedings of International Conference on High Performance Computing and Applications. Berlin, Germany: Springer, 2004: 425-429. | 
																													
																							| 20 | BRÜNJES L, GABBAY M J. UTxO- vs account-based smart contract blockchain programming paradigms[C]//Proceedings of International Symposium on Leveraging Applications of Formal Methods. Berlin, Germany: Springer, 2020: 73-88. | 
																													
																							| 21 | PÎRLEA G, SERGEY I. Mechanising blockchain consensus[C]//Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs. New York, USA: ACM Press, 2018: 78-90. | 
																													
																							| 22 |  | 
																													
																							| 23 | VESELÝ V, ŽÁDNÍK M. How to detect cryptocurrency miners? By traffic forensics!. Digital Investigation, 2019, 31, 100884. | 
																													
																							| 24 |  | 
																													
																							| 25 | WANG P, SUN G Y, JIANG S, et al. An efficient design and implementation of LSM-tree based key-value store on open-channel SSD[C]//Proceedings of the 9th European Conference on Computer Systems. New York, USA: ACM Press, 2014: 1-14. | 
																													
																							| 26 | OLSON M A, BOSTIS K, SELTZER M. Berkeley DB[C]//Proceedings of USENIX Annual Technical Conference. Berkeley, USA: USENIX Association, 1999: 1-10. | 
																													
																							| 27 | JOE L. Beginning CouchDB. New York, USA: Apress, 2020. | 
																													
																							| 28 |  | 
																													
																							| 29 |  | 
																													
																							| 30 | KRISHNAN H, ELAYIDOM M, SANTHANAKRISHNAN T. MongoDB—a comparison with NoSQL databases. International Journal of Scientific and Engineering Research, 2016, 7 (5): 1035- 1037. | 
																													
																							| 31 | 王丹, 龙士工. 权重社交网络隐私保护中的差分隐私算法. 计算机工程, 2019, 45 (4): 114- 118.  URL
 | 
																													
																							|  | WANG D, LONG S G. Differential privacy algorithm for privacy protection in weighted social network. Computer Engineering, 2019, 45 (4): 114- 118.  URL
 | 
																													
																							| 32 | ANDOLA N, YADAV V K, VENKATESAN S, et al. Anonymity on blockchain based e-cash protocols—a survey. Computer Science Review, 2021, 40 (2): 1- 18. | 
																													
																							| 33 | CLIFTON C, KANTARCIOGLU M, VAIDYA J. Defining privacy for data mining[C]//Proceedings of National Science Foundation Workshop on Next Generation Data Mining. Baltimore, USA: [s. n. ], 2003: 126-133. | 
																													
																							| 34 | REID F, HARRIGAN M. An analysis of anonymity in the Bitcoin system[C]//Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust and the 3rd International Conference on Social Computing. Washington D. C., USA: IEEE Press, 2012: 1318-1326. | 
																													
																							| 35 | ERMILOV D, PANOV M, YANOVICH Y. Automatic Bitcoin address clustering[C]//Proceedings of the 16th IEEE International Conference on Machine Learning and Applications. Washington D. C., USA: IEEE Press, 2018: 461-466. | 
																													
																							| 36 | MEIKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of Bitcoins. Communications of the ACM, 2016, 59 (4): 86- 93. | 
																													
																							| 37 | WEI Q W, LI S J, LI W, et al. Decentralized hierarchical authorized payment with online wallet for blockchain[C]//Proceedings of International Conference on Wireless Algorithms, Systems, and Applications. Berlin, Germany: Springer, 2019: 358-361. | 
																													
																							| 38 | VAN DER HORST L, CHOO K K R, LE-KHAC N A. Process memory investigation of the Bitcoin clients Electrum and Bitcoin Core. IEEE Access, 2017, 5, 22385- 22398. | 
																													
																							| 39 | HELLANI H, SAMHAT A E, CHAMOUN M, et al. On blockchain technology: overview of Bitcoin and future insights[C]//Proceedings of IEEE International Multidisciplinary Conference on Engineering Technology. Washington D. C., USA: IEEE Press, 2019: 1-8. | 
																													
																							| 40 |  | 
																													
																							| 41 | GENNARO R, GOLDFEDER S, NARAYANAN A. Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security[C]//Proceedings of International Conference on Applied Cryptography and Network Security. Berlin, Germany: Springer, 2016: 156-174. | 
																													
																							| 42 |  | 
																													
																							| 43 |  | 
																													
																							| 44 | TURUANI M, VOEGTLIN T, RUSINOWITCH M. Automated verification of Electrum wallet[C]//Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer, 2016: 27-42. | 
																													
																							| 45 | ALMUTAIRI E, AL-MEGREN S. Usability and security analysis of the KeepKey wallet[C]//Proceedings of IEEE International Conference on Blockchain and Cryptocurrency. Washington D. C., USA: IEEE Press, 2019: 149-153. | 
																													
																							| 46 | BAMERT T, DECKER C, WATTENHOFER R, et al. Bluewallet: the secure Bitcoin wallet[C]//Proceedings of International Workshop on Security and Trust Management. Berlin, Germany: Springer, 2014: 65-80. | 
																													
																							| 47 |  | 
																													
																							| 48 |  | 
																													
																							| 49 | JARECKI S, KIAYIAS A, KRAWCZYK H, et al. Highly-efficient and composable password-protected secret sharing(or: how to protect your Bitcoin wallet online)[C]//Proceedings of IEEE European Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2016: 276-291. | 
																													
																							| 50 | VOLETY T, SAINI S, MCGHIN T, et al. Cracking Bitcoin wallets: I want what you have in the wallets. Future Generation Computer Systems, 2019, 91 (2): 136- 143. | 
																													
																							| 51 | ANDROULAKI E, KARAME G O, ROESCHLIN M, et al. Evaluating user privacy in Bitcoin[C]//Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer, 2013: 34-51. | 
																													
																							| 52 | HE S L, LU Y, TANG Q, et al. Blockchain-based P2P content delivery with monetary incentivization and fairness guarantee. IEEE Transactions on Parallel and Distributed Systems, 2023, 34 (2): 746- 765. | 
																													
																							| 53 | BONNEAU J, MILLER A, CLARK J, et al. SoK: research perspectives and challenges for Bitcoin and cryptocurrencies[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2015: 104-121. | 
																													
																							| 54 | KOSHY P, KOSHY D, MCDANIEL P. An analysis of anonymity in Bitcoin using P2P network traffic[C]//Proceedings of International Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer, 2014: 469-485. | 
																													
																							| 55 | MAYMOUNKOV P, MAZIÈRES D. Kademlia: a peer-to-peer information system based on the XOR metric[C]//Proceedings of International Workshop on Peer-to-Peer Systems. Berlin, Germany: Springer, 2002: 53-65. | 
																													
																							| 56 | LIU B S, LIU Z Y, ZHANG J Y, et al. How many eyes are spying on your shared folders?[C]//Proceedings of 2012 ACM Workshop on Privacy in the Electronic Society. New York, USA: ACM Press, 2012: 109-116. | 
																													
																							| 57 |  |