共 52 条
[1]
ZombieCoin: Powering Next-Generation Botnets with Bitcoin
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8976
:34-48
[2]
Androulaki Elli, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P161, DOI 10.1007/978-3-319-08593-7_11
[3]
On the Malleability of Bitcoin Transactions
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8976
:1-18
[4]
PoW-Based Distributed Cryptography with No Trusted Setup
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:379-399
[5]
[Anonymous], LECT NOTES COMPUTER
[6]
[Anonymous], BLUEPRINT NEW EC
[7]
[Anonymous], 2004, PUBLIC KEY INFRASTRU
[8]
[Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
[9]
[Anonymous], 2015, PROC INT C NETW SYS
[10]
[Anonymous], 2015, 2015 IEEE S VISUALIZ, DOI DOI 10.1109/VIZSEC.2015.7312773