共 11 条
[1]
Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
[2]
Brugere I., 2012, TECHNICAL REPORT
[3]
Christin N., 2013, Proceedings of the 22nd International Conference on World Wide Web, WWW'13, P213, DOI DOI 10.1145/2488388.2488408
[4]
Jarvis K., 2013, CryptoLocker Ransomware
[5]
Meiklejohn S., 2013, Proceedings of the Conference on Internet Measurement Conference, P127, DOI 10.1145/2504730.2504747.10.1145
[6]
Moser M., 2013, P MUNST BITC C
[7]
Nakamoto S., 2009, Bitcoin: a peer-to-peer electronic cash system, DOI DOI 10.1007/S10838-008-9062-0
[9]
Reid F., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P1318, DOI 10.1109/PASSAT/SocialCom.2011.79
[10]
Spagnuolo M, 2013, THESIS POLITECNICO M