共 28 条
[1]
[Anonymous], 2014, [No title captured]
[2]
[Anonymous], 2015, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, DOI DOI 10.1016/C2013-0-06836-3
[3]
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:287-304
[4]
Cascudo Ignacio, 2017, Applied Cryptography and Network Security. 15th International Conference, ACNS 2017. Proceedings: LNCS 10355, P537, DOI 10.1007/978-3-319-61204-1_27
[7]
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
[J].
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT),
2018,
:85-92
[8]
Hassanzadeh A, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P795, DOI 10.1109/WF-IoT.2015.7389155
[9]
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:276-291
[10]
Kim JT, 2018, I C INF COMM TECH CO, P932, DOI 10.1109/ICTC.2018.8539561

