区块链应用指南:方法与实践
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

参考文献

[1]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2008-10-31].https://bitcoin.org/bitcoin.pdf.

[2]Blockchain and distributed ledger technologies—Vocabulary:ISO 22739:2020[S/OL].[2021-07-16].https://www.iso.org/standard/73771.html.

[3]中国区块链技术和产业发展论坛.区块链 参考架构:CBD-Forum-001-2017:2017[S/OL].[2020-05-15].http://www.cbdforum.cn/bcweb/resources/upload/ueditor/jsp/upload/file/20201217/1608188444336059074.pdf.

[4]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):581-494.

[5]Government Office of Science.Distributed Ledger Technology:Beyond Blockchain[EB/OL].[2021-02-10].https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/492972/gs-16-1-distributed-ledger-technology.pdf.

[6]HABER S,STORNETTA W S.How to time-stamp a digital document[C]//Conference on the Theory and Application of Cryptography.Springer,1990:437-455.

[7]BAYER D,HABER S,STORNETTA W S.Improving the efficiency and reliability of digital time-stamping[C]//Sequences II:Methods in Communication,Security,and Computer Science.Springer,1993:329-334.

[8]JAKOBSSON M,JUELS A.Proofs of work and bread pudding protocols[C]//IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security(CMS’99).Leuven,Belgium,1999:258-272.

[9]DWORK C,NAOR M.Pricing via processing or combating junk mail[C]//CRYPTO’92:Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology,1992:139-147.

[10]EYAL I,SIRER E G.Majority is not enough:Bitcoin mining is vulnerable[C]//International conference on financial cryptography and data security.Springer,2014:436-454.

[11]袁勇,王飞跃.区块链理论与方法[M].北京:清华大学出版社,2019.

[12]Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems:ISO/TR 23455:2019[S/OL].[2021-07-16].https://www.iso.org/standard/75624.html?browse=tc.