메뉴 건너뛰기




Volumn 11, Issue 10, 2016, Pages

Where is current research on Blockchain technology? - A systematic review

Author keywords

[No Author keywords available]

Indexed keywords

BLOCKCHAIN TECHNOLOGY; CLINICAL PROTOCOL; COMMERCIAL PHENOMENA; DATA BASE; DATA MINING; INFORMATION PROCESSING; MEDICAL RESEARCH; METHODOLOGY; PUBLICATION; RESOURCE MANAGEMENT; REVIEW; SYSTEMATIC REVIEW; COST BENEFIT ANALYSIS; ECONOMICS; HUMAN; RESEARCH; TECHNOLOGY; TRENDS;

EID: 84991447929     PISSN: None     EISSN: 19326203     Source Type: Journal    
DOI: 10.1371/journal.pone.0163477     Document Type: Article
Times cited : (1614)

References (58)
  • 4
    • 84881223453 scopus 로고    scopus 로고
    • Bitcoin: A peer-to-peer electronic cash system
    • Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Consulted. 2008;1(2012):28.
    • (2008) Consulted , vol.1 , Issue.2012 , pp. 28
    • Nakamoto, S.1
  • 5
    • 84895544988 scopus 로고    scopus 로고
    • Do the rich get richer? An empirical analysis of the Bitcoin transaction network
    • 24505257
    • Kondor D, Posfai M, Csabai I, Vattay G. Do the rich get richer? An empirical analysis of the Bitcoin transaction network. PloS one. 2014;9(2):e86197. doi: 10.1371/journal.pone.0086197 PMID: 24505257
    • (2014) PloS One , vol.9 , Issue.2 , pp. e86197
    • Kondor, D.1    Posfai, M.2    Csabai, I.3    Vattay, G.4
  • 6
    • 84926638993 scopus 로고    scopus 로고
    • Research and challenges on bitcoin anonymity
    • Garcia-Alfaro J, Herrera-Joancomart J, Lupu E, Posegga J, Aldini A, Martinelli F, et al., editors, Springer International Publishing
    • Herrera-Joancomart J. Research and Challenges on Bitcoin Anonymity. In: Garcia-Alfaro J, Herrera-Joancomart J, Lupu E, Posegga J, Aldini A, Martinelli F, et al., editors. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. vol. 8872 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 3-16. Available from: http://dx.doi.org/10.1007/978-3-319-17016-9-1.
    • (2015) Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Vol. 8872 of Lecture Notes in Computer Science , pp. 3-16
    • Herrera-Joancomart, J.1
  • 7
    • 85067587353 scopus 로고    scopus 로고
    • Accessed: 24/3/2016
    • Bitcoincharts; 2016. Accessed: 24/3/2016. https://bitcoincharts.com.
    • (2016)
    • Bitcoincharts1
  • 8
    • 12344277323 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc.
    • Housley R. In: Public Key Infrastructure (PKI). John Wiley & Sons, Inc.; 2004. Available from: http://dx.doi.org/10.1002/047148296X.tie149.
    • (2004) Public Key Infrastructure (PKI)
    • Housley, R.1
  • 9
    • 85067587471 scopus 로고    scopus 로고
    • Accessed: 24/3/2016
    • Double-spending; 2016. Accessed: 24/3/2016. https://en. bitcoin. it/wiki/Double-spending.
    • (2016)
    • Double-Spending1
  • 10
    • 85067587856 scopus 로고    scopus 로고
    • Accessed: 24/3/2016
    • Bitcoinwiki; 2015. Accessed: 24/3/2016. https://en. bitcoin. it.
    • (2015)
    • Bitcoinwiki1
  • 12
    • 85067587395 scopus 로고    scopus 로고
    • Accessed: 24/3/2016
    • Proof-of-Stake; 2016. Accessed: 24/3/2016. https://en. bitcoin. it/wiki/Proof of Stake.
    • (2016)
    • Proof-of-Stake1
  • 14
    • 44649189162 scopus 로고    scopus 로고
    • Empirical studies of agile software development: A systematic review
    • Dybå T, Dingsøyr T. Empirical studies of agile software development: A systematic review. Information and Software Technology. 2008;50(910):833-859. http://dx.doi.org/10.1016/j.infsof.2008.01.006.
    • (2008) Information and Software Technology , vol.50 , Issue.910 , pp. 833-859
    • Dybå, T.1    Dingsøyr, T.2
  • 16
    • 84918531199 scopus 로고    scopus 로고
    • Towards a more democratic mining in bitcoins
    • Prakash A, Shyamasundar R, editors, Springer International Publishing
    • Paul G, Sarkar P, Mukherjee S. Towards a More Democratic Mining in Bitcoins. In: Prakash A, Shyamasundar R, editors. Information Systems Security. vol. 8880 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 185-203. Available from: http://dx.doi.org/10.1007/978-3-319-13841-1 11.
    • (2014) Information Systems Security. Vol. 8880 of Lecture Notes in Computer Science , pp. 185-203
    • Paul, G.1    Sarkar, P.2    Mukherjee, S.3
  • 17
    • 84951869859 scopus 로고    scopus 로고
    • Two-factor authentication for the bitcoin protocol
    • Foresti S, editor, Springer International Publishing
    • Mann C, Loebenberger D. Two-Factor Authentication for the Bitcoin Protocol. In: Foresti S, editor. Security and Trust Management. vol. 9331 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 155-171. Available from: http://dx.doi.org/10.1007/978-3-319-24858-5-10.
    • (2015) Security and Trust Management. Vol. 9331 of Lecture Notes in Computer Science , pp. 155-171
    • Mann, C.1    Loebenberger, D.2
  • 21
    • 84924408978 scopus 로고    scopus 로고
    • Exploring miner evolution in bitcoin network
    • Mirkovic J, Liu Y, editors, Springer International Publishing
    • Wang L, Liu Y. Exploring Miner Evolution in Bitcoin Network. In: Mirkovic J, Liu Y, editors. Passive and Active Measurement. vol. 8995 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 290-302. Available from: http://dx.doi.org/10.1007/978-3-319-15509-8-22.
    • (2015) Passive and Active Measurement. Vol. 8995 of Lecture Notes in Computer Science , pp. 290-302
    • Wang, L.1    Liu, Y.2
  • 23
    • 84916608776 scopus 로고    scopus 로고
    • BitIodine: Extracting intelligence from the bitcoin network
    • Christin N, Safavi-Naini R, editors, Springer Berlin Heidelberg
    • Spagnuolo M, Maggi F, Zanero S. BitIodine: Extracting Intelligence from the Bitcoin Network. In: Christin N, Safavi-Naini R, editors. Financial Cryptography and Data Security. vol. 8437 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 457-468. Available from: http://dx.doi.org/10.1007/978-3-662-45472-5 29.
    • (2014) Financial Cryptography and Data Security. Vol. 8437 of Lecture Notes in Computer Science , pp. 457-468
    • Spagnuolo, M.1    Maggi, F.2    Zanero, S.3
  • 24
    • 84950268080 scopus 로고    scopus 로고
    • Blindcoin: Blinded, accountable mixes for bitcoin
    • Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
    • Valenta L, Rowan B. Blindcoin: Blinded, Accountable Mixes for Bitcoin. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 112-126. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9-9.
    • (2015) Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science , pp. 112-126
    • Valenta, L.1    Rowan, B.2
  • 25
    • 84910643373 scopus 로고    scopus 로고
    • Challenges and opportunities associated with a bitcoin-based transaction rating system
    • Bhme R, Brenner M, Moore T, Smith M, editors, Springer Berlin Heidelberg
    • Vandervort D. Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System. In: Bhme R, Brenner M, Moore T, Smith M, editors. Financial Cryptography and Data Security. vol. 8438 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 33-42. Available from: http://dx.doi.org/10.1007/978-3-662-44774-1-3.
    • (2014) Financial Cryptography and Data Security. Vol. 8438 of Lecture Notes in Computer Science , pp. 33-42
    • Vandervort, D.1
  • 29
    • 84950235652 scopus 로고    scopus 로고
    • Issues in designing a bitcoin-like community currency
    • Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
    • Vandervort D, Gaucas D, Jacques R. Issues in Designing a Bitcoin-like Community Currency. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 78-91. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9 6.
    • (2015) Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science , pp. 78-91
    • Vandervort, D.1    Gaucas, D.2    Jacques, R.3
  • 30
    • 84916608111 scopus 로고    scopus 로고
    • Majority is not enough: Bitcoin mining is vulnerable
    • Christin N, Safavi-Naini R, editors, Springer Berlin Heidelberg
    • Eyal I, Sirer E. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In: Christin N, Safavi-Naini R, editors. Financial Cryptography and Data Security. vol. 8437 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 436-454. Available from: http://dx.doi.org/10.1007/978-3-662-45472-5-28.
    • (2014) Financial Cryptography and Data Security. Vol. 8437 of Lecture Notes in Computer Science , pp. 436-454
    • Eyal, I.1    Sirer, E.2
  • 32
    • 84950265272 scopus 로고    scopus 로고
    • Privacy-enhancing overlays in bitcoin
    • Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
    • Meiklejohn S, Orlandi C. Privacy-Enhancing Overlays in Bitcoin. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 127-141. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9-10.
    • (2015) Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science , pp. 127-141
    • Meiklejohn, S.1    Orlandi, C.2
  • 33
    • 84949988990 scopus 로고    scopus 로고
    • Theres no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams
    • Bhme R, Okamoto T, editors, Springer Berlin Heidelberg
    • Vasek M, Moore T. Theres No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In: Bhme R, Okamoto T, editors. Financial Cryptography and Data Security. vol. 8975 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 44-61. Available from: http://dx.doi.org/10.1007/978-3-662-47854-7 4.
    • (2015) Financial Cryptography and Data Security. Vol. 8975 of Lecture Notes in Computer Science , pp. 44-61
    • Vasek, M.1    Moore, T.2
  • 34
    • 84950253378 scopus 로고    scopus 로고
    • ZombieCoin: Powering next-generation botnets with bitcoin
    • Brenner M, Christin N, Johnson B, Rohloff K, editors, Springer Berlin Heidelberg
    • Ali S, McCorry P, Lee PJ, Hao F. ZombieCoin: Powering Next-Generation Botnets with Bitcoin. In: Brenner M, Christin N, Johnson B, Rohloff K, editors. Financial Cryptography and Data Security. vol. 8976 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 34-48. Available from: http://dx.doi.org/10.1007/978-3-662-48051-9-3.
    • (2015) Financial Cryptography and Data Security. Vol. 8976 of Lecture Notes in Computer Science , pp. 34-48
    • Ali, S.1    McCorry, P.2    Lee, P.J.3    Hao, F.4
  • 35
    • 84916608777 scopus 로고    scopus 로고
    • An analysis of anonymity in bitcoin using P2P network traffic
    • Christin N, Safavi-Naini R, editors, Springer Berlin Heidelberg
    • Koshy P, Koshy D, McDaniel P. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In: Christin N, Safavi-Naini R, editors. Financial Cryptography and Data Security. vol. 8437 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2014. p. 469-485. Available from: http://dx. doi.org/10.1007/978-3-662-45472-5-30.
    • (2014) Financial Cryptography and Data Security. Vol. 8437 of Lecture Notes in Computer Science , pp. 469-485
    • Koshy, P.1    Koshy, D.2    McDaniel, P.3
  • 36
    • 84906519189 scopus 로고    scopus 로고
    • Bitcoin transaction malleability and MtGox
    • Kutyowski M, Vaidya J, editors, Springer International Publishing
    • Decker C, Wattenhofer R. Bitcoin Transaction Malleability and MtGox. In: Kutyowski M, Vaidya J, editors. Computer Security-ESORICS 2014. vol. 8713 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 313-326. Available from: http://dx.doi.org/10.1007/978-3-319-11212-1 18.
    • (2014) Computer Security-ESORICS 2014. Vol. 8713 of Lecture Notes in Computer Science , pp. 313-326
    • Decker, C.1    Wattenhofer, R.2
  • 37
    • 84906500300 scopus 로고    scopus 로고
    • CoinShuffle: Practical decentralized coin mixing for bitcoin
    • Kutyowski M, Vaidya J, editors, Springer International Publishing
    • Ruffing T, Moreno-Sanchez P, Kate A. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. In: Kutyowski M, Vaidya J, editors. Computer Security-ESORICS 2014. vol. 8713 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 345-364. Available from: http://dx.doi.org/10.1007/978-3-319-11212-1-20.
    • (2014) Computer Security-ESORICS 2014. Vol. 8713 of Lecture Notes in Computer Science , pp. 345-364
    • Ruffing, T.1    Moreno-Sanchez, P.2    Kate, A.3
  • 39
    • 84942589265 scopus 로고    scopus 로고
    • The bitcoin backbone protocol: Analysis and applications
    • Oswald E, Fischlin M, editors, Springer Berlin Heidelberg
    • Garay J, Kiayias A, Leonardos N. The Bitcoin Backbone Protocol: Analysis and Applications. In: Oswald E, Fischlin M, editors. Advances in Cryptology-EUROCRYPT2015. vol. 9057 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 281-310. Available from: http://dx. doi.org/10.1007/978-3-662-46803-6-10.
    • (2015) Advances in Cryptology-EUROCRYPT2015. Vol. 9057 of Lecture Notes in Computer Science , pp. 281-310
    • Garay, J.1    Kiayias, A.2    Leonardos, N.3
  • 40
    • 84943402614 scopus 로고    scopus 로고
    • PoW-based distributed cryptography with no trusted setup
    • Gennaro R, Robshaw M, editors, Springer Berlin Heidelberg
    • Andrychowicz M, Dziembowski S. PoW-Based Distributed Cryptography with No Trusted Setup. In: Gennaro R, Robshaw M, editors. Advances in Cryptology-CRYPTO 2015. vol. 9216 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2015. p. 379-399. Available from: http://dx.doi.org/10.1007/978-3-662-48000-7-19.
    • (2015) Advances in Cryptology-CRYPTO 2015. Vol. 9216 of Lecture Notes in Computer Science , pp. 379-399
    • Andrychowicz, M.1    Dziembowski, S.2
  • 41
    • 84904168248 scopus 로고    scopus 로고
    • Hiding transaction amounts and balances in bitcoin
    • Holz T, Ioannidis S, editors, Springer International Publishing
    • Androulaki E, Karame G. Hiding Transaction Amounts and Balances in Bitcoin. In: Holz T, Ioannidis S, editors. Trust and Trustworthy Computing. vol. 8564 of Lecture Notes in Computer Science. Springer International Publishing; 2014. p. 161-178. Available from: http://dx.doi.org/10.1007/978-3-319-08593-7 11.
    • (2014) Trust and Trustworthy Computing. Vol. 8564 of Lecture Notes in Computer Science , pp. 161-178
    • Androulaki, E.1    Karame, G.2
  • 43
    • 84952360555 scopus 로고    scopus 로고
    • Electronic contract signing without using trusted third party
    • Qiu M, Xu S, Yung M, Zhang H, editors, Springer International Publishing
    • Wan Z, Deng R, Lee D. Electronic Contract Signing Without Using Trusted Third Party. In: Qiu M, Xu S, Yung M, Zhang H, editors. Network and System Security. vol. 9408 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 386-394. Available from: http://dx.doi.org/10. 1007/978-3-319-25645-0 27.
    • (2015) Network and System Security. Vol. 9408 of Lecture Notes in Computer Science , pp. 386-394
    • Wan, Z.1    Deng, R.2    Lee, D.3
  • 44
    • 84952324703 scopus 로고    scopus 로고
    • From pretty good to great: Enhancing PGP using bitcoin and the blockchain
    • Qiu M, Xu S, Yung M, Zhang H, editors, Springer International Publishing
    • Wilson D, Ateniese G. From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. In: Qiu M, Xu S, Yung M, Zhang H, editors. Network and System Security. vol. 9408 of Lecture Notes in Computer Science. Springer International Publishing; 2015. p. 368-375. Available from: http://dx. doi.org/10.1007/978-3-319-25645-0 25.
    • (2015) Network and System Security. Vol. 9408 of Lecture Notes in Computer Science , pp. 368-375
    • Wilson, D.1    Ateniese, G.2
  • 49
    • 84900790682 scopus 로고    scopus 로고
    • An inquiry into money laundering tools in the Bitcoin ecosystem
    • Moser M, Bohme R, Breuker D. An inquiry into money laundering tools in the Bitcoin ecosystem. In: eCrime Researchers Summit (eCRS), 2013;2013. p. 1-14.
    • (2013) ECrime Researchers Summit (eCRS) , vol.2013 , pp. 1-14
    • Moser, M.1    Bohme, R.2    Breuker, D.3
  • 53
    • 84902673916 scopus 로고    scopus 로고
    • Analyzing the Deployment of Bitcoin's {P2P} Network under an AS-level Perspective
    • Feld S, Schnfeld M, Werner M. Analyzing the Deployment of Bitcoin's {P2P} Network under an AS-level Perspective. Procedia Computer Science. 2014;32:1121-1126. http://dx.doi.org/10.1016/j. procs.2014.05.542.
    • (2014) Procedia Computer Science , vol.32 , pp. 1121-1126
    • Feld, S.1    Schnfeld, M.2    Werner, M.3
  • 54
    • 84928712295 scopus 로고    scopus 로고
    • Goldstrike 1: CoinTerra's first-generation cryptocurrency mining processor for bitcoin
    • Barkatullah J, Hanke T. Goldstrike 1: CoinTerra's First-Generation Cryptocurrency Mining Processor for Bitcoin. Micro, IEEE. 2015;35(2):68-76. doi: 10.1109/MM.2015.13
    • (2015) Micro, IEEE , vol.35 , Issue.2 , pp. 68-76
    • Barkatullah, J.1    Hanke, T.2
  • 55
    • 85057957993 scopus 로고    scopus 로고
    • Energy-efficient adaptive resource management for real-time vehicular cloud services
    • Shojafar M, Cordeschi N, Baccarelli E. Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services. IEEE Transactions on Cloud Computing. 7(1),2016,pp:196-209
    • (2016) IEEE Transactions on Cloud Computing , vol.7 , Issue.1 , pp. 196-209
    • Shojafar, M.1    Cordeschi, N.2    Baccarelli, E.3
  • 56
    • 84964260924 scopus 로고    scopus 로고
    • Cloud-centric multi-level authentication as a service for secure public safety device networks
    • Butun I, Erol-Kantarci M, Kantarci B, Song H. Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communications Magazine. 2016;54(4):47-53. doi: 10. 1109/MCOM.2016.7452265
    • (2016) IEEE Communications Magazine , vol.54 , Issue.4 , pp. 47-53
    • Butun, I.1    Erol-Kantarci, M.2    Kantarci, B.3    Song, H.4
  • 57
    • 84922968556 scopus 로고    scopus 로고
    • Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees
    • Cordeschi N, Amendola D, Shojafar M, Baccarelli E. Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees. Vehicular Communications. 2015;2(1):1–12.
    • (2015) Vehicular Communications , vol.2 , Issue.1 , pp. 1-12
    • Cordeschi, N.1    Amendola, D.2    Shojafar, M.3    Baccarelli, E.4
  • 58
    • 79957507487 scopus 로고    scopus 로고
    • Usability evaluation methods for the web: A systematic mapping study
    • Fernandez A, Insfran E, Abraho S. Usability evaluation methods for the web: A systematic mapping study. Information and Software Technology. 2011;53(8):789-817. http://dx.doi.org/10.1016/j.infsof. 2011.02.007.
    • (2011) Information and Software Technology , vol.53 , Issue.8 , pp. 789-817
    • Fernandez, A.1    Insfran, E.2    Abraho, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.