-
1
-
-
84924964769
-
The economics of digital currencies
-
Ali, R., Barrdear, J., Clews, R., Southgate, J., The economics of digital currencies. Bank Engl Q Bull 2014 (2014), 276–286.
-
(2014)
Bank Engl Q Bull
, vol.2014
, pp. 276-286
-
-
Ali, R.1
Barrdear, J.2
Clews, R.3
Southgate, J.4
-
2
-
-
84937708072
-
Virtual currency schemes — the future of financial services
-
Mikołajewicz-Woźniak, A., Scheibe, A., Virtual currency schemes — the future of financial services. Foresight 17 (2015), 365–377, 10.1108/FS-04-2014-0021.
-
(2015)
Foresight
, vol.17
, pp. 365-377
-
-
Mikołajewicz-Woźniak, A.1
Scheibe, A.2
-
3
-
-
84969535942
-
Bitcoin — the promise and limits of private innovation in monetary and payment systems
-
Beer, C., Weber, B., Bitcoin — the promise and limits of private innovation in monetary and payment systems. Monet Policy Econ 4 (2014), 53–66.
-
(2014)
Monet Policy Econ
, vol.4
, pp. 53-66
-
-
Beer, C.1
Weber, B.2
-
4
-
-
79251545889
-
Bitcoin: A Peer-to-Peer Electronic Cash System
-
Nakamoto, S., Bitcoin: A Peer-to-Peer Electronic Cash System. 2008.
-
(2008)
-
-
Nakamoto, S.1
-
5
-
-
84940385440
-
Bitcoin: under the hood
-
Zohar, A., Bitcoin: under the hood. Commun ACM 58 (2015), 104–113, 10.1145/2701411.
-
(2015)
Commun ACM
, vol.58
, pp. 104-113
-
-
Zohar, A.1
-
6
-
-
84951760457
-
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
-
O'Reilly Media ISBN: 978-1-4493-7404-4. This book outlines the technical operation of bitcoin.
-
6• Antonopoulos, A.M., Mastering Bitcoin: Unlocking Digital Cryptocurrencies. 2014, O'Reilly Media ISBN: 978-1-4493-7404-4. http://chimera.labs.oreilly.com/books/1234000001802/index.html This book outlines the technical operation of bitcoin.
-
(2014)
-
-
Antonopoulos, A.M.1
-
7
-
-
84985991912
-
Bitcoin and beyond: a technical survey on decentralized digital currencies
-
This survey describes the basics of bitcoin, and discusses security threats and privacy properties, as well as the proof-of-work scheme and alternative approaches.
-
7• Tschorsch, F., Scheuermann, B., Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun Surv Tutor 18 (2016), 2084–2123, 10.1109/COMST.2016.2535718 This survey describes the basics of bitcoin, and discusses security threats and privacy properties, as well as the proof-of-work scheme and alternative approaches.
-
(2016)
IEEE Commun Surv Tutor
, vol.18
, pp. 2084-2123
-
-
Tschorsch, F.1
Scheuermann, B.2
-
8
-
-
84942589265
-
The bitcoin backbone protocol: analysis and applications
-
Springer
-
Garay, J., Kiayias, A., Leonardos, N., The bitcoin backbone protocol: analysis and applications. Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2015, Springer, 281–310.
-
(2015)
Annual International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 281-310
-
-
Garay, J.1
Kiayias, A.2
Leonardos, N.3
-
9
-
-
85032377843
-
-
Academic Press ISBN: 978-0-12-802117-0 This book covers technical, economical and financial aspects of bitcoin.
-
9• Chuen, D.L.K., (eds.) Handbook of Digital Currency, 2015, Academic Press ISBN: 978-0-12-802117-0 This book covers technical, economical and financial aspects of bitcoin.
-
(2015)
Handbook of Digital Currency
-
-
Chuen, D.L.K.1
-
10
-
-
84946074490
-
Bitcoin mining and its energy footprint
-
IET In this paper the energy footprint of the bitcoin network is computed. It is estimated that the electricity consumption of bitcoin mining is on par with that of Ireland.
-
10•• O'Dwyer, K.J., Malone, D., Bitcoin mining and its energy footprint. Irish Signals & Systems Conference 2014 and 2014 China–Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), 2014, IET, 280–285 In this paper the energy footprint of the bitcoin network is computed. It is estimated that the electricity consumption of bitcoin mining is on par with that of Ireland.
-
(2014)
Irish Signals & Systems Conference 2014 and 2014 China–Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014)
, pp. 280-285
-
-
O'Dwyer, K.J.1
Malone, D.2
-
11
-
-
84930794147
-
An Order-of-Magnitude Estimate of the Relative Sustainability of the Bitcoin Network
-
This paper compares the sustainability of the bitcoin network with the banking industry, the gold production industry, and the process of printing and minting of physical currency.
-
11•• McCook, H., An Order-of-Magnitude Estimate of the Relative Sustainability of the Bitcoin Network. 2015 https://www.academia.edu/7666373/An_Order-of-Magnitude_Estimate_of_the_Relative_Sustainability_of_the_Bitcoin_Network_-_3rd_Edition This paper compares the sustainability of the bitcoin network with the banking industry, the gold production industry, and the process of printing and minting of physical currency.
-
(2015)
-
-
McCook, H.1
-
12
-
-
84970968748
-
Cryptocurrency and the problem of intermediation
-
Harwick, C., Cryptocurrency and the problem of intermediation. Independ Rev 20 (2016), 569–588.
-
(2016)
Independ Rev
, vol.20
, pp. 569-588
-
-
Harwick, C.1
-
13
-
-
85019407606
-
Bitcoin: risks and controls
-
Grant, G., Hogan, R., Bitcoin: risks and controls. J Corp Account Finance 26 (2015), 29–35, 10.1002/jcaf.22060.
-
(2015)
J Corp Account Finance
, vol.26
, pp. 29-35
-
-
Grant, G.1
Hogan, R.2
-
14
-
-
85019758728
-
The bitcoin blockchain as financial market infrastructure: a consideration of operational risk
-
Walch, A., The bitcoin blockchain as financial market infrastructure: a consideration of operational risk. N Y Univ J Legisl Public Policy 18 (2015), 837–893.
-
(2015)
N Y Univ J Legisl Public Policy
, vol.18
, pp. 837-893
-
-
Walch, A.1
-
15
-
-
84952629711
-
The ethics of payments: paper, plastic, or bitcoin?
-
Angel, J.J., McCabe, D., The ethics of payments: paper, plastic, or bitcoin?. J Business Ethics 132 (2015), 603–611.
-
(2015)
J Business Ethics
, vol.132
, pp. 603-611
-
-
Angel, J.J.1
McCabe, D.2
-
16
-
-
14844310899
-
Hashcash — A Denial of Service Counter-Measure
-
Back, A., Hashcash — A Denial of Service Counter-Measure. 2002 ftp://sunsite.icm.edu.pl/site/replay.old/programs/hashcash/hashcash.pdf.
-
(2002)
-
-
Back, A.1
-
17
-
-
84975515468
-
Cryptocurrency value formation: an empirical study leading to a cost of production model for valuing bitcoin
-
(in press)
-
Hayes, A.S., Cryptocurrency value formation: an empirical study leading to a cost of production model for valuing bitcoin. Telemat Informat, 2016, 10.1016/j.tele.2016.05.005 (in press).
-
(2016)
Telemat Informat
-
-
Hayes, A.S.1
-
19
-
-
84892660416
-
Bitcoin and the age of bespoke silicon
-
IEEE Press Piscataway, NJ, USA pp. 16:1–16:10. ISBN: 978-1-4799-1400-5. This paper describes the history of bitcoin mining hardware, especially the development of ASICs, as well as the incentives and strategies of bitcoin miners.
-
19•• Taylor, M.B., Bitcoin and the age of bespoke silicon. Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES’13, 2013, IEEE Press, Piscataway, NJ, USA pp. 16:1–16:10. ISBN: 978-1-4799-1400-5. http://dl.acm.org/citation.cfm?id=2555729.2555745 This paper describes the history of bitcoin mining hardware, especially the development of ASICs, as well as the incentives and strategies of bitcoin miners.
-
(2013)
Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES’13
-
-
Taylor, M.B.1
-
20
-
-
84988376986
-
ASIC clouds: specializing the datacenter
-
IEEE Press Piscataway, NJ, USA ISBN: 978-1-4673-8947-1
-
Magaki, I., Khazraee, M., Gutierrez, L.V., Taylor, M.B., ASIC clouds: specializing the datacenter. Proceedings of the 43rd International Symposium on Computer Architecture, ISCA’16, 2016, IEEE Press, Piscataway, NJ, USA, 178–190, 10.1109/ISCA.2016.25 ISBN: 978-1-4673-8947-1.
-
(2016)
Proceedings of the 43rd International Symposium on Computer Architecture, ISCA’16
, pp. 178-190
-
-
Magaki, I.1
Khazraee, M.2
Gutierrez, L.V.3
Taylor, M.B.4
-
21
-
-
84924408978
-
Exploring miner evolution in bitcoin network
-
Springer
-
Wang, L., Liu, Y., Exploring miner evolution in bitcoin network. Proceedings 16th International Conference on Passive and Active Network Measurement; vol 8995 of Lecture Notes in Computer Science Series, 2015, Springer, 290–302, 10.1007/978-3-319-15509-8_22.
-
(2015)
Proceedings 16th International Conference on Passive and Active Network Measurement; vol 8995 of Lecture Notes in Computer Science Series
, pp. 290-302
-
-
Wang, L.1
Liu, Y.2
-
22
-
-
85016279166
-
How to successfully overcome inflection points, or long live Moore's law
-
Gargini, P.A., How to successfully overcome inflection points, or long live Moore's law. Comput Sci Eng 19 (2017), 51–62, 10.1109/MCSE.2017.32.
-
(2017)
Comput Sci Eng
, vol.19
, pp. 51-62
-
-
Gargini, P.A.1
-
23
-
-
77952256041
-
Conservation cores: reducing the energy of mature computations
-
ACM ISBN: 978-1-60558-839-1; 205-218
-
Venkatesh, G., Sampson, J., Goulding, N., Garcia, S., Bryksin, V., Lugo-Martinez, J., Swanson, S., Taylor, M.B., Conservation cores: reducing the energy of mature computations. Proceedings of the Fifteenth Edition of ASPLOS on Architectural Support for Programming Languages and Operating Systems, 2010, ACM, 10.1145/1736020.1736044 ISBN: 978-1-60558-839-1; 205-218.
-
(2010)
Proceedings of the Fifteenth Edition of ASPLOS on Architectural Support for Programming Languages and Operating Systems
-
-
Venkatesh, G.1
Sampson, J.2
Goulding, N.3
Garcia, S.4
Bryksin, V.5
Lugo-Martinez, J.6
Swanson, S.7
Taylor, M.B.8
-
24
-
-
84873690610
-
Power challenges may end the multicore era
-
Esmaeilzadeh, H., Blem, E., Amant, R.S., Sankaralingam, K., Burger, D., Power challenges may end the multicore era. Commun ACM 56 (2013), 93–102, 10.1145/2408776.2408797.
-
(2013)
Commun ACM
, vol.56
, pp. 93-102
-
-
Esmaeilzadeh, H.1
Blem, E.2
Amant, R.S.3
Sankaralingam, K.4
Burger, D.5
-
25
-
-
84886531424
-
A landscape of the new dark silicon design regime
-
Taylor, M.B., A landscape of the new dark silicon design regime. IEEE Micro 33 (2013), 8–19.
-
(2013)
IEEE Micro
, vol.33
, pp. 8-19
-
-
Taylor, M.B.1
-
26
-
-
79961040286
-
Toward dark silicon in servers
-
Hardavellas, N., Ferdman, M., Falsafi, B., Ailamaki, A., Toward dark silicon in servers. IEEE Micro 31 (2011), 6–15.
-
(2011)
IEEE Micro
, vol.31
, pp. 6-15
-
-
Hardavellas, N.1
Ferdman, M.2
Falsafi, B.3
Ailamaki, A.4
-
27
-
-
84928712295
-
Goldstrike 1: Cointerra's first-generation cryptocurrency mining processor for bitcoin
-
Barkatullah, J., Hanke, T., Goldstrike 1: Cointerra's first-generation cryptocurrency mining processor for bitcoin. IEEE Micro 35 (2015), 68–76.
-
(2015)
IEEE Micro
, vol.35
, pp. 68-76
-
-
Barkatullah, J.1
Hanke, T.2
-
28
-
-
85006925126
-
FIPS PUB 180-4, Secure Hash Standard (SHS)
-
NIST, FIPS PUB 180-4, Secure Hash Standard (SHS). 2015, 10.6028/NIST.FIPS.180-4.
-
(2015)
-
-
NIST1
-
29
-
-
84943171209
-
Bitcoin and beyond
-
Extance, A., Bitcoin and beyond. Nature 526 (2015), 21–23.
-
(2015)
Nature
, vol.526
, pp. 21-23
-
-
Extance, A.1
-
30
-
-
84961131625
-
Bitcoin meets strong consistency
-
ACM New York, NY, USA 13:1–13:10. ISBN: 978-1-4503-4032-8
-
Decker, C., Seidel, J., Wattenhofer, R., Bitcoin meets strong consistency. Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN’16, 2016, ACM, New York, NY, USA, 10.1145/2833312.2833321 13:1–13:10. ISBN: 978-1-4503-4032-8.
-
(2016)
Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN’16
-
-
Decker, C.1
Seidel, J.2
Wattenhofer, R.3
-
31
-
-
84930850900
-
Misbehavior in bitcoin: a study of double-spending and accountability
-
Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., Čapkun, S., Misbehavior in bitcoin: a study of double-spending and accountability. ACM Trans Inform Syst Security 18 (2015), 1–32, 10.1145/2732196.
-
(2015)
ACM Trans Inform Syst Security
, vol.18
, pp. 1-32
-
-
Karame, G.O.1
Androulaki, E.2
Roeschlin, M.3
Gervais, A.4
Čapkun, S.5
-
32
-
-
84954139059
-
Tampering with the delivery of blocks and transactions in bitcoin
-
ACM New York, NY, USA ISBN: 978-1-4503-3832-5
-
Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S., Tampering with the delivery of blocks and transactions in bitcoin. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15, 2015, ACM, New York, NY, USA, 692–705, 10.1145/2810103.2813655 ISBN: 978-1-4503-3832-5.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15
, pp. 692-705
-
-
Gervais, A.1
Ritzdorf, H.2
Karame, G.O.3
Capkun, S.4
-
33
-
-
84995482126
-
On the security and performance of proof of work blockchains
-
ACM New York, NY, USA ISBN: 978-1-4503-4139-4
-
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S., On the security and performance of proof of work blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS’16, 2016, ACM, New York, NY, USA, 3–16, 10.1145/2976749.2978341 ISBN: 978-1-4503-4139-4.
-
(2016)
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS’16
, pp. 3-16
-
-
Gervais, A.1
Karame, G.O.2
Wüst, K.3
Glykantzis, V.4
Ritzdorf, H.5
Capkun, S.6
-
34
-
-
84918531199
-
Towards a more democratic mining in bitcoins
-
A. Prakash R. Shyamasundar Springer International Publishing Cham ISBN: 978-3-319-13841-1
-
Paul, G., Sarkar, P., Mukherjee, S., Towards a more democratic mining in bitcoins. Prakash, A., Shyamasundar, R., (eds.) Proceedings of 10th International Conference on Information Systems Security (ICISS); vol 8880 of Lecture Notes in Computer Science (LNCS), 2014, Springer International Publishing, Cham, 185–203, 10.1007/978-3-319-13841-1_11 ISBN: 978-3-319-13841-1.
-
(2014)
Proceedings of 10th International Conference on Information Systems Security (ICISS); vol 8880 of Lecture Notes in Computer Science (LNCS)
, pp. 185-203
-
-
Paul, G.1
Sarkar, P.2
Mukherjee, S.3
-
35
-
-
85019665012
-
An overview of blockchain technology: architecture, consensus, and future trends
-
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H., An overview of blockchain technology: architecture, consensus, and future trends. Proceedings of 6th IEEE International Congress on Big Data, 2017.
-
(2017)
Proceedings of 6th IEEE International Congress on Big Data
-
-
Zheng, Z.1
Xie, S.2
Dai, H.3
Chen, X.4
Wang, H.5
-
36
-
-
84914130733
-
PPcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake
-
King, S., Nadal, S., PPcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. 2012.
-
(2012)
-
-
King, S.1
Nadal, S.2
-
37
-
-
84950269278
-
Cryptocurrencies Without Proof of Work
-
arXiv:1406.5694
-
Bentov, I., Gabizon, A., Mizrahi, A., Cryptocurrencies Without Proof of Work. 2014 arXiv:1406.5694.
-
(2014)
-
-
Bentov, I.1
Gabizon, A.2
Mizrahi, A.3
-
38
-
-
85019745073
-
A Provably Secure Proof-of-Stake Blockchain Protocol. Cryptology ePrint Archive, Report 2016/889
-
Kiayias, A., Konstantinou, I., Russell, A., David, B., Oliynykov, R., A Provably Secure Proof-of-Stake Blockchain Protocol. Cryptology ePrint Archive, Report 2016/889., 2016 http://eprint.iacr.org/2016/889.
-
(2016)
-
-
Kiayias, A.1
Konstantinou, I.2
Russell, A.3
David, B.4
Oliynykov, R.5
-
39
-
-
84945225925
-
Proof of Activity: Extending Bitcoin's Proof of Work Via Proof of Stake. Cryptology ePrint Archive, Report 2014/452
-
Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M., Proof of Activity: Extending Bitcoin's Proof of Work Via Proof of Stake. Cryptology ePrint Archive, Report 2014/452., 2014 http://eprint.iacr.org/2014/452.
-
(2014)
-
-
Bentov, I.1
Lee, C.2
Mizrahi, A.3
Rosenfeld, M.4
-
40
-
-
84927645826
-
Proofs of space: when space is of the essence
-
Springer
-
Ateniese, G., Bonacina, I., Faonio, A., Galesi, N., Proofs of space: when space is of the essence. International Conference on Security and Cryptography for Networks, 2014, Springer, 538–557.
-
(2014)
International Conference on Security and Cryptography for Networks
, pp. 538-557
-
-
Ateniese, G.1
Bonacina, I.2
Faonio, A.3
Galesi, N.4
-
41
-
-
84943408180
-
Proofs of space
-
Springer
-
Dziembowski, S., Faust, S., Kolmogorov, V., Pietrzak, K., Proofs of space. Advances in Cryptology — CRYPTO 2015; vol 9216 of Lecture Notes in Computer Science Series, 2015, Springer, 585–605, 10.1007/978-3-662-48000-7_29.
-
(2015)
Advances in Cryptology — CRYPTO 2015; vol 9216 of Lecture Notes in Computer Science Series
, pp. 585-605
-
-
Dziembowski, S.1
Faust, S.2
Kolmogorov, V.3
Pietrzak, K.4
-
42
-
-
84994412720
-
Proofs of Space–Time and Rational Proofs of Storage. Cryptology ePrint Archive, Report 2016/045
-
Report 2016/035
-
Moran, T., Orlov, I., Proofs of Space–Time and Rational Proofs of Storage. Cryptology ePrint Archive, Report 2016/045., 2016 Report 2016/035 https://eprint.iacr.org/2016/035.
-
(2016)
-
-
Moran, T.1
Orlov, I.2
-
43
-
-
85018209244
-
Blockchain beyond bitcoin
-
Underwood, S., Blockchain beyond bitcoin. Commun ACM 59 (2016), 15–17, 10.1145/2994581.
-
(2016)
Commun ACM
, vol.59
, pp. 15-17
-
-
Underwood, S.1
-
44
-
-
84969816466
-
Blockchain double bubble or double trouble?
-
Umeh, J., Blockchain double bubble or double trouble?. ITNOW 58 (2016), 58–61.
-
(2016)
ITNOW
, vol.58
, pp. 58-61
-
-
Umeh, J.1
-
45
-
-
85019737145
-
Blockchain and its coming impact on financial services
-
Fanning, K., Centers, D.P., Blockchain and its coming impact on financial services. J Corp Account Finance 27 (2016), 53–57, 10.1002/jcaf.22179.
-
(2016)
J Corp Account Finance
, vol.27
, pp. 53-57
-
-
Fanning, K.1
Centers, D.P.2
-
46
-
-
84991447929
-
Where is current research on blockchain technology? A systematic review
-
Yli-Huumo, J., Ko, D., Choi, S., Park, S., Smolander, K., Where is current research on blockchain technology? A systematic review. PLOS ONE, 11, 2016, 10.1371/journal.pone.0163477.
-
(2016)
PLOS ONE
, vol.11
-
-
Yli-Huumo, J.1
Ko, D.2
Choi, S.3
Park, S.4
Smolander, K.5
-
47
-
-
84989908504
-
Public Versus Private Blockchains — Part 1: Permissioned Blockchains. White Paper
-
BitFury Group, Garzik, J., Public Versus Private Blockchains — Part 1: Permissioned Blockchains. White Paper. 2015 http://bitfury.com/content/5-white-papers-research/public-vs-private-pt1-1.pdf.
-
(2015)
-
-
BitFury Group1
Garzik, J.2
-
48
-
-
85019736879
-
Public Versus Private Blockchains — Part 2: Permissionless Blockchains. White Paper
-
BitFury Group, Garzik, J., Public Versus Private Blockchains — Part 2: Permissionless Blockchains. White Paper. 2015 http://bitfury.com/content/5-white-papers-research/public-vs-private-pt2-1.pdf.
-
(2015)
-
-
BitFury Group1
Garzik, J.2
-
49
-
-
84985976762
-
Beyond Bitcoin — Part I: A Critical Look at Blockchain-Based Systems. Cryptology ePrint Archive, Report 2015/1164
-
Forte, P., Romano, D., Schmid, G., Beyond Bitcoin — Part I: A Critical Look at Blockchain-Based Systems. Cryptology ePrint Archive, Report 2015/1164., 2015 http://eprint.iacr.org/2015/1164.
-
(2015)
-
-
Forte, P.1
Romano, D.2
Schmid, G.3
-
50
-
-
84945225986
-
Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper
-
Wood, G., Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper. 2014, 151 http://gavwood.com/paper.pdf.
-
(2014)
, pp. 151
-
-
Wood, G.1
-
51
-
-
84995404927
-
Making smart contracts smarter
-
ACM New York, NY, USA ISBN: 978-1-4503-4139-4
-
Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A., Making smart contracts smarter. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS’16, 2016, ACM, New York, NY, USA, 254–269, 10.1145/2976749.2978309 ISBN: 978-1-4503-4139-4.
-
(2016)
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS’16
, pp. 254-269
-
-
Luu, L.1
Chu, D.H.2
Olickel, H.3
Saxena, P.4
Hobor, A.5
-
52
-
-
84954102636
-
Demystifying incentives in the consensus computer
-
ACM New York, NY, USA ISBN: 978-1-4503-3832-5
-
Luu, L., Teutsch, J., Kulkarni, R., Saxena, P., Demystifying incentives in the consensus computer. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15, 2015, ACM, New York, NY, USA, 706–719, 10.1145/2810103.2813659 ISBN: 978-1-4503-3832-5.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15
, pp. 706-719
-
-
Luu, L.1
Teutsch, J.2
Kulkarni, R.3
Saxena, P.4
|