-
1
-
-
85080670730
-
-
Bitcoin hashrate. https://blockchain.info/ charts/hash-rate.
-
-
-
-
5
-
-
85080674164
-
-
Bitshares namespaces, 2016. http://docs. bitshares.eu/namespaces/index.html.
-
(2016)
Bitshares Namespaces
-
-
-
10
-
-
84943593919
-
-
White paper Blockstream
-
A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Timon, and P. Wuille. Enabling Blockchain Innovations with Pegged Sidechains. White paper, Blockstream, 2014. https: //blockstream.com/sidechains.pdf.
-
(2014)
Enabling Blockchain Innovations with Pegged Sidechains
-
-
Back, A.1
Corallo, M.2
Dashjr, L.3
Friedenbach, M.4
Maxwell, G.5
Miller, A.6
Poelstra, A.7
Timon, J.8
Wuille, P.9
-
14
-
-
84945176880
-
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
-
SP 2015, San Jose, CA, USA, May 17-21, 2015
-
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 104-121, 2015.
-
(2015)
2015 IEEE Symposium on Security and Privacy
, pp. 104-121
-
-
Bonneau, J.1
Miller, A.2
Clark, J.3
Narayanan, A.4
Kroll, J.A.5
Felten, E.W.6
-
16
-
-
84878569015
-
Tiered fault tolerance for long-term integrity
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Tiered fault tolerance for long-term integrity. In FAST, pages 267-282, 2009.
-
(2009)
FAST
, pp. 267-282
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
21
-
-
33947104596
-
Efficiently binding data to owners in distributed contentaddressable storage systems
-
IEEE
-
P. Eaton, H. Weatherspoon, and J. Kubiatowicz. Efficiently binding data to owners in distributed contentaddressable storage systems. In Security in Storage Workshop, 2005. SISW'05. Third IEEE International, pages 12-pp. IEEE, 2005.
-
(2005)
Security in Storage Workshop, 2005. SISW'05. Third IEEE International
, pp. 12
-
-
Eaton, P.1
Weatherspoon, H.2
Kubiatowicz, J.3
-
22
-
-
84945212793
-
Majority is not enough: Bitcoin mining is vulnerable
-
abs/1311.0243
-
I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. CoRR, abs/1311.0243, 2013.
-
(2013)
CoRR
-
-
Eyal, I.1
Sirer, E.G.2
-
24
-
-
85076769385
-
Persistent personal names for globally connected mobile devices
-
Seattle, Washington, Nov.
-
B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent personal names for globally connected mobile devices. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, Nov. 2006.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI '06)
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
25
-
-
82655182957
-
Scalable consistency in scatter
-
ACM
-
L. Glendenning, I. Beschastnikh, A. Krishnamurthy, and T. Anderson. Scalable consistency in scatter. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 15-28. ACM, 2011.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 15-28
-
-
Glendenning, L.1
Beschastnikh, I.2
Krishnamurthy, A.3
Anderson, T.4
-
27
-
-
85080705733
-
-
Incommon federation. https://www.incommon.org/ federation/.
-
-
-
-
28
-
-
0142002511
-
The elliptic curve digital signature algorithm (ecdsa)
-
D. Johnson, A. Menezes, and S. A. Vanstone. The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Sec., 1(1):36-63, 2001.
-
(2001)
Int. J. Inf. Sec.
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.A.3
-
29
-
-
85080658708
-
IPFS - Content addressed, versioned, P2P file system
-
Juan Benet. IPFS - Content Addressed, Versioned, P2P File System. Draft, ipfs.io, 2015. https://github. com/ipfs/papers.
-
(2015)
Draft, Ipfs.io
-
-
Benet, J.1
-
30
-
-
84904581637
-
Syndicate: Virtual cloud storage through provider composition
-
Jude Nelson and Larry Peterson. Syndicate: Virtual cloud storage through provider composition. In ACM BigSystem, 2014.
-
(2014)
ACM BigSystem
-
-
Nelson, J.1
Peterson, L.2
-
31
-
-
84983800295
-
An empirical study of Namecoin and lessons for decentralized namespace design
-
June
-
H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan. An empirical study of Namecoin and lessons for decentralized namespace design. WEIS '15: Proceedings of the 14th Workshop on the Economics of Information Security, June 2015.
-
(2015)
WEIS '15: Proceedings of the 14th Workshop on the Economics of Information Security
-
-
Kalodner, H.1
Carlsten, M.2
Ellenbogen, P.3
Bonneau, J.4
Narayanan, A.5
-
33
-
-
33847305587
-
Efficient and decentralized computation of approximate global state
-
Jan.
-
S. Keshav. Efficient and decentralized computation of approximate global state. SIGCOMM Comput. Commun. Rev., 36(1):69-74, Jan. 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.1
, pp. 69-74
-
-
Keshav, S.1
-
34
-
-
85080669633
-
-
Keybase. https://keybase.io.
-
-
-
-
35
-
-
84940409394
-
The economics of bitcoin mining, or bitcoin in the presence of adversaries
-
J. A. Kroll, I. C. Davey, and E. W. Felten. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In WEIS 2013.
-
(2013)
WEIS
-
-
Kroll, J.A.1
Davey, I.C.2
Felten, E.W.3
-
36
-
-
84947235017
-
Kademlia: A peerto- peer information system based on the xor metric
-
London, UK, UK, Springer-Verlag.
-
P. Maymounkov and D. Mazieres. Kademlia: A peerto- peer information system based on the xor metric. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pages 53-65, London, UK, UK, 2002. Springer-Verlag.
-
(2002)
Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
38
-
-
85076303055
-
CONIKS: Bringing key transparency to end users
-
M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. Freedman. CONIKS: bringing key transparency to end users. In 24th USENIX Security Symposium (USENIX Security 15), pages 383-398, 2015.
-
(2015)
24th USENIX Security Symposium (USENIX Security 15)
, pp. 383-398
-
-
Melara, M.S.1
Blankstein, A.2
Bonneau, J.3
Felten, E.W.4
Freedman, M.J.5
-
40
-
-
84914117917
-
Permacoin: Repurposing bitcoin work for data preservation
-
IEEE
-
A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz. Permacoin: Repurposing bitcoin work for data preservation. In Security and Privacy (SP), 2014 IEEE Symposium on, pages 475-490. IEEE, 2014.
-
(2014)
Security and Privacy (SP), 2014 IEEE Symposium on
, pp. 475-490
-
-
Miller, A.1
Juels, A.2
Shi, E.3
Parno, B.4
Katz, J.5
-
41
-
-
85080785171
-
-
Namecoin. https://namecoin.info.
-
-
-
-
43
-
-
85080770692
-
-
Onename. https://onename.com.
-
-
-
-
44
-
-
85080746259
-
-
Open assets protocol. http://www.openassets.org.
-
-
-
-
46
-
-
84883600951
-
Beehive: O(1)lookup performance for power-law query distributions in peer-to-peer overlays
-
Berkeley, CA, USA, USENIX Association.
-
V. Ramasubramanian and E. G. Sirer. Beehive: O(1)lookup performance for power-law query distributions in peer-to-peer overlays. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1, NSDI'04, pages 8-8, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1, NSDI'04
, pp. 8
-
-
Ramasubramanian, V.1
Sirer, E.G.2
-
47
-
-
34547448344
-
Openid 2.0: A platform for user-centric identity management
-
New York, NY, USA, ACM.x
-
D. Recordon and D. Reed. Openid 2.0: A platform for user-centric identity management. In Proceedings of the Second ACM Workshop on Digital Identity Management, DIM '06, pages 11-16, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the Second ACM Workshop on Digital Identity Management, DIM '06
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
48
-
-
84943547553
-
Pond: The oceanstore prototype
-
S. C. Rhea, P. R. Eaton, D. Geels, H.Weatherspoon, B. Y. Zhao, and J. Kubiatowicz. Pond: The oceanstore prototype. In FAST, volume 3, pages 1-14, 2003.
-
(2003)
FAST
, vol.3
, pp. 1-14
-
-
Rhea, S.C.1
Eaton, P.R.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.Y.5
Kubiatowicz, J.6
-
51
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
11, Feb.
-
I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. IEEE Transactions on Networking, 11, Feb. 2003.
-
(2003)
IEEE Transactions on Networking
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
|