[1] Underwood S. Blockchain beyond bitcoin[J]. Communications of the ACM, 2016, 59(11): 15-17.
[2] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2019-09-24]. https://bitcoin.org/bitcoin.pdf.
[3] Salah K, Rehman M H, Nizamuddin N, et al. Blockchain for AI: review and open research challenges[J]. IEEE Access, 2019, 7: 10127-10149.
[4] Ferrag M A, Derdour M, Mukherjee M, et al. Blockchain technologies for the internet of things: research issues and challenges[J]. IEEE Internet of Things Journal, 2018, 6(2): 2188-2204.
[5] Agbo C, Mahmoud Q, Eklund J. Blockchain technology in healthcare: a systematic review[J]. Healthcare, 2019, 7(2): 56.
[6] Wang X, Feng L B, Zhang H. Human resource information management model based on blockchain technology[C]//Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, San Francisco, Apr 6-9, 2017. Washington: IEEE Computer Society, 2017: 168-173.
[7] Boireau O. Securing the blockchain against hackers[J]. Network Security, 2018(1): 8-11.
[8] Feng Q, He D H, Zeadally S, et al. A survey on privacy protection in blockchain system[J]. Journal of Network and Computer Applications, 2018, 126: 45-58.
[9] Shen X, Pei Q Q, Liu X F. Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016, 2(11): 11-20. 沈鑫, 裴庆祺, 刘雪峰. 区块链技术综述[J]. 网络与信息安全学报, 2016, 2(11): 11-20.
[10] Singh S, Singh N. Blockchain: future of financial and cyber security[C]//Proceedings of the 2nd International Conference on Contemporary Computing and Informatics, Noida, Dec 14-17, 2016. Piscataway: IEEE, 2016: 463-467.
[11] Dasgupta D, Shrein J M, Gupta K D. A survey of blockchain from security perspective[J]. Journal of Banking and Financial Technology, 2019, 3(1): 1-17.
[12] Kaushal P K, Bagga A, Sobti R. Evolution of bitcoin and security risk in bitcoin wallets[C]//Proceedings of the 2017 International Conference on Computer, Communications and Electronics, Jaipur, Jul 1-2, 2017. Piscataway: IEEE, 2017: 172-177.
[13] Liu A D, Du X H, Wang N. Research progress of blockchain technology and its application in information security[J]. Journal of Software, 2018, 29(7): 2092-2115. 刘敖迪, 杜学绘, 王娜. 区块链技术及其在信息安全领域的研究进展[J]. 软件学报, 2018, 29(7): 2092-2115.
[14] Wang H, Song X F, Ke J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency[J]. Netinfo Security, 2017(7): 32-39. 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39.
[15] Zhu L H, Gao F, Shen M. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.祝烈煌, 高峰, 沈蒙. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186.
[16] Zheng Z, Xie S, Dai H, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]//Proceedings of the 2017 IEEE International Congress on Big Data, Honolulu, Jun 25-30, 2017. Piscataway: IEEE, 2017: 557-564.
[17] Desmedt Y G. Threshold cryptography[J]. European Transactions on Telecommunications, 1994, 5(4): 449-458.
[18] Liu Y, Li R, Liu X. An efficient method to enhance Bitcoin wallet security[C]//Proceedings of the 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification, Xiamen, Oct 27-29, 2017. Piscataway: IEEE, 2017: 26-29.
[19] Bamert T, Decker C, Wattenhofer R, et al. Bluewallet: the secure bitcoin wallet[C]//LNCS 8743: Proceedings of the 10th International Workshop on Security and Trust Management, Wroclaw, Sep 10-11, 2014. Berlin, Heidelberg: Springer, 2014: 65-80.
[20] Kolb J, AbdelBaky M, Katz R H. Core concepts, challenges, and future directions in blockchain: a centralized tutorial[J]. ACM Computing Surveys, 2020, 53(1): 1-39.
[21] Shao Q F, Jin C Q, Zhang Z. Blockchain: architecture and research progress[J]. Chinese Journal of Computers, 2018, 41(5): 969-988. 邵奇峰, 金澈清, 张召. 区块链技术: 架构及进展[J]. 计算机学报, 2018, 41(5): 969-988.
[22] Zhou Z C, Li L X, Guo S, et al. Biometric and password two-factor cross domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018, 38(6): 1620-1627. 周致成, 李立新, 郭松, 等. 基于区块链技术的生物特征和口令双因子跨域认证方案[J]. 计算机应用, 2018, 38(6): 1620-1627.
[23] Gennaro R, Goldfeder S, Narayanan A. Threshold optimal DSA/ECDSA signatures and an application to bitcoin wallet security[C]//LNCS 9696: Proceedings of the 14th International Conference on Applied Cryptography and Network Security, Guildford, Jun 19-22, 2016. Berlin, Heidelberg: Springer, 2016: 156-174.
[24] Dikshit P, Sing K. Weighted threshold ECDSA for securing bitcoin wallet[C]//Proceedings of the ISEA Asia Security and Privacy, Surat, Feb 2-3, 2017. Piscataway: IEEE, 2017: 1-4.
[25] Goldfeder S, Bonneau J, Kroll J A, et al. Securing bitcoin wallets via threshold signatures[R/OL]. Princeton: Princeton University, Feb 27, 2019: 1-14[2019-09-24]. http://diyhpl.us/~bryan/papers2/bitcoin/Securing%20Bitcoin%20wallets%20via%20threshold%20signatures.pdf.
[26] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613. |