Author:
Qin Meng-Jun,Zhao Yun-Lei,Ma Zhou-Jun
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference28 articles.
1. Satoshi N. Bitcoin: A peer-to-peer electronic cash system. 2008.
https://bitcoin.org/bitcoin.pdf
, Mar. 2018.
2. Möser M. Anonymity of bitcoin transactions. In Proc. Münster Bitcoin Conf., July 2013, pp.17-18.
3. Ron D, Shamir A. Quantitative analysis of the full bitcoin transaction graph. In Proc. the 17th Int. Conf. Financial Cryptography and Data Security, April 2013, pp.6-24.
4. Androulaki E, Karame G O, Roeschlin M, Scherer T, Capkun S. Evaluating user privacy in bitcoin. In Proc. the 17th Int. Conf. Financial Cryptography and Data Security, April 2013, pp.34-51.
5. Rivest R L, Shamir A, Tauman Y. How to leak a secret: Theory and applications of ring signatures. In Theoretical Computer Science, Goldreich O, Rosenberg A L, Selman A L (eds.), Springer, 2006, pp.164-186.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献