Author:
Wu Chunhui,Ke Lishan,Du Yusong
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference26 articles.
1. Accenture, Accenture debuts prototype of ‘editable’ blockchain for enterprise and permissioned systems.https://newsroom.accenture.com/news/accenture-debuts-prototype-of-editable-blockchain-for-enterprise-and-permissioned-systems.htm.
2. G. Ateniese, B. de Medeiros, Identity-based chameleon hash and applications, in: Financial Cryptography and Data Security–FC 2004, LNCS 3110, Springer-Verlag, 2004, pp. 164–180.
3. G. Ateniese, B. de Medeiros, On the key-exposure problem in chameleon hashes, in: Proc. of the 4th Conference on Security in Communication Networks–SCN 2004, LNCS 3352, Springer-Verlag, 2005, pp. 165–179.
4. Redactable blockchain-or-rewriting history in bitcoin and friends;Ateniese,2017
5. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract);Ben-Or,1988
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献