Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference42 articles.
1. An automated live forensic and postmortem analysis tool for bitcoin on windows systems;Zollner;IEEE Access,2019
2. Cracking bitcoin wallets: I want what you have in the wallets;Volety;Future Gener. Comput. Syst.,2019
3. SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing;Ren;Comput. Stand. Interfaces,2017
4. H. Rezaeighaleh, C.C. Zou, Deterministic Sub-Wallet for Cryptocurrencies, in: 2019 IEEE International Conference on Blockchain, Blockchain, 2019, pp. 419–424.
5. A social network based cryptocurrency wallet management scheme;He;IEEE Access,2018
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献