Книга: Основы блокчейна: вводный курс для начинающих в 25 небольших главах
Назад: Глава 25. Подводим итоги и двигаемся дальше. Перспективные разработки, альтернативные варианты и будущее технологии блокчейна
Дальше: Сноски

Список литературы

1. Back A. Hashcash – a denial of service counter-measure. 2002. .

2. BitFury Group. Public versus private blockchains. Part 1: Permissioned blockchains. White paper, 2015. .

3. BitFury Group. Public versus private blockchains. Part 2: Permissioned blockchains. White paper, 2015. .

4. Bonneau J., Miller A., Clark J., Narayanan A., Kroll J. A., Felten E. W. Research perspectives and challenges for Bitcoin and cryptocurrencies. In IEEE Symposium on Security and Privacy. IEEE, 2015, 104-121.

5. Boritz J. E. IS practitioners’ views on core concepts of information integrity. International Journal of Accounting Information Systems 6.4 (2005): 260-279.

6. Buterin V. A next-generation smart contract and decentralized application platform. White paper. 2014.

7. Buterin V., Coleman J., Wampler-Doty M. Notes on scalable blockchain protocols (verson 0.3). 2015. .

8. Chung L., et al. Non-functional requirements in software engineering. Vol. 5. New York: Springer Science & Business Media, 2012.

9. Cormen T. H. Introduction to algorithms (3rd ed.). Cambridge: MIT Press, 2009.

10. Croman K., et al. On scaling decentralized blockchains. In Proceedings of the 3rd workshop on Bitcoin and Blockchain Research. 2016. .

11. Eberspacher J., Schollmeier R. First and second generation of peer-to-peer systems. In Peer-to-peer systems and applications. Berlin Heidelberg: Springer Verlag, 2005: 35-56.

12. Foroglou G., Tsilidou A.-L. Further applications of the blockchain.

2015. Paper presented at the Columbia University PhD in Sustainable Development 10 Year Anniversary Conference, February 28, 2014.

13. Grigg I. The Ricardian contract. 2004. In Proceedings of the 1st IEEE International Workshop on Electronic Contracting. IEEE, 2004: 25-31.

14. Hassanien A. E., Emary E. Swarm intelligence: Principles, advances, and applications. Boca Raton, FL: CRC Press, 2016.

15. Hong S.-H. The effect of Napster on recorded music sales: evidence from the consumer expenditure survey. Stanford Institute for Economic Policy Research Working Paper (2004): 3-18.

16. King S., Nadal S. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper. August 19, 2012.

17. Krantz S. G. Zero knowledge proofs. July 2007. AIM Preprint Series, Volume 10-46.

18. Kroll J. A., Davey I. C., Felten E. W. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. Proceedings of WEIS. 2013.

19. Lamport L. The part-time parliament. ACM Transactions on Computer Systems (TOCS) 16.2 (1998): 133-169.

20. Lamport L., Shostak R., Pease M. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4.3 (1982): 382-401

21. Lewenberg Y., Sompolinsky Y., Zohar A. Inclusive block chain protocols. In International Conference on Financial Cryptography and Data Security. Berlin Heidelberg: Springer, 2015.

22. Leyshon A. Scary monsters? Software formats, peer-to-peer networks, and the spectre of the gift. Environment and Planning D: Society and Space 21.5 (2003): 533-558.

23. Meiklejohn S., Orlandi C. Privacy-enhancing overlays in bitcoin. In International Conference on Financial Cryptography and Data Security. Berlin Heidelberg: Springer, 2015.

24. Merkle R. C. Protocols for Public Key Cryptosystems. IEEE Symposium on Security and Privacy 122 (1980).

25. Miers I., et al. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. 2013. Washington, DC. May 19-22, 2013. Pp. 397-411.

26. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008. .

27. Okupski K. Bitcoin developer reference. Working paper. 2014.

28. Ongaro D., Ousterhout J. In search of an understandable consensus algorithm. In Proceeding of 2014 USENIX Annual Technical Conference (USENIX ATC 14). 2014.

29. Poon J., Dryja T. The bitcoin lightning network: Scalable off-chain instant payments. Technical Report (draft). 2015. https://lightning. network.

30. Ren L. Proof of stake velocity: Building the social currency of the digital age. Self-published white paper. 2014.

31. Rogaway Ph., Shrimpton T. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Roy B., Meier W. (eds.). Fast software encryption. FSE 2004. Lecture Notes in Computer Science, vol. 3017. International Workshop on Fast Software Encryption. Berlin Heidelberg: Springer, 2004.

32. Tanenbaum A. S., Van Steen M. Distributed systems: principles and paradigms (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall, 2007.

33. Tanenbaum A. S., Wetherall D. J. Computer networks (5th ed.). Upper Saddle River, NJ: Prentice Hall, 2010.

34. Taylor M. B. Bitcoin and the age of bespoke silicon. In Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. Montreal: IEEE Press, 2013.

35. Tremback J., Hess Z. Universal payment channels. 2015. .

36. Tsudik G. Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review 22.5 (1992): 29-38.

37. Van Tilborg H., Jajodia S., eds. Encyclopedia of cryptography and security. New York: Springer Science & Business Media, 2014.

38. Weisstein E. W. Hash function. From MathWorld: .

39. Wood G. Ethereum: A secure decentralized generalized transaction ledger. 2014. .

40. World Economic Forum. The future of financial infrastructure. – An ambitious look at how blockchain can reshape financial services. An Industry Project of the Financial Services Community,

2016.

41. World Economic Forum. The future of financial services. – How disruptive innovations are reshaping the way financial services are structured, provisioned and consumed. An Industry Project of the Financial Services Community, 2015.

42. World Wide Web Foundation. History of the Web. 2016. .

43. Yli-Huumo J., et al. Where is current research on blockchain technology? – A systematic review. PloS One 11.10 (2016), e0163477: doi:10.1371/journal.pone.0163477.

44. Zyskind G., Nathan O., Pentland A. Enigma: Decentralized computation platform with guaranteed privacy. 2015. arXiv preprint arXiv:1506.03471.

Назад: Глава 25. Подводим итоги и двигаемся дальше. Перспективные разработки, альтернативные варианты и будущее технологии блокчейна
Дальше: Сноски