|
W . Prinz, T . Rose, T . Osterland, et al., “Blockchain” Digitalisierung; 2018
|
|
M. Swan, “Blockchain: Blueprint for A New Economy,” O’Reilly Media, Inc., 2015
|
|
A. E. Gencer, S. Basu, I. Eyal , R. van Renesse, and E. G. Sirer, “Decentralization in Bitcoin and Ethereum Networks,” arXiv: 1801.03998, 2018
|
|
L. Columbus, Gartner Hype Cycle for Emerging Technologies (http://www.forbes.com/sites/louiscolumbus/2016/08/21/gartner-hype-cycle-for-emerging-technologies-2016-adds-blockchain-machine-learning-for-first-time/#6394bd121ef2)
|
|
P. M. Frederic, F. A. Vandome , and M. B. John, “Traditional Education,” Alphascript Publishing, 2010
|
|
J. J. Sikorski, J. Haughton, and M. Kraft, “Blockchain Technology in the Chemical Industry: Machine-to-Machine Electricity Market,” Applied Energy, Vol. 195, pp. 234-246, 2017
|
|
G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” in Proceedings of IEEE Security and Privacy Workshops, pp. 180-184, IEEE Computer Society, 2015
|
|
S. E. Skandari, J. Clark, D. Barrera, and J. Clark, “ A First Look at the Usability of Bitcoin Key Management” in Workshop on Usable Security, 2018
|
|
A. Brauneis and R. Mestel, “Price Discovery of Cryptocurrencies: Bitcoin and Beyond,” Economics Letters, Vol. 165, pp. 58-61, 2018
|
|
A. Sensoy, “The Inefficiency of Bitcoin Revisited: A High-Frequency Analysis with Alternative Currencies,” Finance Research Letters, 2018
|
|
G. D’Angelo and S. Rampone, “Cognitive Distributed Application Area Networks,” Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 2018
|
|
N. Bozic, G. Pujolle, and S. Secci, “A Tutorial on Blockchain and Applications to Secure Network Control-Planes,” in Proceedings of the 3rd Conference on Smart Cloud Networks & Systems, pp. 1-8, IEEE, 2017
|
|
M. Ohkubo, K. Suzuki, and S. Kinoshita, “Efficient Hash-Chain based RFID Privacy Protection Scheme,” in Proceedings of International Conference on Ubiquitous Computing, 2004
|
|
L. Zhu, H. Dong, and M. Shen, “Privacy Protection Mechanism for Blockchain Transaction Data,” Big Data Research, 2018
|
|
Y. L. Zhang and H. Guo, “An Improved RFID Privacy Protection Scheme based on Hash-Chain,” in Proceedings of International Conference on Logistics Engineering and Intelligent Transportation Systems, pp. 1-4, 2010
|
|
K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, Vol. 4, pp. 2292-2303, 2016
|
|
W. G. Peters and P. Efstathios, “Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money,” Social Science Electronic Publishing, arXiv:1511.05740, 2016
|
|
A. Kosba, A. Miller, E. Shi , Z. K. Wen, and C. Papamanthou, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” in Proceedings of 2016 IEEE Symposium on Security and Privacy, pp. 839-858, IEEE, 2016
|
|
L. Luu, D. H. Chu, H. Olickel, P. Saxena, and A. Hobor, “Making Smart Contracts Smarter,” in Proceedings of ACM Sigsac Conference on Computer and Communications Security, pp. 254-269, ACM, 2016
|