🌎Reference
[1] Benet, J. (2014). IPFS - Content Addressed, Versioned, P2P File System. [arXiv:1407.3561v1]
[2] Protocol Labs. (2021). Filecoin: A Decen- tralized Storage Network. Filecoin Whitepaper. Retrieved from https://filecoin.io/filecoin.pdf
[3] Nakamoto, S. (2008). Bitcoin: A Peer-to- Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
[4] Buterin, V., et al. (2014). A Next-Generation Smart Contract and Decentralized Application Platform. Ethereum Whitepaper. Retrieved from https://ethereum.org/whitepaper
[5] Wood, G. (2014). Ethereum: A SecureDecentralised Generalised Transaction Ledger.Ethereum Yellow Paper. Retrieved from https://ethereum.github.io/yellowpaper/paper.pdf
[6] Boneh, D., et al. (2013). Public Key Cryptography for the Financial Services Indus-try: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9.62-2005. Retrieved from https://www.secg.org/sec2-v2.pdf
[7] Merkle, R. C. (1987). A Digital Signature Based on a Conventional Encryption Function. Ad-
vances in Cryptology – CRYPTO ’87. Lecture Notes in Computer Science, vol 293. Springer,
Berlin, Heidelberg. https://doi.org/10. 1007/3-54048184-2-32
[8] Lamport, L. (1981). Password Authentication with Insecure Communication. Communications of the ACM, 24(11), 770-772.https://doi.org/10.1145/358790.358797
[9] Intel Corporation. (2016). Intel® Software Guard Extensions (Intel® SGX). Retrieved from
https://software.intel.com/en-us/sgx
[10] AMD. (2013). AMD64 Architecture Programmer’s Manual Volume 2:System Programming. Retrieved from https://www.amd.com/system/files/TechDocs/24593
[11] ARM Limited. (2018). ARM Architecture Reference Manual ARMv8, for ARMv8-A architecture profile. Retrieved from https://developer.arm.com/documentation/ddi0487/late
[12] Boneh, D., Gentry, C., Waters, B.(2005). Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. Advances in Cryptology - CRYPTO 2005, 258-275https://doi.org/10.1007/1153521816
[13] Parno, B., et al. (2013). Pinocchio: Nearly Practical Verifiable Computation.
2013 IEEE Symposium on Security and Privacy.https://doi.org/10.1109/SP.2013.44
[14] Dwork, C., Naor, M. (1993). Pricing via Processing or Combatting Junk Mail. Advances in Cryptology – CRYPTO ’92. Lecture Notes in Computer Science, vol 740. Springer, Berlin, Heidelberg. https://doi.org/10. 1007/3-540-48071-429
[15] Ben-Sasson, E., et al. (2014). Zerocash: Decentralized Anonymous Payments from Bitcoin.
2014 IEEE Symposium on Security and Privacy.https://doi.org/10.1109/SP.2014.36
[16] Szabo, N. (1997). Formalizingand SecuringRelationships on Public Networks. First Monday,
2(9). https://doi.org/10.5210/fm.v2i9.548
[17] Micali, S., Rabin, M., Vadhan, S. (1999)Verifiable Random Functions. 40th Annual Sym-
posium on Foundations of Computer Science, 120130. https://doi.org/10. 1109/SFFCS. 1999.814594
[18] Benet, J., Greco, N. (2017). Proof of Replication. Filecoin Research. Retrieved from https://filecoin.io/proof-of-replication.pdf
[19] Ben-Or, M., et al. (1988). Simple Efficient Asynchronous Byzantine Agreement with Optimal
Resilience. Proceedings of the first annual ACM symposium on Principles of Distributed Comput-
ing, 42-52. https://doi.org/10. 1145/62546.62550
[20] Luu,L., et al. (2016). A Secure Sharding Protocol for Open Blockchains. Proceed-
ings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 17-30
https://doi.org/10. 1145/2976749.2978389
[21] Kalodner, H., et al. (2018). An Empirical Study of Namecoin and Lessons for Decentral-
ized Namespace Design. WEIS 2015: Workshop on the Economics of Information Security. Re-
trieved from https://weis2015.econinfosec.org/wpcontent/uploads/sites/5/2015/05/WEIS 2015 submission 72.pdf
[22] Back, A. (2002). Hashcash-A Denial Service Counter-Measure. Retrieved from http://www.hashcash.org/papers/hashcash.pdf
[23] Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., ... Polosukhin, I
Attention is all you need. In Advances in neural information processing systems (pp. 5998-6008).
[24] Daian, P., et al. (2020). Flash Boys 2.0: Frontrunning, Transaction Reordering, and Con-
sensus Instability in Decentralized Exchanges.2020 IEEE Symposium on Security and Privacy.
https://doi.org/10. 1109/SP40000.2020.00047
[25] Eyal, I., Sirer, E. G. (2018). Majority is not Enough: Bitcoin Mining is Vul-nerable. International Conference on Financial Cryptography and Data Security, 436-454.https://doi.org/10. 1007/978-3-662-45472-528
[26] Ren, X., Yu, H. (2020). Blockchain-Based Intelligent Transportation Systems: A Comprehen-
sive Review. IEEE Transactions on Intelligent Transportation Systems, 21(5), 18
[27] Chen, Y., Zhang, Y., Xu, Z., Huang,J. (2019). Secure execution of blockchain smart contracts based on virtual machine. IEEE Access, 7, 61933-61943.https://doi.org/10.1109/ACCESS.2019.2918648
[28] Chia, M. P., Gan, C. Y., Low, K. L.(2018). Securing blockchain execution environ-
ment through isolation and hardware-enhanced attestation. IEEE Transactions on Depend-
able and Secure Computing, 15(4), 570-583.https://doi.org/10.1109/TDSC.2016.2615552
[29] Sun, Z., Cui, Y., Zhang, Y., Yu, Y. (2020).Containerized deployment of Ethereum smart
contract based on Kubernetes. In Proceedingsof the 2020 IEEE International Conference on
Smart Internet of Things (SmartIoT) (pp. 182- 187).https://doi.org/10.1109/SmartIoT49753.2020.00039
[30] Tian, Y., Han, G., Chen, S., Chen, Y., Wu,D., Wei, Y. (2021). A WASM-based execu-
tion model for blockchain smart contracts. In Proceedings of the 2021 IEEE International Conference on Blockchain (Blockchain) (pp. 166- 173).https://doi.org/10.1109/Blockchain50986.2021.00028
[31] Zhou, Z., Yan, X., Guan, S., Zhang, J., Zhu,X. (2021). PyTorch on the blockchain: Integrating
deep learning and smart contracts. IEEE Transactions on Services Computing, 14(1), 144- 157.
https://doi.org/10.1109/TSC.2019.2935417
[32] Chen, X., Chen, G., Wu, H., Wang,Y. (2018). Design and implementation of
IoT platform based on USL. In Proceedings of the 2018 5th International Conference on Systems and Informatics (pp. 558-562).https://doi.org/10.1109/ICSAI.2018.8574167
[33] Diffie, W., Hellman, M. (1976). On the security of public key protocols. IEEE Transactions on Information Theory, 22(6), 644-654.https://doi.org/10.1109/TIT.1976.1055638
[34] Maurer, U. (1993). Secure communication over insecure channels. Advances in Cryptology —
EUROCRYPT’93, 1- 14. https://doi.org/10. 1007/3540-48285-71
[35] Yang, J., Ma, Y., Xu, X., Wang, X. (2020).Research on a blockchain-based ranking mech-
anism in academic community. In Proceedings of the 2020 International Conference on Intel-
ligent Sustainable Systems (ISS)(pp. 55-60).https://doi.org/10.1109/ISS49245.2020.9240599
[36] Wu, J., Xie, X. (2021). Design and implementation of search engine ranking algorithm based on blockchain. In Proceedings of the 2021 IEEE 4th International Conference on Information Systems and ComputerAided Education (ICISCAE) (pp. 556-560).https://doi.org/10. 1109/ICISCAE53270.2021.00098
[37] Li, X., Li, C., Li, W., Li, Y., Li, G.(2020). Research on blockchain technol-
ogy based on the Foundation index minerservice. In Proceedings of the 2020 3rd International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6).https://doi.org/10. 1109/CCCI48366.2020.9117489
Last updated
