|
[1]S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” [Online]. Available: https://bitcoin.org/, 2008. [2]L. Pawczuk, J. Holdowsky, R. Massey and B. Hansen, “Deloitte’s 2020 Global Blockchain Survey: from promise to reality,” [Online]. Available: https://www.deloitte.com/, 2020. [3]T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi and J. Wang, “Untangling Blockchain: A Data Processing View of Blockchain Systems,” IEEE Transactions on Knowledge and Data Engineering, 30(7), pp. 1366-1385, 2018. [4]S. Zhang and J. H. Lee, “Analysis of the main consensus protocols of blockchain,” ICT Express, 6(2), pp. 93-97, 2020. [5]V. G. Martínez, L. Hernández-Álvarez and L. H. Encinas, “Analysis of the Cryptographic Tools for Blockchain and Bitcoin,” Mathematics, 8(1), pp. 131, 2020. [6]E. A. Brewer, “Towards robust distributed systems,” Proc. of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 7(10.1145), pp. 343477-343502, 2000. [7]S. Gilbert and N. Lynch, “Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services,” ACM SIGACT News, 33(2), pp. 51-59, 2002. [8]A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf and S. Capkun, “On the security and performance of proof of work blockchains,” Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3-16, 2016. [9]F. Saleh, “Blockchain without Waste: Proof-of-Stake,” The Review of Financial Studies, 34(3), pp. 1156-1190, 2021. [10]L. Lamport, R. Shostak and M. Pease, “The Byzantine Generals Problem,” ACM Transactions on Programming Languages and Systems, 4(3) pp. 382-401, 1982. [11]M. Castro and B. Liskov, “Practical byzantine fault tolerance,” Proc. of the 3rd Symposium on Operating Systems Design and Implementation, 99, pp. 173-186, 1999. [12]J. S. Coron, Y. Dodis, C. Malinaud and P. Puniya, “Merkle-Damgård revisited: How to construct a hash function,” Proc. of the Annual International Cryptology Conference, pp. 430-448, 2005. [13]V. Lozupone, “Analyze encryption and public key infrastructure (PKI),” International Journal of Information Management, 38(1), pp. 42-44, 2018. [14]A. Mallik, “Man-in-the-middle-attack: Understanding in simple words,” Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2(2), pp. 109-134, 2019. [15]M. Yu, S. Sahraei, S. Li, S. Avestimehr, S. Kannan and P. Viswanath, “Coded merkle tree: Solving data availability attacks in blockchains,” Proc. of the International Conference on Financial Cryptography and Data Security, pp. 114-134, 2020. [16]X. Yang and W. A. Li, “A zero-knowledge-proof-based digital identity management scheme in blockchain,” Computers & Security, 99, 2020. [17]E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis and A. D. Caro, et al., “Hyperledger fabric: A distributed operating system for permissioned blockchains,” Proc. of the Thirteenth EuroSys Conference, pp. 1-15, 2018. [18]V. Chakravaram, S. Ratnakaram, E. Agasha and N. S. Vihari, “The Role of Blockchain Technology in Financial Engineering,” Proc. of the 3rd International Conference on Communications and Cyber Physical Engineering, pp. 755-765, 2020. [19]P. Lucena, A. P. Binotto, F. D. S. Momo and H. Kim, “A case study for grain quality assurance tracking based on a Blockchain business network,” Proc. of the Symposium on Foundations and Applications of Blockchain, pp. 31, 2018. [20]S. Shalaby, A. A. Abdellatif, A. Al-Ali, A. Mohamed, A. Erbad and M. Guizani, “Performance Evaluation of Hyperledger Fabric,” Proc. of the IEEE International Conference on Informatics, IoT, and Enabling Technologies, pp. 608-613, 2020. [21]D. Ongaro and J. Ousterhout, “In search of an understandable consensus algorithm,” Proc. of the 2014 USENIX Annual Technical Conference, pp. 305-320, 2014. [22]B. B. Rad, H. J. Bhatti and M. Ahmadi, “An introduction to docker and analysis of its performance,” International Journal of Computer Science and Network Security, 17(3), pp. 228-235, 2017. [23] M. Xu, X. Chen and G. Kou, “A systematic review of blockchain,” Financial Innovation, 5(1), pp. 1-14, 2019. [24] Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, “An overview of blockchain technology: Architecture, consensus and future trends,” Proc. of the 2017 IEEE International Congress on Big Data, pp. 557-564, 2017. [25]S. Pongnumkul, C. Siripanpornchana and S. Thajchayapong, “Performance analysis of private blockchain platforms in varying workloads,” Proc. of the 2017 26th International Conference on Computer Communication and Networks, pp. 1-6, 2017. [26]S. Pahlajani, A. Kshirsagar and V. Pachghare, “Survey on private blockchain consensus algorithms,” Proc. of the 2019 1st International Conference on Innovations in Information and Communication Technology, pp. 1-6. 2017. [27]D. Efanov and P. Roschin, “The all-pervasiveness of the blockchain technology,” Procedia Computer Science, 123, pp. 116-121, 2018. [28]A. Jumde and B. Y. Cho, “Can cryptocurrencies overtake the fiat money?,” International Journal of Business Performance Management, 21(1-2), pp. 6-20, 2020. [29]R. Bukht and R. Heeks, “Defining, conceptualising and measuring the digital economy,” GDI Development Informatics Working Papers, 68, 2017. [30]A. S. Andreou, P. Christodoulou and K. Christodoulou, “A decentralized application for logistics: Using blockchain in real-world applications,” The Cyprus Review, 30(2), pp. 181-193, 2018. [31]Y. Y. Hsieh, J. P. Vergne, P. Anderson, K. Lakhani and M. Reitzig, “Bitcoin and the rise of decentralized autonomous organizations,” Journal of Organization Design, 7(1), pp. 1-16, 2018. [32]Y. Chen and C. Bellavitis, “Blockchain disruption and decentralized finance: The rise of decentralized business models,” Journal of Business Venturing Insights, 13, 2020. [33]B. Vitalik, “A Next Generation Smart Contract and Decentralized Application Platform,” [Online]. Available: https://blockchainlab.com/, 2013. [34]K. Su, J. Li and H. Fu, “Smart city and the applications,” Proc. of the 2011 international conference on electronics, communications and control, pp. 1028-1031, 2011. [35]P. K. Sharma and J. H. Park, “Blockchain based hybrid network architecture for the smart city,” Future Generation Computer Systems, 86, pp. 650-655, 2018. [36]S. Tönnissen, J. H. Beinke and F. Teuteberg, “Understanding token-based ecosystems–a taxonomy of blockchain-based business models of start-ups,” Electronic Markets, 30(2), pp. 307-323, 2020. [37]A. Meynkhard, “Fair market value of bitcoin: Halving effect,” Investment Management and Financial Innovations, 16(4), pp. 72-85, 2019. [38]X. Yang, W. F. Lau, Q. Ye, M. H. Au, J. K. Liu and J. Cheng, “Practical escrow protocol for bitcoin,” IEEE Transactions on Information Forensics and Security, 15, pp. 3023-3034, 2020. [39]G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” [Online]. Available: https://blockchainlab.com/, 2013. [40]H. Peng, C. Ling and Y. Li, “Application and Research of Heterogeneous Computing in Ethereum Consensus Algorithm,” Proc. of the 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification, pp. 263-267, 2019. [41]B. Biais, C. Bisiere, M. Bouvard and C. Casamatta, “The blockchain folk theorem,” The Review of Financial Studies, 32(5), pp. 1662-1715, 2019. [42]F. Ritz and A. Zugenmaier, “The impact of uncle rewards on selfish mining in ethereum,” Proc. of the 2018 IEEE European Symposium on Security and Privacy Workshops, pp. 50-57, 2018. [43]K. Olson, M. Bowman, J. Mitchell, S. Amundson, D. Middleton and C. Montgomery, “Sawtooth: an introduction,” The Linux Foundation, 2018. [44]B. Ampel, M. Patton and H. Chen, “Performance modeling of hyperledger sawtooth blockchain,” Proc. of the 2019 IEEE International Conference on Intelligence and Security Informatics, pp. 59-61, 2019. [45]M. Sabt, M. Achemlal and A. Bouabdallah, “Trusted execution environment: what it is and what it is not,” Proc. of the 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 57-64, 2015. [46]V. Costan and S. Devadas, “Intel SGX Explained,” Cryptology ePrint Archive, 86, pp. 1-118, 2016. [47]R. G. Brown, J. Carlyle, I. Grigg and M. Hearn, “Corda: an introduction,” R3 CEV, 1(15), 2016. [48]M. Hearn and R. G. Brown, “Corda: A distributed ledger,” Corda Technical White Paper, 2016. [49]C. Cachin and M. Vukolic, “Blockchain Consensus Protocols in the Wild,” Proc. of the 31st International Symposium on Distributed Computing, 91, 2017. [50]M. Iqbal and R. Matulevičius, “Corda Security Ontology: Example of Post-Trade Matching and Confirmation,” Baltic Journal of Modern Computing, 8(4), pp. 638-674, 2020. [51] M. Alessi, A. Camillo, E. Giangreco, M. Matera, S. Pino and D. Storelli, “Make users own their data: A decentralized personal data store prototype based on ethereum and ipfs,” Proc. of the 2018 3rd International Conference on Smart and Sustainable Technologies, pp. 1-7, 2018. [52] N. B. Truong, K. Sun, G. M. Lee and Y. Guo, “GDPR-Compliant Personal Data Management: A Blockchain-Based Solution,” IEEE Transactions on Information Forensics and Security, 15, pp. 1746-1761, 2020.
|