[1] Swan M. Blockchain: Blueprint for a New Economy. USA: O'Reilly Media Inc., 2015.
[2] [2] Technical report by the UK government chief scientific adviser [Online], available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/492972/gs-16-1-distributed-ledger-technology.pdf, February 21, 2016
[3] [3] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system [Online], available: https://bitcoin.org/bitcoin.pdf, 2009
[4] [4] Ethereum White Paper. A next-generation smart contract and decentralized application platform [Online], available: https://github.com/ethereum/wiki/wiki/White-Paper, November 12, 2015
[5] Ding Wei. Block chain based instrument data management system. China Instrumentation, 2015, (10): 15-17(丁未. 基于区块链技术的仪器数据管理创新系统. 中国仪器仪表, 2015, (10): 15-17)
[6] Zhao He, Li Xiao-Feng, Zhan Li-Kui, Wu Zhong-Cheng. Data integrity protection method for microorganism sampling robots based on blockchain technology. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43(Z1): 216-219(赵赫, 李晓风, 占礼葵, 吴仲城. 基于区块链技术的采样机器人数据保护方法. 华中科技大学学报(自然科学版), 2015, 43(增刊): 216-219)
[7] [7] Swan M. Blockchain thinking: the brain as a decentralized autonomous corporation. IEEE Technology and Society Magazine, 2015, 34(4): 41-52
[8] [8] Davidson Eric. Letter. New Scientist, 2015, 228(3043): 52-52
[9] [9] Anonymous. New kid on the blockchain. New Scientist, 2015, 225(3009): 7
[10] Godsiff P. Bitcoin: bubble or blockchain. In: Proceedings of the 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA). Sorrento, Italy: Springer, 2015, 38: 191-203
[11] Kraft D. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 2016, 9(2): 397-413
[12] Wilson D, Ateniese G. From pretty good to great: enhancing PGP using Bitcoin and the blockchain. In: Proceedings of the 9th International Conference on Network and System Security. New York: Springer International Publishing, 2015, 9408: 368-375
[13] Zyskind G, Nathan O, Pentland A S. Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops (SPW 2015). San Jose, CA: IEEE, 2015. 180-184
[14] Kypriotaki K N, Zamani E D, Giaglis G M. From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networks and blockchains. In: Proceedings of the 17th International Conference on Enterprise Information Systems(ICEIS2015). 2015, 3: 284-290
[15] Blockchain Monitoring Website [Online], available: https://blockchain.info/, January 8, 2016
[16] Antonopoulos A M. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. USA: O'Reilly Media Inc., 2014.
[17] Fan Jie, Yi Le-Tian, Shu Ji-Wu. Research on the technologies of Byzantine system. Journal of Software, 2013, 24(6): 1346-1360(范捷, 易乐天, 舒继武. 拜占庭系统技术研究综述. 软件学报, 2013, 24(6): 1346-1360)
[18] Bitcoin Sourcecode [Online], available: https://github.com/bitcoin/bitcoin/, January 18, 2016
[19] Merkle R C. Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE, 1980. 122
[20] Bitcoinmining Article [Online], available: https://www. bitcoinmining.com/bitcoin-mining-pools, December 8, 2015
[21] Brito J, Shadab H, Castillo A. Bitcoin financial regulation: securities, derivatives, prediction markets, and gambling. The Columbia Science Technology Law Review, 2014, 16: 144-221
[22] Eyal I, Efe Gencer A, Sirer E G, van Renesse R. Bitcoin-NG: a scalable blockchain protocol. Cryptography and Security, arXiv: 1510.02037
[23] Courtois N T, Bahack L. On subversive miner strategies and block withholding attack in Bitcoin digital currency. Cryptography and Security, arXiv: 1402.1718
[24] Wang Fei-Yue. Computational experiments for behavior analysis and decision evaluation of complex systems. Journal of System Simulation, 2004, 16(5): 893-897(王飞跃. 计算实验方法与复杂系统行为分析和决策评估. 系统仿真学报, 2004, 16(5): 893-897)
[25] Wang Fei-Yue, Qiu Xiao-Gang, Zeng Da-Jun, Cao Zhi-Dong, Fan Zong-Chen. A computational experimental platform for emergency response based on parallel systems. Complex Systems and Complexity Science, 2010, 7(4): 1-10(王飞跃, 邱晓刚, 曾大军, 曹志冬, 樊宗臣. 基于平行系统的非常规突发事件计算实验平台研究. 复杂系统与复杂性科学, 2010, 7(4): 1-10)
[26] Wang Fei-Yue, Wang Xiao, Yuan Yong, Wang Tao, Lin Yi-Lun. Social computing and computational societies: the foundation and consequence of smart societies. Chinese Science Bulletin, 2015, 60(5-6): 460-469(王飞跃, 王晓, 袁勇, 王涛, 林懿伦. 社会计算与计算社会: 智慧社会的基础与必然. 科学通报, 2015, 60(5-6): 460-469)
[27] Wang Fei-Yue. Software-defined systems and knowledge automation: a parallel paradigm shift from Newton to Merton. Acta Automatica Sinica, 2015, 41(1): 1-8(王飞跃. 软件定义的系统与知识自动化: 从牛顿到默顿的平行升华. 自动化学报, 2015, 41(1): 1-8)
[28] Wang Fei-Yue. Artificial societies, computational experiments, and parallel systems: a discussion on computational theory of complex social-economic systems. Complex Systems and Complexity Science, 2004, 1(4): 25-35(王飞跃. 人工社会、计算实验、平行系统: 关于复杂社会经济系统计算研究的讨论. 复杂系统与复杂性科学, 2004, 1(4): 25-35)
[29] Wang Fei-Yue, Jiang Zheng-Hua, Dai Ru-Wei. Population studies and artificial societies: a discussion of artificial population systems and their applications. Complex Systems and Complexity Science, 2005, 2(1): 1-9(王飞跃, 蒋正华, 戴汝为. 人口问题与人工社会方法: 人工人口系统的设想与应用. 复杂系统与复杂性科学, 2005, 2(1): 1-9)