[1]
|
Swan M. Blockchain: Blueprint for a New Economy. USA: O'Reilly Media Inc., 2015.
|
[2]
|
[2] Technical report by the UK government chief scientific adviser [Online], available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/492972/gs-16-1-distributed-ledger-technology.pdf, February 21, 2016
|
[3]
|
[3] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system [Online], available: https://bitcoin.org/bitcoin.pdf, 2009
|
[4]
|
[4] Ethereum White Paper. A next-generation smart contract and decentralized application platform [Online], available: https://github.com/ethereum/wiki/wiki/White-Paper, November 12, 2015
|
[5]
|
Ding Wei. Block chain based instrument data management system. China Instrumentation, 2015, (10): 15-17(丁未. 基于区块链技术的仪器数据管理创新系统. 中国仪器仪表, 2015, (10): 15-17)
|
[6]
|
Zhao He, Li Xiao-Feng, Zhan Li-Kui, Wu Zhong-Cheng. Data integrity protection method for microorganism sampling robots based on blockchain technology. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43(Z1): 216-219(赵赫, 李晓风, 占礼葵, 吴仲城. 基于区块链技术的采样机器人数据保护方法. 华中科技大学学报(自然科学版), 2015, 43(增刊): 216-219)
|
[7]
|
[7] Swan M. Blockchain thinking: the brain as a decentralized autonomous corporation. IEEE Technology and Society Magazine, 2015, 34(4): 41-52
|
[8]
|
[8] Davidson Eric. Letter. New Scientist, 2015, 228(3043): 52-52
|
[9]
|
[9] Anonymous. New kid on the blockchain. New Scientist, 2015, 225(3009): 7
|
[10]
|
Godsiff P. Bitcoin: bubble or blockchain. In: Proceedings of the 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA). Sorrento, Italy: Springer, 2015, 38: 191-203
|
[11]
|
Kraft D. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 2016, 9(2): 397-413
|
[12]
|
Wilson D, Ateniese G. From pretty good to great: enhancing PGP using Bitcoin and the blockchain. In: Proceedings of the 9th International Conference on Network and System Security. New York: Springer International Publishing, 2015, 9408: 368-375
|
[13]
|
Zyskind G, Nathan O, Pentland A S. Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of the 2015 IEEE Security and Privacy Workshops (SPW 2015). San Jose, CA: IEEE, 2015. 180-184
|
[14]
|
Kypriotaki K N, Zamani E D, Giaglis G M. From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networks and blockchains. In: Proceedings of the 17th International Conference on Enterprise Information Systems(ICEIS2015). 2015, 3: 284-290
|
[15]
|
Blockchain Monitoring Website [Online], available: https://blockchain.info/, January 8, 2016
|
[16]
|
Antonopoulos A M. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. USA: O'Reilly Media Inc., 2014.
|
[17]
|
Fan Jie, Yi Le-Tian, Shu Ji-Wu. Research on the technologies of Byzantine system. Journal of Software, 2013, 24(6): 1346-1360(范捷, 易乐天, 舒继武. 拜占庭系统技术研究综述. 软件学报, 2013, 24(6): 1346-1360)
|
[18]
|
Bitcoin Sourcecode [Online], available: https://github.com/bitcoin/bitcoin/, January 18, 2016
|
[19]
|
Merkle R C. Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE, 1980. 122
|
[20]
|
Bitcoinmining Article [Online], available: https://www. bitcoinmining.com/bitcoin-mining-pools, December 8, 2015
|
[21]
|
Brito J, Shadab H, Castillo A. Bitcoin financial regulation: securities, derivatives, prediction markets, and gambling. The Columbia Science Technology Law Review, 2014, 16: 144-221
|
[22]
|
Eyal I, Efe Gencer A, Sirer E G, van Renesse R. Bitcoin-NG: a scalable blockchain protocol. Cryptography and Security, arXiv: 1510.02037
|
[23]
|
Courtois N T, Bahack L. On subversive miner strategies and block withholding attack in Bitcoin digital currency. Cryptography and Security, arXiv: 1402.1718
|
[24]
|
Wang Fei-Yue. Computational experiments for behavior analysis and decision evaluation of complex systems. Journal of System Simulation, 2004, 16(5): 893-897(王飞跃. 计算实验方法与复杂系统行为分析和决策评估. 系统仿真学报, 2004, 16(5): 893-897)
|
[25]
|
Wang Fei-Yue, Qiu Xiao-Gang, Zeng Da-Jun, Cao Zhi-Dong, Fan Zong-Chen. A computational experimental platform for emergency response based on parallel systems. Complex Systems and Complexity Science, 2010, 7(4): 1-10(王飞跃, 邱晓刚, 曾大军, 曹志冬, 樊宗臣. 基于平行系统的非常规突发事件计算实验平台研究. 复杂系统与复杂性科学, 2010, 7(4): 1-10)
|
[26]
|
Wang Fei-Yue, Wang Xiao, Yuan Yong, Wang Tao, Lin Yi-Lun. Social computing and computational societies: the foundation and consequence of smart societies. Chinese Science Bulletin, 2015, 60(5-6): 460-469(王飞跃, 王晓, 袁勇, 王涛, 林懿伦. 社会计算与计算社会: 智慧社会的基础与必然. 科学通报, 2015, 60(5-6): 460-469)
|
[27]
|
Wang Fei-Yue. Software-defined systems and knowledge automation: a parallel paradigm shift from Newton to Merton. Acta Automatica Sinica, 2015, 41(1): 1-8(王飞跃. 软件定义的系统与知识自动化: 从牛顿到默顿的平行升华. 自动化学报, 2015, 41(1): 1-8)
|
[28]
|
Wang Fei-Yue. Artificial societies, computational experiments, and parallel systems: a discussion on computational theory of complex social-economic systems. Complex Systems and Complexity Science, 2004, 1(4): 25-35(王飞跃. 人工社会、计算实验、平行系统: 关于复杂社会经济系统计算研究的讨论. 复杂系统与复杂性科学, 2004, 1(4): 25-35)
|
[29]
|
Wang Fei-Yue, Jiang Zheng-Hua, Dai Ru-Wei. Population studies and artificial societies: a discussion of artificial population systems and their applications. Complex Systems and Complexity Science, 2005, 2(1): 1-9(王飞跃, 蒋正华, 戴汝为. 人口问题与人工社会方法: 人工人口系统的设想与应用. 复杂系统与复杂性科学, 2005, 2(1): 1-9)
|