[1]
|
袁勇, 王飞跃.区块链技术发展现状与展望.自动化学报, 2016, 42(1): 481-494 http://www.aas.net.cn/CN/abstract/abstract18837.shtmlYuan Yong, Wang Fei-Yue. Blockchain: the state of the art and future trends. Acta Automatica Sinica, 2016, 42(4): 481-494 http://www.aas.net.cn/CN/abstract/abstract18837.shtml
|
[2]
|
Block chain depth report: let the world be your witness (2) [Online], available: http://www.wxrw123.com/rm/20160420/472846_2.html, April 20, 2016
|
[3]
|
Blockchain introduction [Online], available: http://brave-newcoin.com/assets/Uploads/TransactionsAsProofOfStake-10.pdf, December 14, 2015
|
[4]
|
McConaghy T, Marques R, Müller A, De Jonghe D, McConaghy T T, McMullen G, Henderson R, Bellemare S, Granzotto A. BigchainDB: a scalable Blockchain database [Online], available: https://www.bigchaindb.com/whitepa-per/bigchaindb-whitepaper.pdf, June 8, 2016
|
[5]
|
Castro M, Liskov B. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 2002, 20(4): 398-461 doi: 10.1145/571637.571640
|
[6]
|
范捷, 易乐天, 舒继武.拜占庭系统技术研究综述.软件学报, 2013, 24(6): 1346-1360 http://www.cnki.com.cn/Article/CJFDTOTAL-RJXB201306012.htmFan Jie, Yi Le-Tian, Shu Ji-Wu. Research on the technologies of Byzantine system. Journal of Software, 2013, 24(6): 1346-1360 http://www.cnki.com.cn/Article/CJFDTOTAL-RJXB201306012.htm
|
[7]
|
Bentov I, Lee C, Mizrahi A, Rosenfeld M. Proof of activity: extending Bitcoin's proof of work via proof of stake. ACM SIGMETRICS Performance Evaluation Review, 2014, 42(3): 34-37 doi: 10.1145/2695533
|
[8]
|
Consensus in Bitcoin: one system, many models [Online], available: https://freedom-to-tinker.com/blog/randomwal-ker/consensus-in-bitcoin-one-system-many-models/, Dece-mber 26, 2014
|
[9]
|
Rosenfeld M. Analysis of bitcoin pooled mining reward systems. Distributed, parallel, and cluster computing. arXiv preprint arXiv:1112.4980, 2011.
|
[10]
|
Block withholding attacks-recent research [Online], available: http://blog.bettercrypto.com/?p=1131, December 2, 2014
|
[11]
|
Eyal I, Gün Sirer E. It's time for a hard bitcoin fork [Online], available: http://hackingdistributed.com/2014/06/13/tim-efor-a-hard-bitcoin-fork/, June 13, 2014
|
[12]
|
Courtois N T. Bitcoin miner optimization [Online], available:http://www.knaw.nl/shared/resources/actueel/bestanden/140212_Bitcoin_presentatie_Nicolas_Courtois.pdf, August 24, 2017
|
[13]
|
Study when be threatened, the bitcoin pool attacking [Online], available: http://www.bitecoin.com/online/2015/01/11102.html, January 4, 2015
|
[14]
|
Tang C B, Li A, Li X. When reputation enforces evolutionary cooperation in unreliable MANETs. IEEE Transactions on Cybernetics, 2015, 45(10): 2190-2201 doi: 10.1109/TCYB.2014.2366971
|
[15]
|
Rong Z H, Wu Z X, Chen G R. Coevolution of strategy-selection time scale and cooperation in spatial prisoner's dilemma game. Europhysics Letters, 2013, 102(6): 68005 doi: 10.1209/0295-5075/102/68005
|
[16]
|
Hofbauer J, Sigmund K. Evolutionary Games and Population Dynamics. Cambridge: Cambridge University Press, 1998. 50-54
|
[17]
|
Eyal I. The miner's dilemma. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP). San Jose, CA, USA: IEEE, 2015. 89-103
|
[18]
|
Larimer D. Transactions as proof-of-stake [Online], available: http://bravenewcoin.com/assets/Uploads/Transacti-onsAsProofOfStake10.pdf, November 28, 2013
|
[19]
|
BitFury Group. Proof of stake versus proof of work [Online], available: http://bitfury.com/content/5-white-papers-research/pos-vs-pow-1.0.2.pdf, September 13, 2015
|
[20]
|
Popov S. The tangle [Online], available: https://iotatoken.com/IOTA_Whitepaper.pdf, December 28, 2015
|
[21]
|
Kwon J. Tendermint: consensus without mining [Online], available: https://iota.org/IOTA_Whitepaper.pdf, September 17, 2015
|
[22]
|
Press W H, Dyson F J. Iterated prisoner's dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences of the United States of America, 2012, 109(26): 10409-10413 doi: 10.1073/pnas.1206569109
|
[23]
|
Hilbe C, Wu B, Traulsen A, Nowak M A. Evolutionary performance of zero-determinant strategies in multiplayer games. Journal of Theoretical Biology, 2015, 374: 115-124 doi: 10.1016/j.jtbi.2015.03.032
|
[24]
|
Pan L M, Hao D, Rong Z H, Zhou T. Zero-determinant strategies in iterated public goods game. Scientific Reports, 2014, 5: Article number: 13096
|
[25]
|
Zhang H Q, Niyato D, Song L Y, Jiang T, Han Z. Zero-determinant strategy for resource sharing in wireless cooperations. IEEE Transactions on Wireless Communications, 2016, 15(3): 2179-2192 doi: 10.1109/TWC.2015.2499185
|
[26]
|
Al Daoud A, Kesidis G, Liebeherr J. Zero-determinant strategies: a game-theoretic approach for sharing licensed spectrum bands. IEEE Journal on Selected Areas in Communications, 2014, 32(11): 2297-2308 doi: 10.1109/JSAC.2014.141126
|
[27]
|
Nash J F. Equilibrium points in N-person games. Proceedings of the National Academy of Sciences of the United States of America, 1950, 36(1): 48-49 doi: 10.1073/pnas.36.1.48
|