|  Chen W L, Zheng Z B, Cui J H, Ngai E C H, Zheng P L, Zhou Y R. Detecting Ponzi schemes on Ethereum:Towards healthier blockchain technology. In Proc. the 2018 World Wide Web Conference on World Wide Web, April 2018, pp.1409-1418. DOI:10.1145/3178876.3186046.
 Vo H T, Kundu A, Mohania M K. Research directions in blockchain data management and analytics. In Proc. the 21st International Conference on Extending Database Technology, March 2018, pp.445-448. DOI:10.5441/002/edbt.2018.43.
 Eyal I, Gencer A E, Sirer E G, van Renesse R. Bitcoin-NG:A scalable blockchain protocol. In Proc. the 13th USENIX Symposium on Networked Systems Design and Implementation, March 2016, pp.45-59.
 Yong Y, Wang F Y. Blockchain:The state of the art and future trends. Acta Automatica Sinica, 2016, 42(4):481-494. DOI:10.16383/j.aas.2016.c160158. (in Chinese)
 Bonneau J, Miller A, Clark J, Narayanan A, Kroll J A, Felten E W. SoK:Research perspectives and challenges for Bitcoin and cryptocurrencies. In Proc. the 2015 IEEE Symposium on Security and Privacy, May 2015, pp.104-121. DOI:10.1109/SP.2015.14.
 Henry R, Herzberg A, Kate A. Blockchain access privacy:Challenges and directions. IEEE Security and Privacy, 2018, 16(4):38-45. DOI:10.1109/MSP.2018.3111245.
 Li J R, Wolf T. A one-way proof-of-work protocol to protect controllers in software-defined networks. In Proc. the 2016 Symposium on Architectures for Networking and Communications Systems, March 2016, pp.123-124. DOI:10.1145/2881025.2889481.
 Jia D Y, Xin J C, Wang Z Q, Guo W, Wang G R. ElasticChain:Support very large Blockchain by reducing data redundancy. In Proc. the 2nd International Joint Conference on Web and Big Data, July 2018, pp.440-454. DOI:10.1007/978-3-319-96893-3_33.
 Al-Bassam M, Sonnino A, Bano S, Hrycyszyn D, Danezis G. Chainspace:A sharded smart contracts platform. In Proc. the 25th Annual Network and Distributed System Security Symposium, February 2018. DOI:10.14722/ndss.2018.23244.
 Zamani M, Movahedi M, Raykova M. RapidChain:Scaling blockchain via full sharding. In Proc. the 2018 ACM SIGSAC Conference on Computer and Communications Security, October 2018, pp.931-948. DOI:10.1145/3243734.3243853.
 Xu Z H, Han S Y, Chen L. CUB, a consensus unit-based storage scheme for Blockchain system. In Proc. the 34th IEEE International Conference on Data Engineering, April 2018, pp.173-184. DOI:10.1109/ICDE.2018.00025.
 Luu L, Narayanan V, Zheng C D, Baweja K, Gilbert S, Saxena P. A secure sharding protocol for open blockchains. In Proc. the 2016 ACM SIGSAC Conference on Computer and Communications Security, October 2016, pp.17-30. DOI:10.1145/2976749.2978389.
 Xu C, Zhang C, Xu J L. vChain:Enabling verifiable Boolean range queries over blockchain databases. In Proc. the 2019 International Conference on Management of Data, June 2019, pp.141-158. DOI:10.1145/3299869.3300083.
 Zhang C, Xu C, Xu J L, Tang Y Z, Choi B. GEM2-Tree:A gas-efficient structure for authenticated range queries in blockchain. In Proc. the 35th IEEE International Conference on Data Engineering, April 2019, pp.842-853. DOI:10.1109/ICDE.2019.00080.
 Third A, Domingue J. Linked data indexing of distributed ledgers. In Proc. the 26th International Conference on World Wide Web Companion, April 2017, pp.1431-1436. DOI:10.1145/3041021.3053895.
 Li Y, Zheng K, Yan Y, Liu Q, Zhou X F. EtherQL:A query layer for blockchain system. In Proc. the 22nd International Conference on Database Systems for Advanced Applications, March 2017, pp.556-567. DOI:10.1007/978-3-319-55699-4_34.
 Wang S, Dinh T T A, Lin Q, Xie Z L, Zhang M H, Cai Q C, Chen G, Ooi B C, Ruan P C. ForkBase:An efficient storage engine for blockchain and forkable applications. Proceedings of the VLDB Endowment, 2018, 11(10):1137-1150. DOI:10.14778/3231751.3231762.
 Jia D Y, Xin J C, Wang Z Q, Guo W, Wang G R. Efficient query model for storage capacity scalable Blockchain system. Journal of Software, 2019, 30(9):91-106. DOI:10.13328/j.cnki.jos.005774. (in Chinese)
 Baudin É. Probabilities and Life. Dover Publications Inc, 1962.
 Yu H F, Gibbons P B, Kaminsky M, Xiao F. SybilLimit:A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking, 2010, 18(3):885-898. DOI:10.1109/TNET.2009.2034047.
|No related articles found!|