References
- S. Nakamoto. (2009). Bitcoin: A Peer-to-Peer Electronic Cash System. http://www.bitcoin.org/bitcoin.pdf
- S. W. Jeong ,Y. R. Choi & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185. DOI : 10.14400/JDC.2018.16.9.179
- E. Bunchman. (2016). Tendermint: Byzantine Fault Tolerance in the Age of Blockchains. https://atrium.lib.uoguelph.ca/xmlui/bitstream/handle/10214/9769/Buchman_Ethan_201606_MAsc.pdf?sequence=7&isAllowed=y
- A. Bessani, J. Sousa & E. EP Alchieri. (2014). State Machine Replication for the Masses with BFT-SMART. International Conference on Dependable Systems and Networks IEEE, 355-362.
- V. Marko. (2015). The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. International workshop on open problems in network security Springer Cham, 112-125.
- Y. Gilad, R. Hemo, S. Micali, G. Vlachos & N. Zeldovich. (2017). Algorand: Scaling Byzantine Agreements for Cryptocurrencies https://people.csail.mit.edu/nickolai/papers/gilad-algorand-eprint.pdf
- D. Mazaieres. (2015). The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus https://www.stellar.org/papers/stellar-consensus-protocol.pdf
- S. T. Kim. (2018). Analysis on Consensus Algorithms of Blockchain and Attacks. The Korean Journal of The Korea Convergence Society, 9(9), 83-88. DOI : 10.15207/JKCS.2018.9.9.083
- G. Karame. (2016). On the security and scalability of bitcoin's blockchain. Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 1861-1862.
- K. N. Lee, G. H. Jeon & G. H. Jeon. (2018). A Study on Improvement of Used-goods Market Platform Using Blockchain. Journal of Digital Convergence, 16(9), 133-145. DOI : 10.14400/JDC.2018.16.9.133
- M. Castro & B. Liskov. (1999). Practical Byzantine Fault Tolerance. Symposium on Operating Systems Design and Implementation. https://www.cs.cornell.edu/courses/cs614/2003sp/papers/CL99.pdf
- S. Micali, M. Rabin & S. Vadhan. (1999). Verifiable random functions. 40 th Annual Symposium on Foundations of Computer Science, 120-130.
- B. Johnson, A. Laszka, J. Grossklags, M. Vasek & T. Moore. (2014). Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. International Conference on Financial Cryptography and Data Security, 72-86.
- M. Castro & B. Liskov. (2002). Practical Byzantine Fault Tolerance and proactive recovery, ACM Transactions on Computer Systems, 20(4) 398-461. https://doi.org/10.1145/571637.571640
- A. E Gencer, S, Basu, I. Eyal, V. Renesse & E. G. Sirer. (2018). Decentralization in bitcoin and ethereum networks. https://arxiv.org/pdf/1801.03998.pdf