1 |
World Economic Forum, The future of financial infrastructure, 2016.8.12.
|
2 |
Young-young Lee(2017), Blockchain Technology Trends and Implications. Trends and Issues(34), 1-21.
|
3 |
Cointelegraph (2017.4.16.). US Government Invests in Blockchain to Protect Healthcare Companies from hackers.
|
4 |
Reuters (2016.6.16.), Sweden tests blockchain technology for land registry.
|
5 |
Govlnsider (2016.6.7.), singapore Government builds blockchain system to protect banks.
|
6 |
Ministry of Public Administration and Press release (January 2, 2017). E-Government Gets Smarter with High Tech Convergence. Avaliable: http://www.korea.kr/news/pressReleaseView.do?newsId=156178437
|
7 |
Young-young Lee, Cheong-won Woo, (2018). Prospects, Limitations, and Implications of Blockchain Technology. Future Horizon(38), 12-15.
|
8 |
Heeyoul Kim. (2018). Analysis of Security Threats and Countermeasures on Blockchain Platforms, Journal of KIIT. vol. 16, no. 5, pp. 103-112.
|
9 |
Shamistha Dash, Anirban Majumdar, Presanna Gunikkar, "Blockchain: A Healthcare Industry View," Gapgemini. 2017(7).
|
10 |
Thomson Reuters (2016.1.16.). Blockchain technology: Is 2016 the year of the blockchain?. Avaliable: https://blogs.thomsonreuters.com/answerson/blockchain-technology/
|
11 |
Leslie Lamport, Robert Shostak, Marshall Pease. (1982). "The Byzantine Generals Problem," Journal of ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4. issue 3, pp. 382-401.
DOI
|
12 |
Wikipedia, Proof of Work, Avaliable: https://en.wikipedia.org/wiki/Proof_of_work
|
13 |
ISO/TC 307. Avaliable: https://www.iso.org/committee/6266604/x/catalogue/p/0/u/1/w/0/d/0
|
14 |
V. Buterin and V. Griffith. (2017). "Casper the Friendly Gadget", Avaliable: https://ethresear.ch/uploads/default/original/1X/fdbebd67c8a9671efabf4e53d6267789cd91d96c.pdf.
|
15 |
M. Castro and B. Liskov. (2002). "Practical Byzantine Fault Tolerance and Proactive Recovery", ACM Transactions on Computer Systems, vol. 20, no. 4, pp. 398-461.
DOI
|
16 |
J. Kwon. (2014). "Tendermint: Consensus without Mining", Avaliable: https://tendermint.com/static/docs/tendermint.pdf.
|
17 |
ITU-T. Avaliable: https://www.itu.int/en/Pages/default.aspx
|
18 |
W3C Blockchain Community Group. Avaliable: https://www.w3.org/community/blockchain/
|
19 |
W3C Web Payments Working Group, Avaliable: https://www.w3.org/Payments/WG/
|
20 |
W3C Interledger Payments Community Group, Avaliable: https://www.w3.org/community/interledger/
|
21 |
IEEE Blockchain. Avaliable: https://blockchain.ieee.org/standards
|
22 |
Jamal Hayat Mosakheil. (2018). "Security Threats Classification in Blockchains," Culminating Projects in Information Assurance. 48. Avaliable: https://repository.stcloudstate.edu/msia_etds/48
|
23 |
Xiaoqi Li, Peng Liang, Ting Chen, Xiapu Luo, Qiaoyan Wen. (2017). "A survey on the security of blockchain system," Future Generation Computer system. Avaliable: http://dx.doi.org/10.1016/j.future.2017.08.020.
|
24 |
Tapscott D, Tapscott A. (2016), "The Impact of the Blockchain Goes Beyond Financial Services," Harvard Business Review.
|
25 |
Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou. (2018). Cyber Security, Communications in Computer and Information Science. Avaliable: https://doi.org/10.1007/978-981-13-6621-5
|
26 |
Atzei, N., Bartoletti, M., & Cimoli, T. (2016). A survey of attacks on Ethereum smart contracts (No. 1007). Retrieved from http://eprint.iacr.org/2016/1007.
|