Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams
Tóm tắt
Từ khóa
Tài liệu tham khảo
preneel, 1997, The cryptographic hash function RIPEMD-160, CryptoBytes, 3, 9
musson, 2006, Attacking the elliptic curve discrete logarithm problem
bos, 2014, Elliptic curve cryptography in practice, Proc Int Conf Financial Cryptograph Data Secur, 157
schneier, 1999, Attack trees, Dr Dobb's J, 24, 21
koshy, 2014, An analysis of anonymity in bitcoin using P2P network traffic, Proc Int Conf Financial Cryptograph Data Secur, 469
fleder, 2015, Bitcoin transaction graph analysis
schwartz, 2011, What protection does bitcoin have against denial of service (DoS) attacks?
piasecki, 2012, Design and security analysis of bitcoin infrastructure using application deployed on Google apps engine
jawurek, 2011, Plug-in privacy for smart metering billing, Proc Int Symp Privacy Enhancing Technol Symp, 192, 10.1007/978-3-642-22263-4_11
warren, 2012, Bitmessage: A peer-to-peer message authentication and delivery system
2010, Introduction to NISTIR 7628 guidelines for smart grid cyber security
okupski, 2014, Bitcoin developer reference
nakamoto, 2008, Bitcoin: A peer-to-peer electronic cash system
sasaki, 2009, Preimage attacks on 41-step SHA-256 and 46-step SHA-512, IACR Cryptology ePrint Archive, 2009
biehl, 2000, Differential fault attacks on elliptic curve cryptosystems, Proc Annu Int Cryptology Conf, 131
antipa, 2003, Validation of elliptic curve public keys, Proc Int Workshop Public Key Cryptogr, 211
ács, 2011, I have a DREAM! (DiffeRentially privatE smArt Metering), Information Hiding, 118, 10.1007/978-3-642-24178-9_9
mihaylov, 2014, NRG-X-change—A novel mechanism for trading of renewable energy in smart grids, Proceedings of SMARTGREENS, 101