|
[1]黃明祥、林詠章,資訊與網路安全概論:看見比特幣,第五版,台北市:東華,民國103年。 [2] J.-H. Hsiao, R. Tso, C.-M. Chen, and M.-E. Wu, “Decentralized E-Voting System based on the Blockchain Technology,” Advances in Computer Science and Ubiquitous Computing, pp. 305–309, 2017. [3]G. Zyskind, O. Nathan, and A. sandy Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” 2015 IEEE Security and Privacy Workshops, pp. 180–184, 2015. [4] J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander. “Where is current research on blockchain technology?—a systematic review.” PLOS, vol. 11, no. 10, Oct. 2016. [5] S. Nakamoto. “Bitcoin:A peer-to-peer electronic cash system.” 2008. [6]M. Pilkington. “Blockchain technology: principles and applications.” in Research handbook on digital transformations, United Kingdom: Edward Elgar, 2016, pp. 225-253. [7]M. Swan. “Blockchain: blueprint for a new economy.” O'Reilly, 2015, pp. 1-52. [8]Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, 2017. [9] P. Berman, M. Karpinski, and Y. Nekrich. “Optimal trade-off for merkle tree traversal.” International Conference on E-Business and Telecommunication Networks, vol. 3, pp. 150-162, 2015. [10] D. Koo, Y. Shin, J. Yun, and J. Hur. “An online data-oriented authentication based on merkle tree with improved reliability.” in Proceedings of IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, Sep. 2017, pp. 840-843. [11] D. Hintze, and A. Rice. “Picky: Efficient and Reproducible Sharing of Large Datasets Using Merkle-Trees.” in Proceedings of IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), London, UK, Sep. 2016, pp. 30-38. [12] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. J. Kishigami, “Blockchain contract: A complete consensus using blockchain,” 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pp. 577–578, 2015. [13] A. Kiayias, A. Russell, B. David, and R. Oliynykov. “Ouroboros: A provably secure proof-of-stake blockchain protocol.” In proceedings of annual international cryptology conference, Springer, Cham, July. 2017, pp. 357-388. [14] C. Lambrinoudakis, S. Gritzalis, F. Dridi, and G. Pernul. “Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.” Computer Communications, vol. 26, no. 16, pp. 1873-1883, Oct. 2003. [15] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. “A concrete security treatment of symmetric encryption.” In proceedings of IEEE 38th annual symposium on foundations of computer science, Miami Beach, FL, USA, USA, Aug. 2002, pp. 394-403. [16] J. Kishigami, S. Fujimura, H. Watanabe, A. Nakadaira, and A. Akutsu. “The blockchain-based digital content distribution system." In proceedings of IEEE Fifth International Conference on Big Data and Cloud Computing, Dalian, China, Oct. 2015, pp. 187-190. [17] Internet Reports 2005 :The Internetof Things、M2M service layer:Requirements and architectural framework,International Telecommunication Union(www.itu.int)。 [18]“CHT IoT Platform” , https://iot.cht.com.tw/iot/ [19] “iThome” ,https://www.ithome.com.tw/news/130344
|