[1] M. Pilkington, “11 Blockchain Technology: Principles and Applications,”Research Handbook on Digital Transformations, Vol. 225, 2016 [2] I. Grishchenko, M. Maffei,C. Schneidewind, “Foundations and Tools for the Static Analysis of Ethereum Smart Contracts,” inProceedings of International Conference on Computer Aided Verification, pp. 51-78, Springer, Cham, July 2018 [3] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” in Proceedings of 2016 IEEE Symposium on Security and Privacy (SP), pp. 839-858, 2016 [4] E. Mik, “Smart Contracts: Terminology, Technical Limitations and Real World Complexity,” Law, Innovation and Technology, Vol. 9, No. 2, pp. 269-300, 2017 [5] K. Bhargavan, A. Delignat-Lavaud,C. Fournet, “Formal Verification of Smart Contracts: Short Paper,” inProceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, pp. 91-96, ACM, 2016 [6] M. Corrales, M. Fenwick,H. Haapio, “Legal Tech, Smart Contracts and Blockchain,” Springer, 2019 [7] P. Tsankov, A. Dan, D. Drachsler-Cohen, A. Gervais, F. Buenzli,M. Vechev, “Security: Practical Security Analysis of Smart Contracts,” inProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67-82, ACM, October 2018 [8] D. Magazzeni, P. McBurney,W. Nash, “Validation and Verification of Smart Contracts: A Research Agenda,” IEEE Computer, Vol. 50, No. 9, pp. 50-57, 2017 [9] H. Zhao, P. Bai,Y. Peng, “Efficient Key Management Scheme for Health Blockchain,” CAAI Transactions on Intelligence Technology, Vol. 3, No. 2, pp. 114-118, 2018 [10] N. Atzei, M. Bartoletti,T. Cimoli, “A Survey of Attacks on Ethereum Smart Contracts (sok),” inProceedings of International Conference on Principles of Security and Trust, pp. 164-186, Springer, Berlin, Heidelberg, April 2017 [11] K. Delmolino, M. Arnett,A. Kosba, “Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab,” inProceedings of International Conference on Financial Cryptography and Data Security, pp. 79-94, 2016 [12] Y. Chen, Z. Zhang,B. Yang, “Research and Application of Warehouse Receipt Transaction based on Smart Contract on the Blockchain,” in Proceedings of 2018 International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2018), Atlantis Press, March 2018 [13] A. W. Appel, “Verification of a Cryptographic Primitive: SHA-256,” ACM Transactions on Programming Languages and Systems, Vol. 37, No. 2, pp. 1-7, 2015 [14] L. He, Y. Gan,Y. Yin, “Secure Group Ownership Transfer Protocol for Tags in RFID System,” International Journal of Security and its Applications, Vol. 8, No. 3, pp. 21-30, 2014 [15] N. M. Smith, “Systems and Methods for Distributed Trust Computing and Key Management,”U.S. Patent, No. 9, pp. 215-249, 2015 [16] Y. Yin, Y. Yang, Y. Gan,M. Zhang, “Researching Security Mechanisms of the Polymorphic Authentication Service Protocol,” Journal of Computational Information Systems, Vol. 9, No. 7, pp. 2641-2647, 2013 [17] Y. Yin, X. Li,Y. Hu, “Fast S-Box Security Mechanism Research based on the Polymorphic Cipher,” Information Sciences, Vol. 178, No. 6, pp. 1603-1610, 2008 [18] Y. Yin, Y. Gan, H. Wen,T. Li, “A Symmetric Key Exchange Protocol based on Virtual S-Box,” China Communications, Vol. 11, No. 14, pp. 46-52, 2014 [19] Y. Yin, R. Zhang,Y. Gan, “Researching Intelligent Decision of Loop Tiling Scale based on PSO,” Journal of Computational Information Systems, Vol. 9, No. 13, pp. 5449-5455, 2013 |