Blockchain

Blockchain


Blockchain » Bibliografía

Página 12 de 13

Bibliografía

Androulaki, E. et al. (2018a): “Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains”, en J. López et al. (eds.), Computer Security, 23rd European Symposium on Research in Computer Security (ESORICS, 2018), Proceedings, Part I, Springer, Cham, pp. 111-131.

— (2018b): “Hyperledger Fabric: a Distributed Operating System for Permissioned Blockchains”, Proceedings of the Thirteenth EuroSys Conference, ACM, Nueva York, p. 30.

ANSI, American National Standards Institute (2005): “Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)”, National Bureau of Standards, ANSI X9.62.

Aoyagi, J. y Adachi, D. (2018): “Fundamental Values of Cryptocurrencies and Blockchain Technology”, Social Science Research Network. Disponible en doi 10.2139/ssrn.3132235.

Arroyo D. et al. (2015): “Non-conventional Digital Signatures and Their Implementations-A Review”, en Herrero, A. et al. (eds.), International Joint Conference, Springer, Cham, pp. 425-435.

Bartoletti, M. y Pompianu, L. (2017): “An Analysis of Bitcoin Op_RETURN Metadata”, en A. Kiayias (ed.), Financial Cryptography and Data Security, 21st International Conference, Revised Selected Papers, Springer, Cham, pp. 218-230.

Brown, R.G. et al. (2016): “Corda: An Introduction”, R3 CEV.

Brunton, F. y Nissenbaum, H. (2015): Obfuscation: A user’s guide for privacy and protest, MIT Press, Cambridge.

Campbell-Verduyn, M. (2017): Bitcoin and Beyond: Cryptocurrencies, Blockchains, and Global Governance, Routledge, Nueva York.

Castro, M. y Liskov, B. (1999): “Practical Byzantine Fault Tolerance”, MIT Press, Cambridge. Disponible en http://pmg.csail.mit.edu/papers/osdi99.pdf.

Cesarano, F. (2006): Monetary Theory and Bretton Woods: the Construction of an International Monetary Order, Cambridge University Press, Cambridge.

Chaum, D. (1983): “Blind Signatures for Untraceable Payments”, Advances in Cryptology-Proceedings of Crypto 82, 3, Springer, Boston, pp. 199-203.

Chaum, D. y van Heyst, E. (1991): “Group signatures”, Lecture Notes in Computer Science, 547, pp. 257-265.

Christin, N. (2013): “Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace”, en D. Schwabe, Proceedings of the 22nd international conference on World Wide Web, ACM, Nueva York, pp. 213-224.

Coleman, J. (1994): Foundations of social theory, Harvard University Press, Cambridge.

Cooper, D. et al. (2008): “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (Crl) Profile”, RFC 5280 (May): 1-151. Disponible en http://dblp.uni-trier.de/db/journals/rfc/rfc5200-5299.html.

Cortes Generales (2003): “Ley 59/2003, de 19 de diciembre, de firma electrónica”, BOE-A-2003-23399. Disponible en https://www.boe.es/eli/es/l/2003/12/19/59/con

DuPont, Q. (2017): “Experiments in Algorithmic Governance: A History and Ethnography of The DAO, a Failed Decentralized Autonomous Organization”, en M. Campell-Verdyuin, Bitcoin and Beyond, Routledge, Nueva York, pp. 157-177.

Enserink, M. y Chin, G. (2015): “The End of Privacy”, Science, 347 (6221), pp. 453-580. Disponible en http://www.sciencemag.org/content/347/6221.toc.

Field, T. et al. (2003): OECD E-Government Studies the E-Government Imperative, OECD Publishing.

Franco, P. (2014): Understanding Bitcoin: Cryptography, Engineering and Economics, John Wiley & Sons, Chichester.

Fúster Sabater, A. et al. (2012): Criptografía, protección de datos y aplicaciones. Una guía para estudiantes y profesionales, RA-MA, Madrid.

Gayoso Martínez, V.; Hernández Encinas, L. y Martín Muñoz, A. (2018), Criptografía con curvas elípticas, CSIC, Madrid.

Ghosh, A. et al. (2007): “Mechanism Design on Trust Networks”, Internet and Network Economics, 3rd International Workshop on Web and Internet Economics, Proceedings, Springer, Berlín, pp. 257-268.

Hardjono, T. et al. (2018): “Towards a Design Philosophy for Interoperable Blockchain Systems”, MIT Press, Cambridge, pp. 1-27. Disponible en http://arxiv.org/abs/1805.05934.

Hearn, M. (2016): Corda: A distributed ledger, R3 CEV. Disponible en https://www.corda.net/content/corda-technical-whitepaper.pdf.

Hernández Encinas, L. (2016): La criptografía, CSIC-Los Libros de la Catarata, Madrid.

Itakura, K. y Nakamura, K. (1983): “A public-key cryptosystem suitable for digital multisignatures”, NEC Res, Development, 71, pp. 1-8.

Karame, G. et al. (2012): “Double-Spending Fast Payments in Bitcoin”, Proceedings of the 2012 ACM Conference on Computer and Communications Security, 906-17, ACM, Nueva York.

— (2013): “Evaluating User Privacy in Bitcoin”, Financial Cryptography and Data Security, 17st International Conference, Revised Selected Papers, Springer, Cham, pp. 34-51.

Kiayias, A. et al. (2017): “Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol”, Advances in Cryptology – CRYPTO 2017, 37th Annual International Cryptology Conference, Proceedings, Part I, Springer, Cham, pp. 357-388.

Lamport, L. (1998): “The Part-Time Parliament”. ACM Transactions on Computer Systems (TOCS) 16 (2), ACM, Nueva York, pp. 133-169.

Lamport, L.; Shostak, R. y Pease, M. (1982): “The Byzantine Generals Problem”, ACM Transactions on Programming Languages and Systems (TOPLAS) 4 (3), ACM, Nueva York, pp. 382-401.

Lewenberg, Y.; Sompolinsky, Y. y Zohar, A. (2015): “Inclusive Block Chain Protocols”, Financial Cryptography and Data Security, 19st International Conference, Revised Selected Papers, Springer, Heildelberg, pp. 528-547.

Merkle, R. C. (1982): “Method of providing digital signatures”, US Patent n. 4309569, 5 enero.

Nakamoto, S. (2008): “Bitcoin: A Peer-to-Peer Electronic Cash System”. Disponible en https://bitcoin.org/bitcoin.pdf.

Narayanan, A. et al. (2016): Bitcoin and cryptocurrency technologies. Princeton University Press, Princeton.

Narayanan, A. y Clark, J. (2017): “Bitcoin’s academic pedigree”, Communications of the ACM 60, 12, pp. 36-45.

NIST, National Institute of Standards and Technology (2002): “Secure Hash Standard (SHS)”, NIST Federal Information Processing Standard Publication FIPS180-2.

— (2014): “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions”, NIST Federal Information Processing Standards, FIPS PUB 202.

Peters, G. W. y Panayi, E. (2015): “Understanding Modern Banking Ledgers through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money”, Social Science Research Network, Preprint arXiv:1511.05740, 1-33. Disponible en doi 10.2139/ssrn.2692487.

Rivest, R. (1992): “RFC 1321: The MD5 message-digest algorithm”, Internet Request for Comments, 1321, Rump session of Crypto’91.

Rivest, R.; Shamir, A. y Tauman, Y. (2001): “How to leak a secret”, Lecture Notes Computer Science, 2248, pp. 552-565.

Rogaway, P. (2015): “The Moral Character of Cryptographic Work”, IACR Cryptology ePrint Archive, 1162.

Sánchez-Gómez, A. et al. (2018): “Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers”, en K. Daimi (ed.), Computer and Network Security Essentials, Springer International Publishing, pp. 263-281. Disponible en doi 10.1007/978-3-319-58424-9_15.

Schwartz, D. et al. (2014): “The Ripple Protocol Consensus Algorithm”, Ripple Labs Inc White Paper 5.

Skolnikoff, E. B. (1994): The elusive transformation: science, technology, and the evolution of international politics, Princeton University Press, Princeton.

Strandburg, K. J. (2014): “Monitoring, Datafication and Consent: Legal Approaches to Privacy in a Big Data Context”, en J. Lane et al., Privacy, Big Data, and the Public Good: Frameworks for Engagement, Cambridge University Press, Nueva York.

Szabo, N. (1994): “Smart Contracts”. Disponible en http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html.

Vigna, P. y Casey, M. J. (2016): The Age of Cryptocurrency: How Bitcoin and the Blockchain Are Challenging the Global Economic Order, MacMillan, Nueva York.

Wood, G. (2015): “Ethereum: A Secure Decentralised Generalised Transaction Ledger”. Disponible en http://yellowpaper.io/.

Wüst, K. y Gervais, A. (2017): “Do you need a Blockchain?”, IACR Cryptol, ePrint. Disponible en https://eprint.iacr.org/2017/375.pdf.

Ir a la siguiente página

Report Page