-
Blockchain Beyond Bitcoin (without pictures)
@article{underwood2016blockchain, title={Blockchain beyond bitcoin}, author={Underwood, Sarah}, journal={Communications of the ACM}, volume={59}, number={11}, pages={15--17}, year={2016}, publisher={ACM} }
-
The Truth About Blockchain (without pictures)
@article{iansiti2017truth, title={The truth about blockchain}, author={Iansiti, Marco and Lakhani, Karim R}, journal={Harvard Business Review}, volume={95}, number={1}, pages={118--127}, year={2017} }
-
BlockChain Technology: Beyond Bitcoin
@article{crosby2016blockchain, title={BlockChain Technology: Beyond Bitcoin}, author={Crosby, Michael and Pattanayak, Pradan and Verma, Sanjeev}, year={2016} } @article{crosby2016blockchain, title={BlockChain Technology: Beyond Bitcoin}, author={Crosby, Michael and Pattanayak, Pradan and Verma, Sanjeev and Kalyanaraman, Vignesh}, journal={APPLIED INNOVATION}, pages={6}, year={2016} }
-
Architecture of the Hyperledger Blockchain Fabric (without pictures)
@inproceedings{cachin2016architecture, title={Architecture of the hyperledger blockchain fabric}, author={Cachin, Christian}, booktitle={Workshop on distributed cryptocurrencies and consensus ledgers}, volume={310}, pages={4}, year={2016} }
-
Decentralizing Privacy: Using Blockchain to Protect Personal Data
@INPROCEEDINGS{7163223, author={G. {Zyskind} and O. {Nathan} and A. '. {Pentland}}, booktitle={2015 IEEE Security and Privacy Workshops}, title={Decentralizing Privacy: Using Blockchain to Protect Personal Data}, year={2015}, volume={}, number={}, pages={180-184}, keywords={data privacy;trusted computing;decentralizing privacy;blockchain;personal data protection;surveillance;security breaches;user privacy call;bit coin;financial space;auditable computing;decentralized network;public ledger;decentralized personal data management system;automated access-control manager;trusted computing problem;Protocols;Privacy;Data privacy;Online banking;Encryption;Compounds;blockchain;privacy;bitcoin;personal data}, doi={10.1109/SPW.2015.27}, ISSN={null}, month={May}, }
-
Bitcoin-NG: A Scalable Blockchain Protocol
@inproceedings {194906, author = {Ittay Eyal and Adem Efe Gencer and Emin Gun Sirer and Robbert Van Renesse}, title = {Bitcoin-NG: A Scalable Blockchain Protocol}, booktitle = {13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16)}, year = {2016}, isbn = {978-1-931971-29-4}, address = {Santa Clara, CA}, pages = {45--59}, url = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/eyal}, publisher = {{USENIX} Association}, month = mar, }
-
Bitcoins, Blockchain und Distributed Ledgers
@Article{Brühl2017, author="Br{\"u}hl, Volker", title="Bitcoins, Blockchain und Distributed Ledgers", journal="Wirtschaftsdienst", year="2017", month="Feb", day="01", volume="97", number="2", pages="135--142", abstract="Virtuelle W{\"a}hrungen wie Bitcoins geraten zunehmend in den Blickpunkt des {\"o}ffentlichen Interesses. Sie funktionieren auf Basis der Blockchain- bzw. Distributed-Ledger-Technologie. Volker Br{\"u}hl erl{\"a}utert ihre Funktionsweise und zeigt auf, dass diese Technologien nicht nur den Finanzsektor revolutionieren k{\"o}nnen.", issn="1613-978X", doi="10.1007/s10273-017-2096-3", url="https://doi.org/10.1007/s10273-017-2096-3" }
-
Managing IoT devices using blockchain platform (without [architecture] pictires)
@INPROCEEDINGS{7890132, author={S. {Huh} and S. {Cho} and S. {Kim}}, booktitle={2017 19th International Conference on Advanced Communication Technology (ICACT)}, title={Managing IoT devices using blockchain platform}, year={2017}, volume={}, number={}, pages={464-467}, keywords={Internet of Things;public key cryptography;Turing machines;Bitcoin;blockchain technology;Internet of Things;IoT;RSA public key cryptosystem;Ethereum;Turing-complete code;key management system;Blockchain;IoT;Ethereum;Key Management;Information & Network Security;Authentication;Smart Contract}, doi={10.23919/ICACT.2017.7890132}, ISSN={null}, month={Feb}, }
-
Making Smart Contracts Smarter (Paywall)
@inproceedings{Luu:2016:MSC:2976749.2978309, author = {Luu, Loi and Chu, Duc-Hiep and Olickel, Hrishi and Saxena, Prateek and Hobor, Aquinas}, title = {Making Smart Contracts Smarter}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '16}, year = {2016}, isbn = {978-1-4503-4139-4}, location = {Vienna, Austria}, pages = {254--269}, numpages = {16}, url = {http://doi.acm.org/10.1145/2976749.2978309}, doi = {10.1145/2976749.2978309}, acmid = {2978309}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {blockchain, cryptocurrencies, ethereum, smart contract, symbolic execution}, }
-
Blockchains and Smart Contracts for the Internet of Things
@ARTICLE{7467408, author={K. {Christidis} and M. {Devetsikiotis}}, journal={IEEE Access}, title={Blockchains and Smart Contracts for the Internet of Things}, year={2016}, volume={4}, number={}, pages={2292-2303}, keywords={contracts;cryptography;Internet of Things;peer-to-peer computing;trusted computing;transactional privacy;blockchain network;cryptographically verifiable manner;multistep process automation;trusted intermediary;distributed peer-to-peer network;IoT;Internet of Things;smart contracts;Distributed processing;Internet of things;Cryptography;Privacy;Blockchains;Automation;Peer-to-peer computing;blockchain;distributed systems;Internet of Things;Blockchain;distributed systems;internet of things}, doi={10.1109/ACCESS.2016.2566339}, ISSN={2169-3536}, month={}, }
-
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
@INPROCEEDINGS{7546538, author={A. {Kosba} and A. {Miller} and E. {Shi} and Z. {Wen} and C. {Papamanthou}}, booktitle={2016 IEEE Symposium on Security and Privacy (SP)}, title={Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts}, year={2016}, volume={}, number={}, pages={839-858}, keywords={contracts;cryptographic protocols;data privacy;electronic money;program compilers;transaction processing;trusted computing;blockchain model;privacy-preserving smart contracts;decentralized cryptocurrencies;contractual breach;aborts;decentralized blockchain;transactional privacy;money flow;mutually distrustful parties;honest parties;decentralized smart contract system;financial transactions;Hawk programmer;compiler;automatic cryptographic protocol generation;zero-knowledge proofs;formal modeling;Contracts;Cryptography;Privacy;Cryptographic protocols;Online banking}, doi={10.1109/SP.2016.55}, ISSN={2375-1207}, month={May}, }
-
Smart Contracts-Anwendungen der Blockchain-Technologie (without pictures)
@article{kaulartz2016smart, title={Smart Contracts-Anwendungen der Blockchain-Technologie}, author={Kaulartz, Markus and Heckmann, J{\"o}rn}, journal={Computer und Recht}, volume={32}, number={9}, pages={618}, year={2016}, publisher={Walter de Gruyter GmbH} }
-
A Survey of Attacks on Ethereum Smart Contracts (SoK) (without pictures)
@InProceedings{10.1007/978-3-662-54455-6_8, author="Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana", editor="Maffei, Matteo and Ryan, Mark", title="A Survey of Attacks on Ethereum Smart Contracts (SoK)", booktitle="Principles of Security and Trust", year="2017", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="164--186", abstract="Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study this problem in Ethereum, the most well-known and used framework for smart contracts so far. We analyse the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities. We show a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.", isbn="978-3-662-54455-6" }
-
Formal Verification of Smart Contracts
@inproceedings{Bhargavan:2016:FVS:2993600.2993611, author = {Bhargavan, Karthikeyan and Delignat-Lavaud, Antoine and Fournet, C{\'e}dric and Gollamudi, Anitha and Gonthier, Georges and Kobeissi, Nadim and Kulatova, Natalia and Rastogi, Aseem and Sibut-Pinote, Thomas and Swamy, Nikhil and Zanella-B{\'e}guelin, Santiago}, title = {Formal Verification of Smart Contracts: Short Paper}, booktitle = {Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security}, series = {PLAS '16}, year = {2016}, isbn = {978-1-4503-4574-3}, location = {Vienna, Austria}, pages = {91--96}, numpages = {6}, url = {http://doi.acm.org/10.1145/2993600.2993611}, doi = {10.1145/2993600.2993611}, acmid = {2993611}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {EVM, ethereum, formal verification, smart contracts, solidity}, }
-
Town Crier: An Authenticated Data Feed for Smart Contracts
@inproceedings{Zhang:2016:TCA:2976749.2978326, author = {Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine}, title = {Town Crier: An Authenticated Data Feed for Smart Contracts}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '16}, year = {2016}, isbn = {978-1-4503-4139-4}, location = {Vienna, Austria}, pages = {270--282}, numpages = {13}, url = {http://doi.acm.org/10.1145/2976749.2978326}, doi = {10.1145/2976749.2978326}, acmid = {2978326}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {authenticated data feeds, bitcoin, ethereum, intel SGX, smart contracts, trusted hardware}, }
-
@Article{Meitinger2017, author="Meitinger, Thomas Heinz", title="Smart Contracts", journal="Informatik-Spektrum", year="2017", month="Aug", day="01", volume="40", number="4", pages="371--375", abstract="Smart Contracts sind rechtliche Vereinbarungen, die sich IT-Technologien bedienen, um die eigene Durchsetzbarkeit sicherzustellen. Es werden durch Smart Contracts autonom Handlungen initiiert, die zuvor vertraglich vereinbart wurden. Beispielsweise k{\"o}nnen vereinbarte Zahlungen von Geldbetr{\"a}gen selbstt{\"a}tig veranlasst werden. Basieren Smart Contracts auf Blockchains, ergeben sich per se vertrauensw{\"u}rdige Transaktionen. Eine dritte Instanz zur Sicherstellung einer korrekten Transaktion, beispielsweise eine Bank oder ein virtueller Marktplatz, wird nicht ben{\"o}tigt. Echte Peer-to-Peer-Vertr{\"a}ge sind m{\"o}glich. Ein weiterer Anwendungsfall von Smart Contracts ist denkbar. Smart Contracts k{\"o}nnten statt Vereinbarungen von Vertragsparteien gesetzliche Regelungen ausf{\"u}hren. Beispielsweise die Regelungen des Patentgesetzes k{\"o}nnten durch einen Smart Contract implementiert werden. Die Verwaltung von IPRs (Intellectual Property Rights) entsprechend den gesetzlichen Regelungen w{\"u}rde dadurch sichergestellt werden. Bislang werden Spezialisten, beispielsweise Patentanw{\"a}lte, ben{\"o}tigt, um eine akkurate Administration von Schutzrechten zu gew{\"a}hrleisten. Smart Contracts k{\"o}nnten die Dienstleistungen dieser Spezialisten auf dem Gebiet des geistigen Eigentums obsolet werden lassen. ", issn="1432-122X", doi="10.1007/s00287-017-1045-2", url="https://doi.org/10.1007/s00287-017-1045-2" }
-
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
@InProceedings{10.1007/978-3-662-53357-4_6, author="Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed and Miller, Andrew and Shi, Elaine", editor="Clark, Jeremy and Meiklejohn, Sarah and Ryan, Peter Y.A. and Wallach, Dan and Brenner, Michael and Rohloff, Kurt", title="Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab", booktitle="Financial Cryptography and Data Security", year="2016", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="79--94", abstract="We document our experiences in teaching smart contract programming to undergraduate students at the University of Maryland, the first pedagogical attempt of its kind. Since smart contracts deal directly with the movement of valuable currency units between contractual parties, security of a contract program is of paramount importance.", isbn="978-3-662-53357-4" }
-
Financial Cryptography and Data Security (without [architecture] pictures)
@InProceedings{10.1007/978-3-319-70278-0_31, author="Bartoletti, Massimo and Pompianu, Livio", editor="Brenner, Michael and Rohloff, Kurt and Bonneau, Joseph and Miller, Andrew and Ryan, Peter Y.A. and Teague, Vanessa and Bracciali, Andrea and Sala, Massimiliano and Pintore, Federico and Jakobsson, Markus", title="An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns", booktitle="Financial Cryptography and Data Security", year="2017", publisher="Springer International Publishing", address="Cham", pages="494--509", abstract="Smart contracts are computer programs that can be consistently executed by a network of mutually distrusting nodes, without the arbitration of a trusted authority. Because of their resilience to tampering, smart contracts are appealing in many scenarios, especially in those which require transfers of money to respect certain agreed rules (like in financial services and in games). Over the last few years many platforms for smart contracts have been proposed, and some of them have been actually implemented and used. We study how the notion of smart contract is interpreted in some of these platforms. Focussing on the two most widespread ones, Bitcoin and Ethereum, we quantify the usage of smart contracts in relation to their application domain. We also analyse the most common programming patterns in Ethereum, where the source code of smart contracts is available.", isbn="978-3-319-70278-0" }
-
An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends
@INPROCEEDINGS{8029379, author={Z. {Zheng} and S. {Xie} and H. {Dai} and X. {Chen} and H. {Wang}}, booktitle={2017 IEEE International Congress on Big Data (BigData Congress)}, title={An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends}, year={2017}, volume={}, number={}, pages={557-564}, keywords={cryptography;electronic money;blockchain technology;Bitcoin;immutable ledger;blockchain-based applications;consensus algorithms;Bitcoin;Peer-to-peer computing;Organizations;Contracts;Blockchain;decentralization;consensus;scalability}, doi={10.1109/BigDataCongress.2017.85}, ISSN={null}, month={June}, }
-
A Taxonomy of Blockchain-Based Systems for Architecture Design (without [architecture] pictures)
@INPROCEEDINGS{7930224, author={X. {Xu} and I. {Weber} and M. {Staples} and L. {Zhu} and J. {Bosch} and L. {Bass} and C. {Pautasso} and P. {Rimba}}, booktitle={2017 IEEE International Conference on Software Architecture (ICSA)}, title={A Taxonomy of Blockchain-Based Systems for Architecture Design}, year={2017}, volume={}, number={}, pages={243-252}, keywords={software architecture;transactional data sharing;blockchain-based system taxonomy;distributed software architectures;blockchain architectural characteristics;blockchain-based system quality attributes;Online banking;Taxonomy;Peer-to-peer computing;Contracts;Software architecture;Cryptography;Government;Software architecture;Distributed databases}, doi={10.1109/ICSA.2017.33}, ISSN={null}, month={April}, }
-
Block-VN: A distributed blockchain based vehicular network architecture in smart City. (without [architecture] pictures)
@article{sharma2017block, title={Block-VN: A distributed blockchain based vehicular network architecture in smart City.}, author={Sharma, Pradip Kumar and Moon, Seo Yeon and Park, Jong Hyuk}, journal={JIPS}, volume={13}, number={1}, pages={184--195}, year={2017} }
-
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability (paywall)
@inproceedings{Liang:2017:PBD:3101112.3101176, author = {Liang, Xueping and Shetty, Sachin and Tosh, Deepak and Kamhoua, Charles and Kwiat, Kevin and Njilla, Laurent}, title = {ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability}, booktitle = {Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing}, series = {CCGrid '17}, year = {2017}, isbn = {978-1-5090-6610-0}, location = {Madrid, Spain}, pages = {468--477}, numpages = {10}, url = {https://doi.org/10.1109/CCGRID.2017.8}, doi = {10.1109/CCGRID.2017.8}, acmid = {3101176}, publisher = {IEEE Press}, address = {Piscataway, NJ, USA}, keywords = {Blockchain, Blockchain Cloud, Cloud Computing, Data provenance, Privacy, Reliability}, }
-
Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT
@ARTICLE{8306880, author={O. {Novo}}, journal={IEEE Internet of Things Journal}, title={Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT}, year={2018}, volume={5}, number={2}, pages={1184-1195}, keywords={authorisation;Internet;Internet of Things;access management technology;fully distributed access control system;blockchain technology;realistic IoT scenarios;specific scalable IoT scenarios;scalable access management;Access control;Internet of Things;Bitcoin;Peer-to-peer computing;Contracts;Access control;blockchain;Internet of Things (IoT);smart contracts}, doi={10.1109/JIOT.2018.2812239}, ISSN={2372-2541}, month={April}, }
-
A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT (without [architecture] pictures)
@ARTICLE{8053750, author={P. K. {Sharma} and M. {Chen} and J. H. {Park}}, journal={IEEE Access}, title={A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT}, year={2018}, volume={6}, number={}, pages={115-124}, keywords={cloud computing;computer centres;computer network security;Internet of Things;software defined networking;distributed cloud architecture;blockchain technology;competitive computing infrastructures;IoT network;distributed cloud infrastructure;cost-effective high-performance computing;low latency access;secure distributed fog node architecture;blockchain techniques;multiple computing resources;software defined fog node;blockchain cloud architecture;smart devices;huge data stores;centralized data centers;cloud storage;software defined networking;controller fog nodes;network architecture;real-time data delivery;fog services deployment;real-time attack detection;performance overheads;Cloud computing;Computer architecture;Edge computing;Performance evaluation;Peer-to-peer computing;Distributed databases;Security;Internet of things;software defined networking;security;blockchain;cloud computing;fog computing;edge computing}, doi={10.1109/ACCESS.2017.2757955}, ISSN={2169-3536}, month={}, }
-
The Blockchain as a Software Connector
@INPROCEEDINGS{7516828, author={X. {Xu} and C. {Pautasso} and L. {Zhu} and V. {Gramoli} and A. {Ponomarev} and A. B. {Tran} and S. {Chen}}, booktitle={2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)}, title={The Blockchain as a Software Connector}, year={2016}, volume={}, number={}, pages={182-191}, keywords={data handling;distributed processing;software architecture;software quality;software connector;decentralized data sharing;transactional data sharing;distributed software architectures;quality attributes;architectural decision;decentralized blockchain;design trade-offs;untrusted participants;Connectors;Cryptography;Peer-to-peer computing;Software;Contracts;Online banking;Australia;Blockchain;Architecture connector;Design;Trade-off}, doi={10.1109/WICSA.2016.21}, ISSN={null}, month={April}, }
-
IoTChain: A blockchain security architecture for the Internet of Things
@INPROCEEDINGS{8377385, author={O. {Alphand} and M. {Amoretti} and T. {Claeys} and S. {Dall'Asta} and A. {Duda} and G. {Ferrari} and F. {Rousseau} and B. {Tourancheau} and L. {Veltri} and F. {Zanichelli}}, booktitle={2018 IEEE Wireless Communications and Networking Conference (WCNC)}, title={IoTChain: A blockchain security architecture for the Internet of Things}, year={2018}, volume={}, number={}, pages={1-6}, keywords={authorisation;cryptography;Internet of Things;IoTChain;OSCAR architecture;ACE authorization framework;secure authorized access;IoT resources;authorization blockchain;OSCAR object security model;group key scheme;blockchain security architecture;architecture components;Internet of Things;E2E solution;private Ethereum network;Servers;Contracts;Authorization;Cryptography;Peer-to-peer computing;Communication security;Internet of Things;Group key distribution;Authorization;Blockchain}, doi={10.1109/WCNC.2018.8377385}, ISSN={1558-2612}, month={April}, }
-
Blockchain challenges and opportunities: a survey
@article{zheng2018blockchain, title={Blockchain challenges and opportunities: A survey}, author={Zheng, Zibin and Xie, Shaoan and Dai, Hong-Ning and Chen, Xiangping and Wang, Huaimin}, journal={International Journal of Web and Grid Services}, volume={14}, number={4}, pages={352--375}, year={2018}, publisher={Inderscience Publishers (IEL)} }