-
Notifications
You must be signed in to change notification settings - Fork 6
/
references.bib
243 lines (219 loc) · 7.28 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
@article{bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Satoshi Nakamoto},
howpublished = "\url{https://bitcoin.org/bitcoin.pdf}",
year={2008}
}
@article{sidechains,
title={Enabling Blockchain Innovations with Pegged Sidechains},
author={Adam Back and Matt Corallo and Luke Dashjr and Mark Friedenbach and Gregory Maxwell and Andrew Miller and Andrew Poelstra and Jorge Timon and Pieter Wuille},
howpublished = "\url{https://blockstream.com/technology/sidechains.pdf}",
year={2014}
}
@misc{ibiss,
title={Incentive-based interactive settlement scheme for computational integrity proofs (IBISS-CIP)},
author={Maxim Orlovsky and Sabina Sachtachtinskagia},
howpublished="\url{https://github.com/pandoracore/ibiss-spec/blob/master/ibiss-spec.pdf}",
year={2019},
organization={Pandora Core AG}
}
@misc{typhon,
title={Typhon: trustless Bitcoin sidechain protocol},
author={Maxim Orlovsky},
howpublished = "\url{https://github.com/dr-orlovsky/typhon-spec}",
year={2019},
organization={Pandora Core AG}
}
@article{ipfs,
title={IPFS - Content Addressed, Versioned, P2P File System},
author={Juan Benet},
howpublished = "\url{https://ipfs.io/ipfs/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX/ipfs.draft3.pdf}",
year={2016}
}
@article{AFS,
title={Scale and performance in a distributed file system},
author={Howard, John H and Kazar, Michael L and Menees, Sherri G and Nichols, David A and Satyanarayanan, Mahadev and Sidebotham, Robert N and West, Michael J},
journal={ACM Transactions on Computer Systems (TOCS)},
volume={6},
number={1},
pages={51--81},
year={1988},
publisher={ACM}
}
@inproceedings{bittorrent,
title={Incentives build robustness in BitTorrent},
author={Cohen, Bram},
booktitle={Workshop on Economics of Peer-to-Peer systems},
volume={6},
pages={68--72},
year={2003}
}
@misc{tor,
title={Tor: The Second-Generation Onion Router},
author={Roger Dingledine and Nick Mathewson and Paul Syverson},
howpublished= "\url{https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf}"
}
@article{cloudcomputing,
author="Zhang, Qi
and Cheng, Lu
and Boutaba, Raouf",
title="Cloud computing: state-of-the-art and research challenges",
journal="Journal of Internet Services and Applications",
year="2010",
month="May",
day="01",
volume="1",
number="1",
pages="7--18",
issn="1869-0238",
doi="10.1007/s13174-010-0007-6",
url="https://doi.org/10.1007/s13174-010-0007-6"
}
@inproceedings{anonymity,
author="Acquisti, Alessandro
and Dingledine, Roger
and Syverson, Paul",
editor="Wright, Rebecca N.",
title="On the Economics of Anonymity",
booktitle="Financial Cryptography",
year="2003",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="84--102",
isbn="978-3-540-45126-6"
}
@inproceedings{pcpibm,
author="Gennaro, Rosario
and Gentry, Craig
and Parno, Bryan",
editor="Rabin, Tal",
title="Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers",
booktitle="Advances in Cryptology -- CRYPTO 2010",
year="2010",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="465--482",
isbn="978-3-642-14623-7"
}
@article{cc-censorship1,
author = { Burke T. Ward and Janice C. Sipior },
title = {The Internet Jurisdiction Risk of Cloud Computing},
journal = {Information Systems Management},
volume = {27},
number = {4},
pages = {334-339},
year = {2010},
publisher = {Taylor & Francis},
doi = {10.1080/10580530.2010.514248},
URL = {
https://doi.org/10.1080/10580530.2010.514248
},
eprint = {
https://doi.org/10.1080/10580530.2010.514248
}
}
@article{cc-censorship2,
title = "Privacy and security issues in cloud computing: The role of institutions and institutional evolution",
journal = "Telecommunications Policy",
volume = "37",
number = "4",
pages = "372 - 386",
year = "2013",
issn = "0308-5961",
doi = "https://doi.org/10.1016/j.telpol.2012.04.011",
url = "http://www.sciencedirect.com/science/article/pii/S0308596112000717",
author = "Nir Kshetri"
}
@article{truebit,
title={A scalable verification solution for blockchains},
author={Jason Teutsch and Christian Reitwießner},
howpublished="\url{https://people.cs.uchicago.edu/~teutsch/papers/truebit.pdf}",
year={2017}
}
@misc{freeai,
title={The \#FreeAI Manifesto},
howpublished = "\url{https://manifesto.ai/}",
year={2018}
}
@misc{webassembly,
title={WebAssembly},
howpublished = "\url{http://webassembly.org/}",
year={2016}
}
@misc{pcp,
author = {Eli Ben-Sasson and Alessandro Chiesa and Nicholas Spooner},
title = {Interactive Oracle Proofs},
howpublished = {Cryptology ePrint Archive, Report 2016/116},
year = {2016},
note = {\url{https://eprint.iacr.org/2016/116}},
}
@inproceedings{gnunet,
title={Gnunet -- a truly anonymous networking infrastructure},
author={Bennett, Krista and Grothoff, Christian and Horozov, Tzvetan and Patrascu, Ioana and Stef, Tiberiu},
booktitle={In: Proc. Privacy Enhancing Technologies Workshop (PET},
year={2002},
organization={Citeseer}
}
@misc{libp2p,
title={The specs for libp2p and associated submodules.},
howpublished = "\url{https://github.com/libp2p/specs}"
}
@inproceedings{kademlia,
title={Kademlia: A Peer-to-peer Information System Based on the XOR Metric},
author={Maymounkov, Petar and Mazi\`eres, David},
booktitle={IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems},
pages={53-65},
year={2002}
}
@inproceedings{Badertscher,
author="Badertscher, Christian
and Garay, Juan
and Maurer, Ueli
and Tschudi, Daniel
and Zikas, Vassilis",
editor="Nielsen, Jesper Buus
and Rijmen, Vincent",
title="But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin",
booktitle="Advances in Cryptology -- EUROCRYPT 2018 ",
year="2018",
publisher="Springer International Publishing",
address="Cham",
pages="34--65",
isbn="978-3-319-78375-8"
}
@article{Houy,
title={The Bitcoin Mining Game},
author={Nicolas Houy},
journal={Ledger},
year={2016},
volume={1},
pages={53-68}
}
@book{gametheory,
title = {Game Theory},
year = {1991},
publisher = {MIT Press},
organization = {MIT Press},
address = {Cambridge, MA},
author = {Drew Fudenberg and Jean Tirole}
}
@inproceedings{Kumaresan,
title={How to Use Bitcoin to Incentivize Correct Computations},
author={Ranjit Kumaresan and Iddo Bentov},
booktitle={ACM Conference on Computer and Communications Security},
year={2014}
}
@book{Laffont,
author = { Laffont, Jean-Jacques, and Martimort, David. },
title = { The theory of incentives: the principal-agent model },
isbn = { 0691091838 0691091846 },
publisher = { Princeton University Press Princeton, N.J. ; Oxford },
pages = { xii, 421 p. : },
year = { 2002 },
type = { Book },
url = { http://www.loc.gov/catdir/toc/prin031/2001051039.html http://www.loc.gov/catdir/toc/prin031/2001051039.html },
language = { English },
subjects = { Economics.; Incentives in industry. },
life-dates = { 2002 - },
catalogue-url = { https://nla.gov.au/nla.cat-vn1556459 },
}