9. ì°¸ê³ ë¬¸í—Œ
[1]
W. Dai, "b-money," http://www.weidai.com/bmoney.txt, 1998.
[2]
H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal
trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
[3]
S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no
2, pages 99-111, 1991.
[4]
D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping,"
In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993.
[5]
S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference
on Computer and Communications Security, pages 28-35, April 1997.
[6]
A. Back, "Hashcash - a denial of service counter-measure,"
http://www.hashcash.org/papers/hashcash.pdf, 2002.
[7]
R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and
Privacy, IEEE Computer Society, pages 122-133, April 1980.
[8]
W. Feller, "An introduction to probability theory and its applications," 1957.
ì›ë¬¸
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,†http://bitcoin.org/bitcoin.pdf, 2009.
ë²ˆì— - 츄ì´ìŠ¤
9