mirror of
https://github.com/bitcoinbook/bitcoinbook
synced 2024-11-22 16:18:11 +00:00
Edited appdx-bitcoinwhitepaper.asciidoc with Atlas code editor
This commit is contained in:
parent
75e193ade4
commit
ff447e1653
@ -198,21 +198,35 @@ We have proposed a system for electronic transactions without relying on trust.
|
|||||||
|
|
||||||
=== References
|
=== References
|
||||||
++++
|
++++
|
||||||
|
<p>
|
||||||
<span id="1">[1]</span> W. Dai, "b-money," <a href="http://www.weidai.com/bmoney.txt"><em>http://www.weidai.com/bmoney.txt</em></a>, 1998.
|
<span id="1">[1]</span> W. Dai, "b-money," <a href="http://www.weidai.com/bmoney.txt"><em>http://www.weidai.com/bmoney.txt</em></a>, 1998.
|
||||||
|
</p>
|
||||||
|
<p>
|
||||||
<span id="2">[2]</span> H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
|
<span id="2">[2]</span> H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.
|
||||||
|
</p>
|
||||||
|
<p>
|
||||||
<span id="3">[3]</span> S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
|
<span id="3">[3]</span> S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<p>
|
||||||
<span id="4">[4]</span> D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping," In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993.
|
<span id="4">[4]</span> D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping," In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<p>
|
||||||
<span id="5">[5]</span> S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997.
|
<span id="5">[5]</span> S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<p>
|
||||||
<span id="6">[6]</span> A. Back, "Hashcash - a denial of service counter-measure," <a href="http://www.hashcash.org/papers/hashcash.pdf"><em>http://www.hashcash.org/papers/hashcash.pdf</em></a>, 2002.
|
<span id="6">[6]</span> A. Back, "Hashcash - a denial of service counter-measure," <a href="http://www.hashcash.org/papers/hashcash.pdf"><em>http://www.hashcash.org/papers/hashcash.pdf</em></a>, 2002.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<p>
|
||||||
<span id="7">[7]</span> R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
|
<span id="7">[7]</span> R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<p>
|
||||||
<span id="8">[8]</span> W. Feller, "An introduction to probability theory and its applications," 1957.
|
<span id="8">[8]</span> W. Feller, "An introduction to probability theory and its applications," 1957.
|
||||||
|
</p>
|
||||||
++++
|
++++
|
||||||
|
|
||||||
=== License
|
=== License
|
||||||
|
Loading…
Reference in New Issue
Block a user