暂无分享,去创建一个
Holger Paul Keeler | Anthony E. Krzesinski | H. P. Keeler | Peter G. Taylor | Johannes Göbel | P. Taylor | J. Göbel | A. Krzesinski
[1] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[2] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[3] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[4] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[5] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[6] Ilkka Norros,et al. Can P2P networks be super-scalable? , 2013, 2013 Proceedings IEEE INFOCOM.
[7] Ilkka Norros,et al. Spatial Interactions of Peers and Performance of File Sharing Systems , 2012 .
[8] Ilkka Norros,et al. Performance of P2P Networks with Spatial Interactions of Peers , 2011, ArXiv.
[9] Marián Boguñá,et al. Sustaining the Internet with Hyperbolic Mapping , 2010, Nature communications.
[10] François Baccelli,et al. Stochastic Geometry and Wireless Networks, Volume 1: Theory , 2009, Found. Trends Netw..
[11] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[12] B. Page,et al. Simulating discrete event systems with UML and JAVA , 2006 .
[13] Emeric Deutsch. Dyck path enumeration , 1999, Discret. Math..
[14] N. J. A. Sloane,et al. The On-Line Encyclopedia of Integer Sequences , 2003, Electron. J. Comb..