Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
暂无分享,去创建一个
[1] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[2] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[3] Ethan Zuckerman,et al. 2010 Report on Distributed Denial of Service (DDos) Attacks , 2010 .
[4] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[5] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[6] Tyler Moore,et al. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.
[7] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[8] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[9] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[10] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[11] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[12] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[13] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.