暂无分享,去创建一个
[1] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[2] R. Anderson. Open and Closed Systems Are Equivalent (that Is, in an Ideal World) , 2004 .
[3] Brian Fitzgerald,et al. Open and Closed Systems Are Equivalent (That Is, in an Ideal World) , 2007 .
[4] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[5] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[6] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[7] Nicolas Courtois,et al. The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining , 2013, ArXiv.
[8] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[9] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[10] Kim Sneppen,et al. Do Bitcoins make the world go round? On the dynamics of competing crypto-currencies , 2014, ArXiv.
[11] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[12] Robleh Ali,et al. The Economics of Digital Currencies , 2014 .
[13] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[14] Nicolas Courtois,et al. Could Bitcoin transactions be 100x faster? , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[15] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[16] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[17] Nicolas Courtois,et al. On detection of bitcoin mining redirection attacks , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[18] Bruce Schneier,et al. Cryptography Is Harder than It Looks , 2016, IEEE Secur. Priv..