Block withholding game among bitcoin mining pools
暂无分享,去创建一个
[1] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[2] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[3] Manuela Veloso,et al. Scalable Learning in Stochastic Games , 2002 .
[4] Dean P. Foster,et al. Regret in the On-Line Decision Problem , 1999 .
[5] S. Hart,et al. A simple adaptive procedure leading to correlated equilibrium , 2000 .
[6] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
[7] Yoav Shoham,et al. New Criteria and a New Algorithm for Learning in Multi-Agent Systems , 2004, NIPS.
[8] Michael Bedford Taylor,et al. Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).
[9] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[10] Manuela M. Veloso,et al. Multiagent learning using a variable learning rate , 2002, Artif. Intell..
[11] Kouichi Sakurai,et al. Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools , 2016, ISC.
[12] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[13] Yishay Mansour,et al. Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.
[14] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[15] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[16] Jun Zhang,et al. A Nonoutsourceable Puzzle Under GHOST Rule , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[17] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[18] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[19] D. Fudenberg,et al. Consistency and Cautious Fictitious Play , 1995 .
[20] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[21] Manuela Veloso,et al. An Analysis of Stochastic Game Theory for Multiagent Reinforcement Learning , 2000 .
[22] E. Kalai,et al. Rational Learning Leads to Nash Equilibrium , 1993 .
[23] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[24] L. Shapley. SOME TOPICS IN TWO-PERSON GAMES , 1963 .
[25] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.