暂无分享,去创建一个
Quan-Lin Li | Guoqing Zhang | Xiaole Wu | Yan-Xia Chang | Quanlin Li | Xiaole Wu | Guoqing Zhang | Yan-Xia Chang
[1] Cyril Grunspan,et al. Bitcoin Selfish Mining and Dyck Words , 2019, ArXiv.
[2] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[3] Peter G. Taylor,et al. Calculating the equilibrium distribution in level dependent quasi-birth-and-death processes , 1995 .
[4] Andre Cronje,et al. Fantom: A scalable framework for asynchronous distributed systems , 2018, ArXiv.
[5] Michal Szczepanik,et al. Analysis of Blockchain Selfish Mining Attacks , 2019, ISAT.
[6] Cyril Grunspan,et al. On Profitability of Trailing Mining , 2018, ArXiv.
[7] Lisa Morhaim. Blockchain and cryptocurrencies technologies and network structures: applications, implications and beyond , 2019 .
[8] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[9] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[10] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[11] Moustapha Ba,et al. The Markov Chain Resulting from the States of the Bitcoin , 2018 .
[12] John Tromp,et al. Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work , 2015, Financial Cryptography Workshops.
[13] Chen Feng,et al. Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[14] Bin Xiao,et al. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.
[15] Aggelos Kiayias,et al. Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era , 2020, EUROCRYPT.
[16] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[17] Qianhong Wu,et al. An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network , 2019, Comput. Secur..
[18] Modelling the dynamics of the bitcoin blockchain , 2016 .
[19] Seungjoo Kim,et al. Pooled Mining Makes Selfish Mining Tricky , 2018, IACR Cryptol. ePrint Arch..
[20] Seungjoo Kim,et al. Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment , 2019, IACR Cryptol. ePrint Arch..
[21] Cyril Grunspan,et al. On profitability of selfish mining , 2018, ArXiv.
[22] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.
[23] Aggelos Kiayias,et al. Proofs of Work for Blockchain Protocols , 2017, IACR Cryptol. ePrint Arch..
[24] Yoad Lewenberg,et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..
[25] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.
[26] Deke Guo,et al. Selfholding: A combined attack model using selfish mining with block withholding attack , 2019, Comput. Secur..
[27] Aggelos Kiayias,et al. Proof-of-Work Sidechains , 2019, IACR Cryptol. ePrint Arch..
[28] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[29] Gilles Hilary,et al. Distributed Ledgers and Operations: What Operations Management Researchers Should Know About Blockchain Technology , 2018 .
[30] Pierre-Olivier Goffard,et al. On the profitability of selfish blockchain mining under consideration of ruin , 2020, ArXiv.
[31] Younghee Park,et al. Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners , 2019, ACNS.
[32] Bart Preneel,et al. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.
[33] Ren Zhang. Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[34] Quan-Lin Li,et al. Double-End Queues with Non-Poisson Inputs and Their Effective Algorithms , 2020, 2001.00946.
[35] Volodymyr Babich,et al. OM Forum - Distributed Ledgers and Operations: What Operations Management Researchers Should Know About Blockchain Technology , 2020, Manuf. Serv. Oper. Manag..
[36] Rachid Guerraoui,et al. On the Unfairness of Blockchain , 2018, NETYS.
[37] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[38] Gavin Andresen,et al. An Analysis of Attacks on Blockchain Consensus , 2016, ArXiv.
[39] Jinwook Lee,et al. The Chain of Antichains - Box Protocol: the Dual-Blockchain and a Stablecoin , 2018, ArXiv.
[40] Célio Vinicius N. de Albuquerque,et al. On the detection of selfish mining and stalker attacks in blockchain networks , 2020, Ann. des Télécommunications.
[41] Xing Wang,et al. A Deep Dive Into Blockchain Selfish Mining , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[42] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[43] Michael Davidson,et al. On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms , 2020, IACR Cryptol. ePrint Arch..
[44] Ansgar Fehnker,et al. A Distributed Blockchain Model of Selfish Mining , 2019, FM Workshops.
[45] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild , 2017, DISC.
[46] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[47] Daniel Kraft,et al. Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..
[48] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[49] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[50] William J. Knottenbelt,et al. Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool , 2019, IACR Cryptol. ePrint Arch..
[51] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[52] Edgar R. Weippl,et al. Echoes of the Past: Recovering Blockchain Metrics From Merged Mining , 2019, IACR Cryptol. ePrint Arch..
[53] Donghoon Chang,et al. Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain , 2019, IACR Cryptol. ePrint Arch..
[54] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[55] Cyril Grunspan,et al. On profitability of stubborn mining , 2018, ArXiv.
[56] Marco Alberto Javarone,et al. Modeling a Double-Spending Detection System for the Bitcoin Network , 2018, ArXiv.
[57] Jinwook Lee,et al. Chain of Antichains: An Efficient and Secure Distributed Ledger , 2018 .
[58] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin , 2016 .
[59] Brian Neil Levine,et al. Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft) , 2017, ArXiv.
[60] Paulo Veríssimo,et al. Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure , 2019, ArXiv.
[61] Aggelos Kiayias,et al. Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.
[62] Joseph K. Liu,et al. Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful , 2019, ArXiv.
[63] L Bright,et al. Equilibrium Distributions for Level-Dependent Quasi-Birth-and-Death Processes , 1996 .
[64] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[65] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[66] Aggelos Kiayias,et al. Securing Proof-of-Work Ledgers via Checkpointing , 2021, 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[67] Marcel F. Neuts,et al. Matrix-geometric solutions in stochastic models - an algorithmic approach , 1982 .
[68] K. Wüst. Security of Blockchain Technologies , 2016 .
[69] O. Dunkelman. On Trees, Chains and Fast Transactions in the Blockchain , 2017 .
[70] Quan-Lin Li. Constructive Computation in Stochastic Models with Applications: The RG-Factorizations , 2010 .
[71] Ning Zhang,et al. A Survey of Distributed Consensus Protocols for Blockchain Networks , 2019, IEEE Communications Surveys & Tutorials.
[72] Neha Gupta. Security and Privacy Issues on Blockchain Technology , 2019, Journal of Xidian University.
[73] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.
[74] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[75] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[76] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[77] Weijia Jia,et al. On the Strategy and Behavior of Bitcoin Mining with N-attackers , 2018, IACR Cryptol. ePrint Arch..
[78] Zibin Zheng,et al. A Survey of State-of-the-Art on Blockchains , 2020, ACM Comput. Surv..
[79] Hamzeh Khazaei,et al. Performance Evaluation of Blockchain Systems: A Systematic Survey , 2020, IEEE Access.
[80] Aggelos Kiayias,et al. Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..
[81] Tongge Xu,et al. An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack , 2020, IEEE Access.
[82] Jonathan Katz,et al. Competing (Semi-)Selfish Miners in Bitcoin , 2019, AFT.
[83] The Fallacy of Selfish Mining in Bitcoin: A Mathematical Critique , 2017 .
[84] Quan-Lin Li,et al. Markov processes in blockchain systems , 2019, ArXiv.
[85] Aziz Mohaisen,et al. Overview of Attack Surfaces in Blockchain , 2019, Blockchain for Distributed Systems Security.
[86] George Danezis,et al. SoK: Consensus in the Age of Blockchains , 2017, AFT.
[87] Jason Teutsch,et al. Smart Contracts Make Bitcoin Mining Pools Vulnerable , 2017, Financial Cryptography Workshops.
[88] Long Tran-Thanh,et al. On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners , 2018, ArXiv.
[89] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[90] A. Stephen Morse,et al. Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[91] Alf Zugenmaier,et al. The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[92] Xinying Yu,et al. A Security Detection Model for Selfish Mining Attack , 2019, BlockSys.
[93] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[94] Thomas Thurner,et al. Supply chain finance and blockchain technology – the case of reverse securitisation , 2018, foresight.
[95] Brian H. Fralix,et al. A further study of some Markovian Bitcoin models from Göbel et al. , 2020, Stochastic Models.
[96] Aziz Mohaisen,et al. Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).
[97] The Fallacy of the Selfish Miner in Bitcoin: An Economic Critique , 2017 .
[98] Kyungbaek Kim,et al. A Survey about Consensus Algorithms Used in Blockchain , 2018, J. Inf. Process. Syst..
[99] Quan-Lin Li,et al. Blockchain Queue Theory , 2018, CSoNet.
[100] Fehmi Jaafar,et al. Validating BGP Update Using Blockchain-Based Infrastructure , 2020 .
[101] Long Tran-Thanh,et al. An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners , 2019, PRIMA.