Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness
暂无分享,去创建一个
[1] Nirupama Bulusu,et al. Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain , 2018, CRYBLOCK@MobiSys.
[2] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[3] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[4] Jae Kwon,et al. Tendermint : Consensus without Mining , 2014 .
[5] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[6] Paul G. Spirakis,et al. Weighted random sampling with a reservoir , 2006, Inf. Process. Lett..
[7] Liang Xiao,et al. Game theoretic study on blockchain based secure edge networks , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).
[8] T. Mackey,et al. A review of existing and emerging digital technologies to combat the global trade in fake medicines , 2017, Expert opinion on drug safety.
[9] Ethan Buchman,et al. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains , 2016 .
[10] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[11] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[12] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[13] Nirupama Bulusu,et al. Securing Pharmaceutical and High-Value Products against Tag Reapplication Attacks Using NFC Tags , 2016, 2016 IEEE International Conference on Smart Computing (SMARTCOMP).
[14] Charles Kamhoua,et al. Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm , 2018, Advances in Intelligent Systems and Computing.
[15] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[16] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[17] Bruce M. Kapron,et al. On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..