暂无分享,去创建一个
We present Bitcoin Security Tables computing the probability of success p(z, q, t) of a double spend attack by an attacker controlling a share q of the hashrate after z confirmations in time t.
[1] Cyril Grunspan,et al. Double spend races , 2017, International Journal of Theoretical and Applied Finance.