Aurora: A Robust and Trustless Verification and Synchronization Algorithm for Distributed Ledgers
暂无分享,去创建一个
[1] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[2] Barney Warf,et al. Geographies of global Internet censorship , 2011 .
[3] Christos Faloutsos,et al. Patterns on the Connected Components of Terabyte-Scale Graphs , 2010, 2010 IEEE International Conference on Data Mining.
[4] Mohammad Marufuzzaman,et al. Botnet detection using graph-based feature clustering , 2017, Journal of Big Data.
[5] Jun Zhang,et al. An Effective Network Traffic Classification Method with Unknown Flow Detection , 2013, IEEE Transactions on Network and Service Management.
[6] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[7] Jun Zhang,et al. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions , 2013, IEEE Transactions on Information Forensics and Security.
[8] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[9] Vitalik Buterin,et al. Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities , 2018, ArXiv.
[10] Diane E. Vaughan,et al. A Survey of the Coupon Collector’s Problem with Random Sample Sizes , 2007 .
[11] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.