Blockchain Mining Games
暂无分享,去创建一个
Aggelos Kiayias | Elias Koutsoupias | Maria Kyropoulou | Yiannis Tselekounis | A. Kiayias | E. Koutsoupias | M. Kyropoulou | Yiannis Tselekounis
[1] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[2] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[3] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[4] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[5] Ari Juels,et al. $evwu Dfw , 1998 .
[6] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[7] J. Aspnes,et al. Exposing Computationally-Challenged Byzantine Impostors , 2005 .
[8] Amnon Barak,et al. Efficient Algorithms for Anonymous Byzantine Agreement , 2008, Theory of Computing Systems.
[9] Moshe Babaioff,et al. On Bitcoin and red balloons , 2011, SECO.
[10] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[11] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[12] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[13] Aviv Zohar,et al. On bitcoin and red balloons , 2012, EC '12.
[14] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[15] Stefan Savage,et al. A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.
[16] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[17] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[18] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[19] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[20] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[21] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[22] Bruce M. Kapron,et al. On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..
[23] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[24] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[25] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[26] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[27] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[28] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[29] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[30] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.