Survey on Blockchain Networking
暂无分享,去创建一个
Stefan Schmid | Aviv Zohar | Yvonne-Anne Pignolet | Saar Tochner | Maya Dotan | Aviv Zohar | S. Schmid | Y. Pignolet | M. Dotan | Saar Tochner
[1] Ian Goldberg,et al. Towards Practical Communication in Byzantine-Resistant DHTs , 2013, IEEE/ACM Transactions on Networking.
[2] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[3] K. Selçuk Candan,et al. Velocity: Scalability Improvements in Block Propagation Through Rateless Erasure Coding , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[4] George Danezis,et al. Consensus in the Age of Blockchains , 2017, ArXiv.
[5] Mariana Raykova,et al. RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.
[6] Ori Rottenstreich,et al. State Sharding with Space-aware Representations , 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[7] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[8] Sunny Katkuri,et al. A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements , 2018, ArXiv.
[9] Edgar R. Weippl,et al. Flux: Revisiting Near Blocks for Proof-of-Work Blockchains , 2018, IACR Cryptol. ePrint Arch..
[10] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[11] Gavin Andresen,et al. Graphene: efficient interactive set reconciliation applied to blockchain propagation , 2019, SIGCOMM.
[12] Guillermo Navarro-Arribas,et al. Cryptocurrency Networks: A New P2P Paradigm , 2018, Mob. Inf. Syst..
[13] Stefan Dziembowski,et al. PERUN: Virtual Payment Channels over Cryptographic Currencies , 2017, IACR Cryptol. ePrint Arch..
[14] Andrew Miller,et al. Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees , 2018, SIGMETRICS.
[15] Michael T. Goodrich,et al. Invertible bloom lookup tables , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] Vincent Gramoli,et al. Impact of Man-In-The-Middle Attacks on Ethereum , 2018, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS).
[17] Hannes Hartenstein,et al. Network Layer Aspects of Permissionless Blockchains , 2019, IEEE Communications Surveys & Tutorials.
[18] Giulio Malavolta,et al. Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.
[19] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[20] Laurent Vanbever,et al. SABRE: Protecting Bitcoin against Routing Attacks , 2018, NDSS.
[21] Anne-Marie Kermarrec,et al. Highly dynamic distributed computing with byzantine failures , 2013, PODC '13.
[22] Florian Tschorsch,et al. Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[23] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[24] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[25] Stefan Schmid,et al. Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges , 2020, ArXiv.
[26] Ian Goldberg,et al. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions , 2017, NDSS.
[27] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[28] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[29] David Starobinski,et al. Churn in the Bitcoin Network: Characterization and Impact , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[30] Bogdan Carbunar,et al. Hardening Stratum, the Bitcoin Pool Mining Protocol , 2017, Proc. Priv. Enhancing Technol..
[31] Emin Gün Sirer,et al. Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.
[32] Ronald L. Rivest,et al. Electronic Lottery Tickets as Micropayments , 1997, Financial Cryptography.
[33] Benoit Donnet,et al. Vivisecting Blockchain P2P Networks: Unveiling the Bitcoin IP Network , 2018 .
[34] Hannes Hartenstein,et al. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin , 2018, Financial Cryptography Workshops.
[35] E. Sirer,et al. bloXroute: A Scalable Trustless Blockchain Distribution Network WHITEPAPER , 2018 .
[36] Andrew Miller,et al. Pisa: Arbitration Outsourcing for State Channels , 2019, IACR Cryptol. ePrint Arch..
[37] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[38] Stefan Schmid,et al. Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks , 2020, ICISSP.
[39] Cristina Pérez-Solà,et al. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions , 2018, Financial Cryptography.
[40] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[41] Tong Cao,et al. Exploring the Monero Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[42] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[43] Carmela Troncoso,et al. Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments , 2017, Proc. Priv. Enhancing Technol..
[44] Stefan Schmid,et al. On Search Friction of Route Discovery in Offchain Networks , 2020, 2020 IEEE International Conference on Blockchain (Blockchain).
[45] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[46] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[47] László Gulyás,et al. Topological Analysis of Bitcoin's Lightning Network , 2019, MARBLE.
[48] Stefano Martinazzi,et al. The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity , 2020, PloS one.
[49] Hector Garcia-Molina,et al. PPay: micropayments for peer-to-peer systems , 2003, CCS '03.
[50] Ingo Weber,et al. AODV-Based Routing for Payment Channel Networks , 2018, ICBC.
[51] Hannes Hartenstein,et al. Could Network Information Facilitate Address Clustering in Bitcoin? , 2017, Financial Cryptography Workshops.
[52] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[53] Bernhard Haeupler,et al. Analyzing Network Coding (Gossip) Made Easy , 2010, J. ACM.
[54] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[55] Yusuke Aoki,et al. Effects of a Simple Relay Network on the Bitcoin Network , 2019, AINTEC '19.
[56] Aviv Zohar,et al. How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction , 2018, AFT.
[57] Qian M. Zhou,et al. Tiny Groups Tackle Byzantine Adversaries , 2017, 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
[58] Hannes Hartenstein,et al. Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin , 2019, Financial Cryptography.
[59] Lisa Fleischer,et al. Simple sybil-proof mechanisms for multi-level marketing , 2012, INFOCOM Workshops.
[60] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[61] Pavel Prihodko,et al. Flare : An Approach to Routing in Lightning Network White Paper , 2016 .
[62] Pramod Viswanath,et al. Dandelion: Redesigning the Bitcoin Network for Anonymity , 2017, Proc. ACM Meas. Anal. Comput. Syst..
[63] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[64] Stefano Avallone,et al. Routing Payments on the Lightning Network , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[65] Andrew Miller,et al. Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .
[66] Moshe Babaioff,et al. On Bitcoin and red balloons , 2011, SECO.
[67] Idit Keidar,et al. Brahms: byzantine resilient random membership sampling , 2008, PODC '08.
[68] Stefan Schmid,et al. Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff , 2019, ArXiv.
[69] Sebastian Feld,et al. Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.
[70] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[71] Giulia Fanti,et al. Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks , 2020, SIGMETRICS.
[72] Shie Mannor,et al. Generative models for rapid information propagation , 2010, SOMA '10.
[73] Ghassan O. Karame,et al. On the privacy provisions of Bloom filters in lightweight bitcoin clients , 2014, IACR Cryptol. ePrint Arch..
[74] Min Suk Kang,et al. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[75] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[76] Cristina Pérez-Solà,et al. The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.
[77] Ee-Chien Chang,et al. Towards Scaling Blockchain Systems via Sharding , 2018, SIGMOD Conference.
[78] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[79] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[80] Zekeriya Erkin,et al. Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms , 2017, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[81] Maria Gradinariu Potop-Butucaru,et al. Impact of network delays on Hyperledger Fabric , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[82] Georg Fuchsbauer,et al. SpaceMint: A Cryptocurrency Based on Proofs of Space , 2018, ERCIM News.
[83] Pedro Moreno-Sanchez,et al. SoK: Off The Chain Transactions , 2019, IACR Cryptol. ePrint Arch..
[84] Andrew Miller,et al. Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.
[85] Ittay Eyal,et al. Ostraka: Secure Blockchain Scaling by Node Sharding , 2019, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).