Selfholding: A combined attack model using selfish mining with block withholding attack
暂无分享,去创建一个
Deke Guo | Jianfeng Ma | Yulong Shen | Xuewen Dong | Feng Wu | Anter Faree | Yulong Shen | Jianfeng Ma | Deke Guo | Xuewen Dong | Anter Faree | Feng Wu
[1] Ghassan O. Karame,et al. On the Security and Scalability of Bitcoin's Blockchain , 2016, CCS.
[2] Ahmed Serhrouchni,et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..
[3] JooSeok Song,et al. Trend of centralization in Bitcoin's distributed network , 2015, 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[4] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[5] Danny Bradbury,et al. The problem with Bitcoin , 2013 .
[6] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[7] Albert Levi,et al. A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.
[8] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[9] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[10] Chinmaya Vyas,et al. Security Concerns and Issues for Bitcoin , 2014 .
[11] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[12] Sarah Underwood,et al. Blockchain beyond bitcoin , 2016, Commun. ACM.
[13] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[14] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[15] Tyler Moore,et al. The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox , 2017, J. Cybersecur..
[16] Reuben Grinberg. Bitcoin: An Innovative Alternative Digital Currency , 2011 .
[17] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[18] Sylvia Richardson,et al. Markov Chain Monte Carlo in Practice , 1997 .
[19] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[20] Cristina Pérez-Solà,et al. The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.
[21] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[22] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[23] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[24] David Lee Kuo Chuen,et al. Introduction to Bitcoin , 2015 .