Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
暂无分享,去创建一个
Björn Scheuermann | Florian Tschorsch | F. Tschorsch | B. Scheuermann | Florian Tschorsch | Björn Scheuermann
[1] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[2] G. Hardin,et al. The Tragedy of the Commons , 1968, Green Planet Blues.
[3] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[7] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[8] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[9] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[10] Danny Dolev,et al. On the minimal synchronism needed for distributed consensus , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[11] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[13] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[14] Nancy A. Lynch,et al. A hundred impossibility proofs for distributed computing , 1989, PODC '89.
[15] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[16] Dennis Shasha,et al. The many faces of consensus in distributed systems , 1992, Computer.
[17] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[18] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[19] Laurie Law,et al. How to Make a Mint: The Cryptography of Anonymous Electronic Cash , 1997 .
[20] Philippe A. Janson,et al. The State of the Art in Electronic Payment Systems , 1997, Computer.
[21] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[22] Charalampos Manifavas,et al. A new family of authentication protocols , 1998, OPSR.
[23] .. Massias,et al. DESIGN OF A SECURE TIMESTAMPING SERVICEWITH MINIMAL TRUST REQUIREMENTH , 1999 .
[24] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[25] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[26] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[27] Nigel P. Smart,et al. Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..
[28] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[29] Scott Shenker,et al. Can Heterogeneity Make Gnutella Scalable? , 2002, IPTPS.
[30] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[31] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[32] Roger Dingledine,et al. From a Trickle to a Flood: Active Attacks on Several Mix Types , 2002, Information Hiding.
[33] Moni Naor,et al. On Memory-Bound Functions for Fighting Spam , 2003, CRYPTO.
[34] James Aspnes,et al. Randomized protocols for asynchronous consensus , 2002, Distributed Computing.
[35] Claudia Díaz,et al. Generalising Mixes , 2003, International Symposium on Privacy Enhancing Technologies.
[36] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[37] Emin Gün Sirer,et al. KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .
[38] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[39] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[40] Scott Shenker,et al. Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.
[41] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[42] U Moeller,et al. Mixmaster Protocol Version 2 , 2004 .
[43] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[44] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.
[45] J. Aspnes,et al. Exposing Computationally-Challenged Byzantine Impostors , 2005 .
[46] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[47] Michael J. Fischer,et al. Stabilizing Consensus in Mobile Networks , 2006, DCOSS.
[48] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[49] Nicholas Hopper,et al. Combating Double-Spending Using Cooperative P2P Systems , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[50] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[51] Jaap-Henk Hoepman,et al. Distributed Double Spending Prevention , 2007, Security Protocols Workshop.
[52] Koutarou Suzuki,et al. Traceable Ring Signature , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[53] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[54] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[55] Stamatis Vassiliadis,et al. Cost-Efficient SHA Hardware Accelerators , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[56] Kazumaro Aoki,et al. SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .
[57] Colin Percival. STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .
[58] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[59] Marcos K. Aguilera. Stumbling over Consensus Research: Misunderstandings and Issues , 2010, Replication.
[60] David L. Mills,et al. Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .
[61] Donald F. Towsley,et al. Reciprocity and Barter in Peer-to-Peer Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[62] Moshe Babaioff,et al. On bitcoin and red balloons , 2011, EC '12.
[63] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[64] Jeremy Clark,et al. CommitCoin: Carbon Dating Commitments with Bitcoin , 2011, IACR Cryptol. ePrint Arch..
[65] Michael J. Freedman,et al. Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution , 2010, IEEE/ACM Transactions on Networking.
[66] B. Laurie. Decentralised Currencies Are Probably Impossible But Let ’ s At Least Make Them Efficient , 2011 .
[67] Alex Pentland,et al. Time-Critical Social Mobilization , 2010, Science.
[68] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.
[69] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[70] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[71] Ian Goldberg,et al. Changing of the guards: a framework for understanding and improving entry guard selection in tor , 2012, WPES '12.
[72] Elmar Gerhards-Padilla,et al. Case study of the Miner Botnet , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[73] A. Coventry. NooShare : A decentralized ledger of shared computational resources , 2012 .
[74] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[75] Timo Hanke,et al. Homomorphic Payment Addresses and the Pay-to-Contract Protocol , 2012, ArXiv.
[76] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[77] Jan Vornberger,et al. Marker addresses: Adding identification information to Bitcoin transactions to leverage existing trust relationships , 2012, GI-Jahrestagung.
[78] Watson Ladd. BLIND SIGNATURES FOR BITCOIN TRANSACTION ANONYMITY , 2012 .
[79] Sergio Demián. MAVE, NEW LIGHTWEIGHT DIGITAL SIGNATURE PROTOCOLS FOR MASSIVE VERIFICATIONS , 2012 .
[80] Danielle Drainvile. An Analysis of the Bitcoin Electronic Cash System , 2012 .
[81] Stefan Katzenbeisser,et al. Structure and Anonymity of the Bitcoin Transaction Graph , 2013, Future Internet.
[82] M. Rosenfeld. Overview of Colored Coins , 2013 .
[83] Michael Bedford Taylor,et al. Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).
[84] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[85] Malte Möser,et al. An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.
[86] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[87] Marcin Andrychowicz,et al. How to deal with malleability of BitCoin transactions , 2013, ArXiv.
[88] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[89] Ruby B. Lee,et al. BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.
[90] Tyler Moore,et al. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.
[91] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[92] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[93] Nicolas Courtois,et al. The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining , 2013, ArXiv.
[94] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[95] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[96] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[97] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[98] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[99] Kerem Kaskaloglu,et al. Near Zero Bitcoin Transaction Fees Cannot Last Forever , 2014 .
[100] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[101] Goutam Paul,et al. Towards a More Democratic Mining in Bitcoins , 2014, ICISS.
[102] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[103] Janardan Misra,et al. Increasing Anonymity in Bitcoin , 2014, Financial Cryptography Workshops.
[104] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[105] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[106] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[107] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[108] Andrew Miller,et al. Fawkescoin - A Cryptocurrency Without Public-Key Cryptography , 2014, Security Protocols Workshop.
[109] J. D. Bruce. The Mini-Blockchain Scheme , 2014 .
[110] Shawn Wilkinson. MetaDisk A Blockchain-Based Decentralized File Storage Application , 2014 .
[111] Christian Decker,et al. BlueWallet: The Secure Bitcoin Wallet , 2014, STM.
[112] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[113] Nicolas Courtois,et al. On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies , 2014, ArXiv.
[114] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[115] Nicolas Courtois,et al. Optimizing SHA256 in Bitcoin Mining , 2014, CSS.
[116] Alex Biryukov,et al. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay , 2015, Financial Cryptography.
[117] Joshua A. Kroll,et al. Securing Bitcoin wallets via threshold signatures , 2014 .
[118] Jega Anish Dev. Bitcoin mining acceleration and performance quantification , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[119] Christian Decker,et al. Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.
[120] Benjamin Fabian,et al. Exploring the Bitcoin Network , 2018, WEBIST.
[121] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[122] Sebastian Feld,et al. Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.
[123] Dragos Velicanu,et al. CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .
[124] Iddo Bentov,et al. Note on fair coin toss via Bitcoin , 2014, ArXiv.
[125] Pavlin Mavrodiev,et al. The digital traces of bubbles: feedback cycles between socio-economic signals in the Bitcoin economy , 2014, Journal of The Royal Society Interface.
[126] Karl J. O'Dwyer,et al. Bitcoin mining and its energy footprint , 2014 .
[127] Andrew Miller,et al. From Onions to Shallots: Rewarding Tor Relays with TEARS , 2014 .
[128] Moti Yung,et al. On Offline Payments with Bitcoin (Poster Abstract) , 2014, Financial Cryptography Workshops.
[129] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[130] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[131] L. Ren. Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .
[132] Joseph J. LaViola,et al. Byzantine Consensus from Moderately-Hard Puzzles : A Model for Bitcoin , 2014 .
[133] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[134] Nicolas Courtois,et al. Could Bitcoin transactions be 100x faster? , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[135] Masooda N. Bashir,et al. Who Uses Bitcoin? An exploration of the Bitcoin community , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[136] István Csabai,et al. Do the Rich Get Richer? An Empirical Analysis of the Bitcoin Transaction Network , 2013, PloS one.
[137] Stephen L. Reed. Bitcoin Cooperative Proof-of-Stake , 2014, ArXiv.
[138] Cristina Pérez-Solà,et al. The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.
[139] Devavrat Shah,et al. Bayesian regression and Bitcoin , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[140] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[141] Brian Neil Levine,et al. Sybil-Resistant Mixing for Bitcoin , 2014, WPES.
[142] Nicolas Houy,et al. It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency , 2014 .
[143] David Vandervort,et al. Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System , 2014, Financial Cryptography Workshops.
[144] Adi Shamir,et al. How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? , 2014, Financial Cryptography Workshops.
[145] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[146] Aaron Yelowitz,et al. Characteristics of Bitcoin users: an analysis of Google search data , 2014 .
[147] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[148] Ghassan O. Karame,et al. Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.
[149] Marcin Andrychowicz,et al. Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.
[150] R. Dingledine,et al. One Fast Guard for Life ( or 9 months ) , 2014 .
[151] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[152] Rob Jansen,et al. A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays , 2014 .
[153] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[154] Ghassan Karame,et al. Hiding Transaction Amounts and Balances in Bitcoin , 2014, TRUST.
[155] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[156] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[157] Rainer Böhme,et al. Towards Risk Scoring of Bitcoin Transactions , 2014, Financial Cryptography Workshops.
[158] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[159] Ethan Heilman,et al. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.
[160] Iddo Bentov,et al. How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.
[161] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[162] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[163] Michele Marchesi,et al. Bitcoin Spread Prediction Using Social and Web Search Media , 2015, UMAP Workshops.
[164] Jeremy Clark,et al. Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.
[165] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[166] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[167] 이화영. X , 1960, Chinese Plants Names Index 2000-2009.
[168] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[169] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[170] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[171] Feng Hao,et al. ZombieCoin: Powering Next-Generation Botnets with Bitcoin , 2015, Financial Cryptography Workshops.
[172] Hannes Hartenstein,et al. A simulation model for analysis of attacks on the Bitcoin peer-to-peer network , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[173] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[174] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[175] A Preliminary Field Guide for Bitcoin Transaction Patterns Danno , 2015 .
[176] Rob Jansen,et al. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications , 2015, IACR Cryptol. ePrint Arch..
[177] A. Narayanan,et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .
[178] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[179] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[180] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[181] Michael S. Kester,et al. Bitcoin Transaction Graph Analysis , 2015, ArXiv.
[182] Ladislav Kristoufek,et al. What Are the Main Drivers of the Bitcoin Price? Evidence from Wavelet Coherence Analysis , 2014, PloS one.
[183] Tyler Moore,et al. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.
[184] Marcin Andrychowicz,et al. On the Malleability of Bitcoin Transactions , 2015, Financial Cryptography Workshops.
[185] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[186] Aniket Kate,et al. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.
[187] Andrew Miller,et al. Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .
[188] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.
[189] Holger Paul Keeler,et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.
[190] Daniel Kraft,et al. Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..
[191] Nicolas Houy,et al. The Bitcoin Mining Game , 2014, Ledger.
[192] Evan Duffield,et al. Darkcoin : Peer to Peer Crypto Currency with Anonymous Blockchain Transactions and an Improved Proof of Work System , .
[193] E. Felten,et al. Bitcoin and Cryptocurrency Technologies: a , 2022 .