(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
暂无分享,去创建一个
Edgar R. Weippl | William J. Knottenbelt | Aljosha Judmayer | Alexei Zamyatin | Nicholas Stifter | Philipp Schindler | Aljosha Judmayer | Nicholas Stifter | Alexei Zamyatin | E. Weippl | W. Knottenbelt | Philipp Schindler
[1] Peter R. Rizun,et al. Subchains: A Technique to Scale Bitcoin and Improve the User Experience , 2016, Ledger.
[2] Bart Preneel,et al. On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol , 2017, CoNEXT.
[3] Edgar R. Weippl,et al. Merged Mining: Curse or Cure? , 2017, DPM/CBT@ESORICS.
[4] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[5] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[6] Emin Gün Sirer,et al. Short Paper: Service-Oriented Sharding for Blockchains , 2017, Financial Cryptography.
[7] Aggelos Kiayias,et al. Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..
[8] M. Rosenfeld. Overview of Colored Coins , 2013 .
[9] Kasper Bonne Rasmussen,et al. On Bitcoin Security in the Presence of Broken Cryptographic Primitives , 2016, ESORICS.
[10] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.
[11] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[12] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[13] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[14] Hong-Sheng Zhou,et al. TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake , 2018, BCC '18.
[15] Ethan Heilman,et al. Atomically Trading with Roger: Gambling on the Success of a Hardfork , 2017, DPM/CBT@ESORICS.
[16] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[17] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[18] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[19] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[20] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[21] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[22] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.