Defending Blockchain Forking Attack by Delaying MTC Confirmation
暂无分享,去创建一个
Yan Wang | Kaiyu Wang | Zhenzhou Ji | Z. Ji | Yan Wang | Kaiyu Wang
[1] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[2] Wei Ni,et al. Survey on blockchain for Internet of Things , 2019, Comput. Commun..
[3] Nicolas Courtois,et al. Optimizing SHA256 in Bitcoin Mining , 2014, CSS.
[4] Zekeriya Erkin,et al. Information Propagation on Permissionless Blockchains , 2017, ArXiv.
[5] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[6] Aggelos Kiayias,et al. Proof-of-Stake Sidechains , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[7] Dongxu Liu,et al. GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[8] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[9] Xiaowen Chu,et al. Reducing Forks in the Blockchain via Probabilistic Verification , 2019, 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW).
[10] Ren Chen,et al. Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[11] Elaine Shi,et al. FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..
[12] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[13] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[14] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[15] Harry Halpin,et al. Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[16] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[17] Jonathan Katz,et al. Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.
[18] Ying Liu,et al. Model Checking PBFT Consensus Mechanism in Healthcare Blockchain Network , 2018, 2018 9th International Conference on Information Technology in Medicine and Education (ITME).
[19] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[20] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[21] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[22] Yehuda Lindell,et al. Secure Computation Without Authentication , 2005, Journal of Cryptology.
[23] Mehmet A. Orgun,et al. A Dispute Arbitration Protocol Based on a Peer-to-Peer Service Contract Management Scheme , 2016, 2016 IEEE International Conference on Web Services (ICWS).
[24] Camilo Rocha,et al. Double-spend Attack Models with Time Advantange for Bitcoin , 2016, CLEI Selected Papers.
[25] Aggelos Kiayias,et al. Linear Consistency for Proof-of-Stake Blockchains , 2019, ArXiv.
[26] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[27] Drew Stone,et al. Delayed Blockchain Protocols , 2018, ArXiv.
[28] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.