暂无分享,去创建一个
Jiguo Yu | Hongwei Shi | Xiuzhen Cheng | Shengling Wang | Qin Hu | Junshan Zhang | Junshan Zhang | Xiuzhen Cheng | Jiguo Yu | Qin Hu | Shengling Wang | Hongwei Shi
[1] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[2] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[3] Bart Preneel,et al. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.
[4] Qin Hu,et al. Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[5] Aziz Mohaisen,et al. Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).
[6] Qin Hu,et al. A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy , 2019, 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS).
[7] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[8] W. Press,et al. Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent , 2012, Proceedings of the National Academy of Sciences.
[9] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[10] Sushmita Ruj,et al. Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.
[11] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[12] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[13] Dusit Niyato,et al. Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.
[14] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[15] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[16] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[17] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[18] Igor Griva,et al. Diversification Across Mining Pools: Optimal Mining Strategies under PoW , 2019, ArXiv.
[19] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[20] Eyton,et al. The Diffusion of Innovations in Social Networks , 2002 .