Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
暂无分享,去创建一个
[1] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[2] Ethan Heilman,et al. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.
[3] Andrew Miller,et al. Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .
[4] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[5] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[6] E. Felten,et al. Bitcoin and Cryptocurrency Technologies: a , 2022 .
[7] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[8] David Mazières. The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .
[9] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[10] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[11] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[12] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.
[13] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[14] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.