A Strong Adaptive, Strategic Double-Spending Attack on Blockchains
暂无分享,去创建一个
[1] Assaf Shomer. On the Phase Space of Block-Hiding Strategies in Bitcoin-like networks , 2014, IACR Cryptol. ePrint Arch..
[2] Vincent Gramoli,et al. The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[3] Arvind Narayanan,et al. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design , 2015, WEIS.
[4] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[5] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[6] D. Anderson,et al. Algorithms for minimization without derivatives , 1974 .
[7] Hannes Hartenstein,et al. A simulation model for analysis of attacks on the Bitcoin peer-to-peer network , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[8] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[9] W. Marsden. I and J , 2012 .
[10] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[11] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[12] Sheldon M. Ross,et al. Introduction to probability models , 1975 .
[13] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[14] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[15] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[16] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.