暂无分享,去创建一个
[1] Laurent Vanbever,et al. Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies , 2016, ArXiv.
[2] Christian Decker,et al. Have a snack, pay with Bitcoins , 2013, IEEE P2P 2013 Proceedings.
[3] Rami Puzis,et al. Routing betweenness centrality , 2010, JACM.
[4] Giulio Malavolta,et al. Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.
[5] Pierluigi Crescenzi,et al. Improving the Betweenness Centrality of a Node by Adding Links , 2017, ACM J. Exp. Algorithmics.
[6] Emin Gün Sirer,et al. Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.
[7] The Lancet Psychiatry. The most wonderful time of the year. , 2018, Lancet psychiatry.
[8] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[9] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[10] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[11] Andrew Miller,et al. Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.
[12] Wei Chen,et al. Bounded Budget Betweenness Centrality Game for Strategic Network Formations , 2011, ESA.
[13] Keith W. Ross,et al. Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.
[14] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[15] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[16] Aviv Zohar,et al. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..
[17] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[18] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[19] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[20] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[21] Ravi Jain,et al. An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.
[22] Ghassan O. Karame,et al. Ripple: Overview and Outlook , 2015, TRUST.
[23] Florian Tschorsch,et al. Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[24] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.