An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding
暂无分享,去创建一个
Hitesh Tewari | Huy Vu | H. Tewari | Huy Vu
[1] Bruce M. Kapron,et al. On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..
[2] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[3] Laurent George,et al. BTCmap: Mapping Bitcoin Peer-to-Peer Network Topology , 2018, 2018 IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[4] William George,et al. Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[5] Hitesh Tewari,et al. Alt-PoW: An Alternative Proof-of-Work Mechanism , 2019, 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).
[6] R. Manoharan,et al. Security Enhancement In Bitcoin Protocol , 2018, 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[7] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[8] Hassan Barjini,et al. SmoothFlood: Decreasing redundant messages and increasing search quality of service in peer-to-peer networks , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[9] Mo Adda,et al. A Bitcoin Model for Evaluation of Clustering to Improve Propagation Delay in Bitcoin Network , 2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES).
[10] Suman Ghimire,et al. A Survey on Bitcoin Cryptocurrency and its Mining , 2018, 2018 26th International Conference on Systems Engineering (ICSEng).
[11] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[12] Se Jin Park,et al. Network Usage of Bitcoin Full Node , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[13] Alfred Menezes,et al. Elliptic Curve Cryptography , 2005, Encyclopedia of Cryptography and Security.
[14] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[15] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[16] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[17] Pramod Viswanath,et al. Anonymity Properties of the Bitcoin P2P Network , 2017, ArXiv.
[18] Paulo Martins,et al. TrustZone-backed bitcoin wallet , 2017, CS2@HiPEAC.
[19] Jennifer Seberry,et al. HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.
[20] Andrew Miller,et al. Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .
[21] Luís E. T. Rodrigues,et al. Adaptive information dissemination in the Bitcoin network , 2019, SAC.
[22] Mo Adda,et al. Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[23] Lei Zhang,et al. An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools , 2017, 2017 10th International Symposium on Computational Intelligence and Design (ISCID).
[24] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[25] Mahdi H. Miraz,et al. Atomic Cross-Chain Swaps: Development, Trajectory and Potential of Non-Monetary Digital Token Swap Facilities , 2019, SSRN Electronic Journal.
[26] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.