Securing and scaling cryptocurrencies
暂无分享,去创建一个
[1] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[2] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[3] Pedro Moreno-Sanchez,et al. Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces , 2015, NDSS.
[4] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[6] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[7] Moni Naor,et al. On Memory-Bound Functions for Fighting Spam , 2003, CRYPTO.
[8] Christian Decker,et al. Bitcoin meets strong consistency , 2014, ICDCN.
[9] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[10] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[11] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[12] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[13] Archan Misra,et al. Proceedings of the 17th International Conference on Distributed Computing and Networking , 2012 .
[14] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[15] L. Fortnow,et al. Proceedings of the 10th ACM conference on Electronic commerce , 2009, EC 2009.
[16] Ethan Heilman,et al. TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments , 2016, IACR Cryptol. ePrint Arch..
[17] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[18] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[19] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[20] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[21] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[22] Emin Gün Sirer,et al. Teechan: Payment Channels Using Trusted Execution Environments , 2016, ArXiv.
[23] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[24] Yoad Lewenberg,et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..
[25] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[26] Iddo Bentov,et al. Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[27] Kartik Nayak,et al. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus , 2016, ArXiv.
[28] Elaine Shi,et al. Hybrid Consensus: Efficient Consensus in the Permissionless Model , 2016, DISC.
[29] P. Fishburn,et al. Condorcet's paradox and anonymous preference profiles , 1976 .
[30] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[31] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.