Collusion Attack from Hubs in The Blockchain Offline Channel Network
暂无分享,去创建一个
[1] Euripides Markou,et al. Complexity of Searching for a Black Hole , 2006, Fundam. Informaticae.
[2] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[3] Jeffrey S. Rosenschein,et al. Computing the Banzhaf power index in network flow games , 2007, AAMAS '07.
[4] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Rahul Savani,et al. Power Indices in Spanning Connectivity Games , 2009, AAIM.
[6] Christine Räisänen,et al. Behavioural ambidexterity: effects on individual well-being and high performance work in academia , 2019, Journal of Further and Higher Education.
[7] Matthew Green,et al. Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.
[8] Aviv Zohar,et al. Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.
[9] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[10] Giulio Malavolta,et al. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks , 2017, NDSS.
[11] Cyril Grunspan,et al. Ant routing algorithm for the Lightning Network , 2018, ArXiv.
[12] Nicola Santoro,et al. Mobile Search for a Black Hole in an Anonymous Ring , 2007, Algorithmica.
[13] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[14] Euripides Markou,et al. Searching for a Black Hole in Tree Networks , 2004, OPODIS.
[15] Pedro Moreno-Sanchez,et al. Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces , 2015, NDSS.