The Gap Game
暂无分享,去创建一个
[1] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[2] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[3] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[4] Jeremiah Blocki,et al. Sustained Space Complexity , 2017, IACR Cryptol. ePrint Arch..
[5] Elaine Shi,et al. FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..
[6] Joshua A. Kroll,et al. perspectives on Bitcoin and second-generation cryptocurrencies , 2015 .
[7] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[8] Bayu Adhi Tama,et al. A critical review of blockchain and its current applications , 2017, 2017 International Conference on Electrical Engineering and Computer Science (ICECOS).
[9] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[10] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[11] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[12] Jacob D. Leshno,et al. Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System , 2017, The Review of Economic Studies.
[13] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[14] Kartik Nayak,et al. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus , 2016, OPODIS.
[15] Elaine Shi,et al. The Sleepy Model of Consensus , 2017, ASIACRYPT.
[16] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[17] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[18] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[19] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[20] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[21] Elaine Shi,et al. Hybrid Consensus: Efficient Consensus in the Permissionless Model , 2016, DISC.
[22] Rainer Böhme,et al. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.
[23] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[24] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[25] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[26] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[27] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[28] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[29] Ueli Maurer,et al. But Why does it Work? A Rational Protocol Design Treatment of Bitcoin , 2018, IACR Cryptol. ePrint Arch..
[30] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.