共 43 条
- [31] Optimal Selfish Mining Strategies in Bitcoin [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 515 - 532
- [32] Schapire RE, 1999, IJCAI-99: PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 & 2, P1401
- [33] SOLAT S., 2016, ZEROBLOCK PREVENTING
- [34] Stable Device Pairing for Collaborative Data Dissemination With Device-to-Device Communications [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 1251 - 1264
- [39] Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1142 - 1158
- [40] Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 277 - 292