共 54 条
[2]
[Anonymous], 2016, NETW DISTR SYST SEC
[3]
Antonopoulos A., 2014, Bitcoin security model: trust by computation - O'Reilly Radar
[4]
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:375-392
[5]
On the Role of Value Sensitive Concerns in Software Engineering Practice
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2,
2015,
:497-500
[6]
Bastiaan M., 2015, Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin
[7]
Bitfinex, 2016, SEC BREACH UPD 3
[8]
Bitfinex, 2016, ANN
[10]
Bohr J, 2014, ANN CONF PRIV SECUR, P94, DOI 10.1109/PST.2014.6890928