共 42 条
[12]
Ethereum, 2019, LIGHT ETH SUBPR LES
[13]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[14]
Gervais A., 2016, P ACM SIGSAC C COMP, P3, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978341]
[15]
From blockchain consensus back to Byzantine consensus
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 107
:760-769
[16]
Gruber D., 2018, P WORKSH DEC IOT SEC, P1, DOI [10.14722/diss.2018.23010, DOI 10.14722/DISS.2018.23010]
[17]
Harchol-Balter Mor, 2013, Performance Modeling and Design of Computer Systems: Queueing Theory in Action, DOI [DOI 10.1017/CBO9781139226424, 10.1017/cbo9781139226424]
[18]
Heilman E., 2018, IACR Cryptology ePrint Archive, V2018, P236
[19]
Heilman E, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P129
[20]
Hildenbrandt E., 2017, Kevm: A complete semantics of the ethereum virtual machine