共 26 条
[1]
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]
Babaioff M., 2012, P 13 ACM C EL COMM, P56, DOI DOI 10.1145/2229012.2229022
[3]
Baliga A., 2020, Persistent Systems Ltd. Tech. Report
[4]
Bamert T, 2013, IEEE INT CONF PEER
[5]
Bentov I., 2014, ACM SIGMETRICS Performance Evaluation Review, V42, P34, DOI DOI 10.1145/2695533.2695545
[6]
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:104-121
[7]
Decker Christian, 2015, Stabilization, Safety and Security of Distributed Systems. 17th International Symposium, SSS 2015. Proceedings: LNCS 9212, P3, DOI 10.1007/978-3-319-21741-3_1
[8]
Information Propagation in the Bitcoin Network
[J].
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P),
2013,
[9]
Eyal I, 2016, 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), P45
[10]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454