共 30 条
[1]
[Anonymous], 1996, Guidelines for creation, selection, and registration of an autonomous system (as)
[2]
[Anonymous], 2017, CAIDA AS RELATIONSHI
[3]
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:375-392
[4]
Bamert T, 2013, IEEE INT CONF PEER
[5]
Buterin V., 2015, On public and private blockchains
[6]
Distributing trust on the Internet
[J].
INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2001,
:183-192
[7]
Capkun S, 2012, IACR Cryptology ePrint Archive, V2012, P248
[8]
Decker C., 2013, P IEEE INT C PEER TO
[9]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[10]
Finney H., 2011, FINNEYS ATTACK