共 48 条
[1]
[Anonymous], 2018, ARXIV180711218
[3]
Cheng YK, 2018, LECT NOTES COMPUT SC, V11059, P226, DOI 10.1007/978-3-319-99660-8_20
[4]
A Survey on Security and Privacy Issues of Bitcoin
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2018, 20 (04)
:3416-3452
[5]
Crosby M., 2016, APPL INNOV REV, V2, P6
[6]
Decker C, 2013, IEEE P2P 2013 PROC, P1, DOI DOI 10.1109/P2P.2013.6688704
[8]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[9]
The Bitcoin Backbone Protocol: Analysis and Applications
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:281-310
[10]
Garey M. R., 1979, Computers and intractability. A guide to the theory of NP-completeness