共 62 条
[41]
Fadhil M., 2016, P 11 INT NETW C INC, P109
[42]
Feigenbaum J, 2003, SIAM J COMPUT, V32, P131, DOI 10.1137/S0097539799361701
[43]
Feigenbaum J., 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), P501, DOI 10.1109/SFFCS.1999.814623
[44]
Fiat A, 2005, LECT NOTES COMPUT SC, V3669, P803
[45]
The Bitcoin Backbone Protocol: Analysis and Applications
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:281-310
[46]
Jehn-Ruey Jiang, 2010, Proceedings 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS 2010), P829, DOI 10.1109/ICPADS.2010.101
[47]
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014,
2014, 8438
:72-86
[48]
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:469-485
[49]
Bandwidth and latency model for DHT based peer-to-peer networks under variable churn
[J].
2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS,
2005,
:320-325