共 14 条
[1]
[Anonymous], 2014, ARXIV PREPRINT ARXIV
[2]
Bag Samiran, 2017, IEEE Transactions on Information Forensics and Security, V12, P1967, DOI 10.1109/TIFS.2016.2623588
[3]
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools
[J].
INFORMATION SECURITY, (ISC 2016),
2016, 9866
:167-180
[5]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[6]
Karame G., 2012, Proceedings of the 2012 ACM conference on Computer and communications security, P906, DOI DOI 10.1145/2382196.2382292
[7]
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:195-209
[8]
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
[J].
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015,
2015,
:397-411
[9]
NAKAMOTO S., 2008, DECENT BUS REV, P1