共 39 条
[1]
Abraham I., 2017, OPODIS, P1
[2]
[Anonymous], 2017, 31 INT S DISTR COMP
[3]
[Anonymous], 2018239 CRYPT EPRINT
[4]
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:375-392
[5]
Back A., 2014, Enabling blockchain innovations with pegged sidechains
[6]
Bano S., 2017, CONSENSUS AGE BLOCKC
[7]
Bentov Iddo, 2014, ACM SIGMETRICS Performance Evaluation Review, V42, P34
[8]
State Machine Replication for the Masses with BFT-SMART
[J].
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2014,
:355-362
[9]
Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016,
2016, 9604
:19-26
[10]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461