共 14 条
[1]
Abadi J., 2018, NATL BUREAU EC RES, VNo. w25407
[2]
Courtois N. T., 2014, ARXIV14021718
[3]
Crosby M., 2016, Applied Innovation, V2, P71, DOI DOI 10.21626/INNOVA/2016.1/01
[4]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454
[5]
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014,
2014, 8438
:161-162
[7]
Nakamoto S, 2008, BITCOIN WHITEPAPER
[8]
Natoli C, 2016, 15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016), P310, DOI 10.1109/NCA.2016.7778635
[10]
Pilkington M., 2016, BLOCKCHAIN TECHNOLOG, DOI [10.4337/9781784717766.00019., DOI 10.4337/9781784717766.00019.]