共 20 条
- [1] [Anonymous], 2018, BLOCKCHAIN INFO ESTI
- [2] [Anonymous], 2014, White Paper
- [3] [Anonymous], 2013, Feather-forks: Enforcing a blacklist with sub-50% hash power
- [5] Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 : 19 - 26
- [6] SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 104 - 121
- [7] Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 211 - 227
- [8] Dziembowski S., 2017, IACR CRYPTOL EPRINT, V2017, P635
- [9] General State Channel Networks [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 949 - 966
- [10] Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 436 - 454