共 20 条
[1]
[Anonymous], 2018, BLOCKCHAIN INFO ESTI
[2]
[Anonymous], 2014, White Paper
[3]
[Anonymous], 2013, Feather-forks: Enforcing a blacklist with sub-50% hash power
[5]
Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016,
2016, 9604
:19-26
[6]
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:104-121
[7]
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:211-227
[8]
Dziembowski S., 2017, IACR CRYPTOL EPRINT, V2017, P635
[9]
General State Channel Networks
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:949-966
[10]
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:436-454