共 28 条
[11]
Banks Jerry., 1984, DISCRETE EVENT SYSTE
[12]
Buterin Vitalik, 2016, Transaction spam attack: Next Steps
[13]
De Angelis S., 2018, P IT C CYB SEC ITASE, V2058, P1
[14]
Information Propagation in the Bitcoin Network
[J].
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P),
2013,
[16]
Fishman George S., 2001, SPRING S OPERAT RES, V537, DOI 10.1007/978-1-4757-3552-9
[17]
Gervais A., 2016, P ACM SIGSAC C COMP, P3, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978341]
[19]
Haverkort B.R., 1998, PERFORMANCE COMPUTER, DOI [10.1002/0470841923, DOI 10.1002/0470841923]
[20]
Mills Aaron, 2015, 2015 25th International Conference on Field Programmable Logic and Applications (FPL), P1, DOI 10.1109/FPL.2015.7293752