共 28 条
- [11] Buterin V., 2016, T SPAM ATTACK NEXT S
- [12] De Angelis S., 2018, Tech. Rep.
- [13] Information Propagation in the Bitcoin Network [J]. 13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2013,
- [14] Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J]. COMMUNICATIONS OF THE ACM, 2018, 61 (07) : 95 - 102
- [15] Fishman G, 2001, SPRING S OPERAT RES
- [16] Gervais A., 2016, P 2016 ACM SIGSAC C, P3, DOI [DOI 10.1145/2976749.2978341, 10.1145/2976749.2978341]
- [18] Haverkort B.R., 1998, PERFORMANCE COMPUTER, DOI [10.1002/0470841923, DOI 10.1002/0470841923]
- [19] Leemis Lawrence M., 2006, DISCRETE EVENT SIMUL
- [20] Mills Aaron, 2015, 2015 25th International Conference on Field Programmable Logic and Applications (FPL), P1, DOI 10.1109/FPL.2015.7293752