Author:
Nojoumian M.,Golchubian A.,Njilla L.,Kwiat K.,Kamhoua C.
Publisher
Springer International Publishing
Reference25 articles.
1. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 43rd Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 1–10 (2010)
2. Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)
3. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
4. Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)
5. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Crypto and Data Security, pp. 436–454. Springer (2014)
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献