Author:
Stifter Nicholas,Schindler Philipp,Judmayer Aljosha,Zamyatin Alexei,Kern Andreas,Weippl Edgar
Publisher
Springer International Publishing
Reference53 articles.
1. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1–10. IEEE (2013)
2. Gervais, A., Karame, O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC, pp. 3–16. ACM (2016)
3. Lecture Notes in Computer Science;AE Gencer,2018
4. Lecture Notes in Computer Science;I Eyal,2014
5. Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 1st IEEE European Symposium on Security and Privacy, 2016. IEEE (2016)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mineable Fast Cryptocurrency KIITCOIN using SCRYPT Algorithm;2023 6th International Conference on Information Systems and Computer Networks (ISCON);2023-03-03
2. Consensus formation on heterogeneous networks;EPJ Data Science;2022-06-04
3. The Vulnerability of the Blockchain Network From the Consensus Perspective;Regulatory Aspects of Artificial Intelligence on Blockchain;2022
4. A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining;Journal of Systems Science and Systems Engineering;2021-11-04
5. SoK: Communication Across Distributed Ledgers;Financial Cryptography and Data Security;2021