Author:
Avarikioti Georgia,Käppeli Lukas,Wang Yuyi,Wattenhofer Roger
Publisher
Springer International Publishing
Reference15 articles.
1. Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22–26 May 2017, pp. 375–392 (2017)
2. Avarikioti, G., Käppeli, L., Wang, Y., Wattenhofer, R.: Bitcoin Security under Temporary Dishonest Majority (2019)
3. Bonneau, J.: Hostile blockchain takeovers (short paper). In: Bitcoin’18: Proceedings of the 5th Workshop on Bitcoin and Blockchain Research (2018)
4. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, September 2013
5. Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, 17–21 May 2015, pp. 89–103 (2015)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Empirical Method to Analysis Mobile Payment Authentication Enhancement using Blockchain;2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2023-05-12
2. Hours of Horus: Keyless Cryptocurrency Wallets;Financial Cryptography and Data Security. FC 2022 International Workshops;2023
3. A Rational Protocol Treatment of 51% Attacks;Advances in Cryptology – CRYPTO 2021;2021
4. Brick: Asynchronous Incentive-Compatible Payment Channels;Financial Cryptography and Data Security;2021
5. SoK: Communication Across Distributed Ledgers;Financial Cryptography and Data Security;2021