-
2
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Springer Berlin, Heidelberg
-
[2] Eyal, I., Sirer, E.G., Majority is not enough: Bitcoin mining is vulnerable. Financial Cryptography and Data Security, 2013, Springer, Berlin, Heidelberg, 436–454.
-
(2013)
Financial Cryptography and Data Security
, pp. 436-454
-
-
Eyal, I.1
Sirer, E.G.2
-
3
-
-
84990238333
-
-
Bitcoin protocol rules. URL.
-
[3] Bitcoin protocol rules. URL http://en.bitcoin.it/wiki/Protocol_rules.
-
-
-
-
4
-
-
84990246267
-
-
Bitcoin orphan blocks. URL.
-
[4] Bitcoin orphan blocks. URL http://blockchain.info/charts/n-orphaned-blocks.
-
-
-
-
5
-
-
84990246482
-
-
Bitcoin: A peer-to-peer electronic cash system. URL.
-
[5] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system. URL http://bitcoins.info/bitcoin-a-peer-to-peer-electroniccash-system-satoshi-nakamoto/.
-
-
-
Nakamoto, S.1
-
6
-
-
84990211451
-
-
Analysis of hashrate-based double-spending URL.
-
[6] M. Rosenfeld, Analysis of hashrate-based double-spending, 2014. URL http://arxiv.org/abs/1402.2009.
-
(2014)
-
-
Rosenfeld, M.1
-
7
-
-
84990247274
-
-
On subversive miner strategies and block withholding attack in bitcoin digital currency. URL.
-
[7] N. Courtois, L. Bahack, On subversive miner strategies and block withholding attack in bitcoin digital currency. URL http://arxiv.org/abs/1402.1718v5.
-
-
-
Courtois, N.1
Bahack, L.2
-
8
-
-
84945225920
-
Theoretical bitcoin attacks with less than half of the computational power,
-
[8] L. Bahack, Theoretical bitcoin attacks with less than half of the computational power, in: print.iacr.org/2013/868 2013.
-
(2013)
-
-
Bahack, L.1
-
9
-
-
0001720563
-
Dyck path enumeration
-
[9] Deutsch, E., Dyck path enumeration. Discrete Math. 204 (1999), 167–202.
-
(1999)
Discrete Math.
, vol.204
, pp. 167-202
-
-
Deutsch, E.1
-
10
-
-
84990175804
-
-
The on-line encyclopedia of integer sequences. URL.
-
[10] The on-line encyclopedia of integer sequences. URL https://oeis.org/.
-
-
-
-
11
-
-
84990184427
-
-
private communication.
-
[11] T. Welsh, private communication.
-
-
-
Welsh, T.1
-
12
-
-
77955679798
-
Stochastic Geometry and Wireless Networks: Volume 1: Theory, Vol. 1
-
Now Publishers Inc.
-
[12] Baccelli, F., Błaszczyszyn, B., Stochastic Geometry and Wireless Networks: Volume 1: Theory, Vol. 1. 2009, Now Publishers Inc.
-
(2009)
-
-
Baccelli, F.1
Błaszczyszyn, B.2
-
13
-
-
84990201702
-
-
Spatial interactions of peers and performance of file sharing systems. URL.
-
[13] F. Baccelli, F. Mathieu, I. Norros, Spatial interactions of peers and performance of file sharing systems. URL http://hal.inria.fr/inria-00615523v2.
-
-
-
Baccelli, F.1
Mathieu, F.2
Norros, I.3
-
14
-
-
84883121620
-
Can p2p networks be super-scalable?
-
IEEE
-
[14] Baccelli, F., Mathieu, F., Norros, I., Varloot, R., Can p2p networks be super-scalable?. INFOCOM, 2013, IEEE, 1753–1761.
-
(2013)
INFOCOM
, pp. 1753-1761
-
-
Baccelli, F.1
Mathieu, F.2
Norros, I.3
Varloot, R.4
-
15
-
-
78649958138
-
Sustaining the internet with hyperbolic mapping
-
[15] Boguná, M., Papadopoulos, F., Krioukov, D., Sustaining the internet with hyperbolic mapping. Nature Commun., 1, 2010, 62.
-
(2010)
Nature Commun.
, vol.1
, pp. 62
-
-
Boguná, M.1
Papadopoulos, F.2
Krioukov, D.3
-
16
-
-
0003523893
-
Poisson Processes
-
Oxford University Press
-
[16] Kingman, J., Poisson Processes. 1993, Oxford University Press.
-
(1993)
-
-
Kingman, J.1
-
17
-
-
33746605420
-
The Java Simulation Handbook–Simulating Discrete Event Systems with UML and Java
-
Shaker Aachen
-
[17] Page, B., Kreutzer, W., The Java Simulation Handbook–Simulating Discrete Event Systems with UML and Java. 2005, Shaker, Aachen.
-
(2005)
-
-
Page, B.1
Kreutzer, W.2
|