-
2
-
-
84910598312
-
Outsourced proofs of retrievability
-
ACM
-
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O Karame, Zongren Liu, and Christian A Reuter. Outsourced proofs of retrievability. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 831-843. ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 831-843
-
-
Armknecht, F.1
Bohli, J.2
Karame, G.O.3
Liu, Z.4
Reuter, C.A.5
-
5
-
-
70350244177
-
Practical byzantine fault tolerance
-
Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173-186, 1999.
-
(1999)
OSDI
, vol.99
, pp. 173-186
-
-
Castro, M.1
Liskov, B.2
-
8
-
-
84995485358
-
Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency
-
Nicolas T. Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs/1402.1718, 2014.
-
(2014)
CoRR
-
-
Nicolas, T.1
-
9
-
-
84978291536
-
On scaling decentralized blockchains
-
Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, and Emin Gün. On scaling decentralized blockchains. In Proc. 3rd Workshop on Bitcoin and Blockchain Research, 2016.
-
(2016)
Proc. 3rd Workshop on Bitcoin and Blockchain Research
-
-
Croman, K.1
Decker, C.2
Eyal, I.3
Gencer, A.E.4
Juels, A.5
Kosba, A.6
Miller, A.7
Saxena, P.8
Shi, E.9
Gün, E.10
-
11
-
-
84995497769
-
-
Ethereum. Ethereum tie breaking. Available from: https://github.com/ethereum/go-ethereum/commit/bcf565730b1816304947021080981245d084a930.
-
Ethereum Tie Breaking
-
-
Ethereum1
-
12
-
-
84995373720
-
-
Ethereum. ethernodes. Available from: https://www.ethernodes.org/network/1.
-
-
-
Ethereum. ethernodes1
-
15
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Springer
-
Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436-454. Springer, 2014.
-
(2014)
Financial Cryptography and Data Security
, pp. 436-454
-
-
Eyal, I.1
Gün Sirer, E.2
-
16
-
-
84970905345
-
-
The Finney Attack, 2013. Available from: https://en. bitcoin. it/wiki/Weaknesses#the-.22Finney.22-attack.
-
(2013)
The Finney Attack
-
-
-
18
-
-
84954139059
-
Tampering with the delivery of blocks and transactions in bitcoin
-
ACM
-
Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 692-705. ACM, 2015.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 692-705
-
-
Gervais, A.1
Ritzdorf, H.2
Karame, G.O.3
Capkun, S.4
-
23
-
-
84869455769
-
Double-spending fast payments in bitcoin
-
New York, NY, USA, ACM
-
Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS'12, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12
-
-
Karame, G.O.1
Androulaki, E.2
Capkun, S.3
-
25
-
-
85076471717
-
Enhancing bitcoin security and performance with strong consistency via collective signing
-
Austin, TX, August, USENIX Association
-
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16), pages 279-296, Austin, TX, August 2016. USENIX Association.
-
(2016)
25th USENIX Security Symposium (USENIX Security 16)
, pp. 279-296
-
-
Kogias, E.K.1
Jovanovic, P.2
Gailly, N.3
Khoffi, I.4
Gasser, L.5
Ford, B.6
-
27
-
-
84954128379
-
-
Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. Discovering bitcoin's public topology and influential nodes.
-
Discovering Bitcoin's Public Topology and Influential Nodes
-
-
Miller, A.1
Litton, J.2
Pachulski, A.3
Gupta, N.4
Levin, D.5
Spring, N.6
Bhattacharjee, B.7
-
29
-
-
84995371254
-
-
Technical report, IACR Cryptology ePrint Archive 2015
-
Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. Technical report, IACR Cryptology ePrint Archive 2015, 2015.
-
(2015)
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
-
-
Nayak, K.1
Kumar, S.2
Miller, A.3
Shi, E.4
-
34
-
-
84995529095
-
-
testmy.net. testmy.net. Available from: http://testmy.net/country.
-
-
-
-
35
-
-
84995433069
-
-
Jonathan Toomim. blocktorrent. Available from: http://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-September/011176.html.
-
Blocktorrent
-
-
Toomim, J.1
-
36
-
-
84995477817
-
-
Verizon. Verizon latency. Available from: http://www.verizonenterprise.com/about/network/latency/.
-
Verizon Latency
-
-
Verizon1
|