-
1
-
-
0031256578
-
Calibrated learning and correlated equilibrium
-
Calibrated learning and correlated equilibrium. Games and Economic Behavior, 21(1):40-55, 1997.
-
(1997)
Games and Economic Behavior
, vol.21
, Issue.1
, pp. 40-55
-
-
-
2
-
-
0000908510
-
A simple adaptive procedure leading to correlated equilibrium
-
A simple adaptive procedure leading to correlated equilibrium. Econometrica, 68(5):1127-1150, 2000.
-
(2000)
Econometrica
, vol.68
, Issue.5
, pp. 1127-1150
-
-
-
3
-
-
84904326343
-
Evaluating user privacy in bitcoin
-
E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, and S. Capkun. Evaluating user privacy in bitcoin. In Proceedings of Financial Cryptography, 2013.
-
(2013)
Proceedings of Financial Cryptography
-
-
Androulaki, E.1
Karame, G.O.2
Roeschlin, M.3
Scherer, T.4
Capkun, S.5
-
4
-
-
84871023469
-
The multiplicative weights update method: A meta-algorithm and applications
-
S. Arora, E. Hazan, and S. Kale. The multiplicative weights update method: a meta-algorithm and applications. Theory of Computing, 8(1):121-164, 2012.
-
(2012)
Theory of Computing
, vol.8
, Issue.1
, pp. 121-164
-
-
Arora, S.1
Hazan, E.2
Kale, S.3
-
5
-
-
0037709910
-
The nonstochastic multiarmed bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire. The nonstochastic multiarmed bandit problem. SIAM Journal of Computing, 32(1):48-77, 2002.
-
(2002)
SIAM Journal of Computing
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
7
-
-
84906885606
-
On subversive miner strategies and block withholding attack in bitcoin digital currency
-
1402.1718
-
N. T. Courtois and L. Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs/1402.1718, 2014.
-
(2014)
CoRR
-
-
Courtois, N.T.1
Bahack, L.2
-
9
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Springer
-
I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436-454. Springer, 2014.
-
(2014)
Financial Cryptography and Data Security
, pp. 436-454
-
-
Eyal, I.1
Sirer, E.G.2
-
10
-
-
84995502361
-
Bitcoin is not broken
-
K. Hill. Bitcoin is not broken. Forbes, 2013. http://www.forbes.com/sites/kashmirhill/2013/11/06/bitcoin-is-not-broken/#55d4a8812568.
-
(2013)
Forbes
-
-
Hill, K.1
-
12
-
-
84995472546
-
Game-theoretic analysis of ddos attacks against bitcoin mining pools
-
B. Johnson, A. Laszka, J. Grossklags, M. Vasek, and T. Moore. Game-theoretic analysis of ddos attacks against bitcoin mining pools. In Proceedings of the First Workshop on Bitcoin Research, 2014.
-
(2014)
Proceedings of the First Workshop on Bitcoin Research
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
Vasek, M.4
Moore, T.5
-
14
-
-
35148838877
-
The weighted majority algorithm
-
N. Littlestone and M. K. Warmuth. The weighted majority algorithm. Inf. Comput., 108(2):212-261, 1994.
-
(1994)
Inf. Comput.
, vol.108
, Issue.2
, pp. 212-261
-
-
Littlestone, N.1
Warmuth, M.K.2
-
17
-
-
84950272507
-
Trends, tips, tolls: A longitudinal study of bitcoin transaction fees
-
M. Möser and R. Böhme. Trends, tips, tolls: A longitudinal study of bitcoin transaction fees. In Workshop on Bitcoin Research, pages 19-33, 2015.
-
(2015)
Workshop on Bitcoin Research
, pp. 19-33
-
-
Möser, M.1
Böhme, R.2
-
21
-
-
84916592965
-
Analysis of bitcoin pooled mining reward systems
-
1112.4980
-
M. Rosenfeld. Analysis of bitcoin pooled mining reward systems. CoRR, abs/1112.4980, 2011.
-
(2011)
CoRR
-
-
Rosenfeld, M.1
|