相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。ROAchain: Securing Route Origin Authorization With Blockchain for Inter-Domain Routing
Guobiao He et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
Guangquan Xu et al.
COMPUTERS & SECURITY (2020)
BAD: A Blockchain Anomaly Detection Solution
Matteo Signorini et al.
IEEE ACCESS (2020)
Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges
Hamda Al-Breiki et al.
IEEE ACCESS (2020)
Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash
Alex Biryukov et al.
PERVASIVE AND MOBILE COMPUTING (2019)
IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain
Mazin Debe et al.
IEEE ACCESS (2019)
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Maria Apostolaki et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak et al.
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (2016)
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Deanonymisation of Clients in Bitcoin P2P Network
Alex Biryukov et al.
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)
Information Propagation in the Bitcoin Network
Christian Decker et al.
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P) (2013)