4.5 Article

Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

ROAchain: Securing Route Origin Authorization With Blockchain for Inter-Domain Routing

Guobiao He et al.

Summary: ROAchain is a novel BGP security infrastructure based on blockchain, aimed at eliminating the risks of RPKI. Unlike RPKI, ROAchain is a decentralized architecture where each AS maintains a globally consistent and tamper-proof ROA repository to authenticate the legitimacy of route origins and prevent BGP prefix hijacks.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

Am I eclipsed? A smart detector of eclipse attacks for Ethereum

Guangquan Xu et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

BAD: A Blockchain Anomaly Detection Solution

Matteo Signorini et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges

Hamda Al-Breiki et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash

Alex Biryukov et al.

PERVASIVE AND MOBILE COMPUTING (2019)

Article Computer Science, Information Systems

IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain

Mazin Debe et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

Maria Apostolaki et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Theory & Methods

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack

Kartik Nayak et al.

1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (2016)

Proceedings Paper Computer Science, Information Systems

Tampering with the Delivery of Blocks and Transactions in Bitcoin

Arthur Gervais et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Theory & Methods

Deanonymisation of Clients in Bitcoin P2P Network

Alex Biryukov et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)

Proceedings Paper Computer Science, Hardware & Architecture

Information Propagation in the Bitcoin Network

Christian Decker et al.

13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P) (2013)