共 126 条
- [51] SHEN Muyao, Crypto investors have ignored three straight 51% attacks on ETC
- [52] DOUCEUR J R., The Sybil attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems, (2002)
- [53] EKPARINYA P, GRAMOLI V, JOURJON G., The attack of the clones against proof-of-authority
- [54] APOSTOLAKI M, ZOHAR A, VANBEVER L., Hijacking bitcoin:Routing attacks on cryptocurrencies, Proceedings of IEEE Symposium on Security and Privacy, pp. 375-392, (2017)
- [55] MARCUS Y, HEILMAN E, GOLDBERG S., Low-resource eclipse attacks on Ethereum's peer-to-peer network
- [56] ALANGOT B, REIJSBERGEN D, VENUGOPALAN S, Et al., Decentralized lightweight detection of eclipse attacks on bitcoin clients, Proceedings of IEEE International Conference on Blockchain, (2020)
- [57] CHEN H, PENDLETON M, NJILLA L, Et al., A survey on Ethereum systems security:Vulnerabilities, attacks, and defenses[J], ACM Computing Surveys, 53, 3, pp. 61-67, (2020)
- [58] What is FIBRE
- [59] OTSUKI K, AOKI Y, BANNO R, Et al., Effects of a simple relay network on the Bitcoin network, Proceedings of the Asian Internet Engineering Conference, pp. 41-46, (2019)
- [60] APOSTOLAKI M, MARTI G, MULLER J, Et al., SABRE:Protecting bitcoin against routing attacks