Search

Your search keyword '"selfish mining"' showing total 105 results

Search Constraints

Start Over You searched for: Descriptor "selfish mining" Remove constraint Descriptor: "selfish mining"
105 results on '"selfish mining"'

Search Results

1. Q‐Learning model for selfish miners with optional stopping theorem for honest miners.

2. Ghost-Weight protocol: a highly efficient blockchain consensus for IoT.

3. BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology.

5. When is Slower Block Propagation More Profitable for Large Miners?

6. Profit Lag and Alternate Network Mining

7. Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process

8. Rethinking selfish mining under pooled mining

9. Selfish mining detection scheme based on the characters of transactions

10. Deep learning classification of bitcoin miners and exploration of upper confidence bound algorithm with less regret for the selection of honest mining.

11. Insightful Mining Equilibria

12. Reinforcement-Mining: Protecting Reward in Selfish Mining

15. An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems.

16. 基于交易记录特征的自私挖矿检测方案.

18. Blockchain Based Offloading Strategy: Incentive, Effectiveness and Security.

19. Optimal dynamic mining policy of blockchain selfish mining through sensitivity-based optimization.

20. Is semi‐selfish mining available without being detected?

21. Selfish Mining and Defending Strategies in the Bitcoin.

22. Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols

23. Sensitivity-Based Optimization for Blockchain Selfish Mining

24. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

25. Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.

26. Bitcoin Selfish Mining Modeling and Dependability Analysis

27. Exploration of Mined Block Temporarily Holding and Enforce Fork Attacks by Selfish Mining Pool in Proof-of-Work Blockchain Systems

28. A Security Detection Model for Selfish Mining Attack

29. A Survey on Attacks of Bitcoin

30. Selfish Mining in Ethereum

31. Analysis of Blockchain Selfish Mining Attacks

32. Qualitative Risks

33. A Distributed Blockchain Model of Selfish Mining

34. Towards Detection of Selfish Mining Using Machine Learning.

35. An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.

36. Towards the Rear Attuned Defense Scheme Embark Upon Selfish Mining.

37. SDoS: Selfish Mining-Based Denial-of-Service Attack.

38. Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.

39. Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols †.

40. An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems

41. Cross Chain Bribery Contracts: Majority vs Mighty Minority

42. Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information

43. Selfish Mining in Proof-of-Work Blockchain with Multiple Miners: An Empirical Evaluation

44. A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining.

45. An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack

46. Preventing proof-of-work mining attacks.

48. Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability

49. The impact of propagation delay to different selfish miners in proof-of-work blockchains.

Catalog

Books, media, physical & digital resources