Exploring the attack surface of blockchain: A comprehensive survey
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
Exploring the attack surface of blockchain: A systematic overview
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …
The bitcoin backbone protocol: Analysis and applications
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we
extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone …
extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone …
Bitcoin's academic pedigree
Bitcoin's academic pedigree Page 1 36 COMMUNICATIONS OF THE ACM |
DECEMBER 2017 | VOL. 60 | NO. 12 practice IMA GE B Y INKED PIXEL S DOI:10.1145/3132259 …
DECEMBER 2017 | VOL. 60 | NO. 12 practice IMA GE B Y INKED PIXEL S DOI:10.1145/3132259 …
Spectre: A fast and scalable cryptocurrency protocol
A growing body of research on Bitcoin and other permissionless cryptocurrencies that utilize
Nakamoto's blockchain has shown that they do not easily scale to process a high throughput …
Nakamoto's blockchain has shown that they do not easily scale to process a high throughput …
[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
The bitcoin backbone protocol with chains of variable difficulty
Bitcoin's innovative and distributedly maintained blockchain data structure hinges on the
adequate degree of difficulty of so-called “proofs of work,” which miners have to produce in …
adequate degree of difficulty of so-called “proofs of work,” which miners have to produce in …
[PDF][PDF] Blockchain: A comparative study of consensus algorithms PoW, PoS, PoA, PoV
S Fahim, SK Rahman, S Mahmood - Int. J. Math. Sci. Comput, 2023 - researchgate.net
Since the inception of Blockchain, the computer database has been evolving into innovative
technologies. Recent technologies emerge, the use of Blockchain is also flourishing. All the …
technologies. Recent technologies emerge, the use of Blockchain is also flourishing. All the …
Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues
With the exponential rise in the number of devices, the Internet of Things (IoT) is geared
toward edge-centric computing to offer high bandwidth, low latency, and improved …
toward edge-centric computing to offer high bandwidth, low latency, and improved …
Proofs of space
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to
a shared resource. The basic idea is to ask the service requestor to dedicate some non …
a shared resource. The basic idea is to ask the service requestor to dedicate some non …