First Page | Document Content | |
---|---|---|
Date: 2017-04-17 08:02:51Cryptocurrencies Computing Bitcoin Internet Free software Alternative currencies Blockchains Internet security BGP hijacking Mining pool Ghash.io Denial-of-service attack | Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv ZoharAdd to Reading ListSource URL: nsg.ee.ethz.chDownload Document from Source WebsiteFile Size: 1,15 MBShare Document on Facebook |
Majority is not Enough: Bitcoin Mining is Vulnerable∗ Ittay Eyal and Emin G¨ un Sirer Department of Computer Science, Cornell University ,DocID: 1mme3 - View Document | |
PDF DocumentDocID: 1mfH7 - View Document | |
Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees Malte M¨oser1 and Rainer B¨ohme2 1 Department of Information Systems, University of M¨DocID: 1m9EC - View Document | |
Bitcoin Verification Latency The Achilles Heel for Time Sensitive Transactions Ken Griffith & Ian Grigg Dinero Ltd Abstract. Bitcoin has a high latency for verifying transactions, by design. AvDocID: 1lQ3H - View Document |