<--- Back to Details
First PageDocument Content
Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack
Date: 2017-04-17 08:02:51
Cryptocurrencies
Computing
Bitcoin
Internet
Free software
Alternative currencies
Blockchains
Internet security
BGP hijacking
Mining pool
Ghash.io
Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

Add to Reading List

Source URL: nsg.ee.ethz.ch

Download Document from Source Website

File Size: 1,15 MB

Share Document on Facebook

Similar Documents

Majority is not Enough: Bitcoin Mining is Vulnerable∗ Ittay Eyal and Emin G¨ un Sirer Department of Computer Science, Cornell University ,

Majority is not Enough: Bitcoin Mining is Vulnerable∗ Ittay Eyal and Emin G¨ un Sirer Department of Computer Science, Cornell University ,

DocID: 1mme3 - View Document

PDF Document

DocID: 1mfH7 - View Document

Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees Malte M¨oser1 and Rainer B¨ohme2 1  Department of Information Systems, University of M¨

Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees Malte M¨oser1 and Rainer B¨ohme2 1 Department of Information Systems, University of M¨

DocID: 1m9EC - View Document

Bitcoin Verification Latency The Achilles Heel for Time Sensitive Transactions Ken Griffith & Ian Grigg Dinero Ltd  Abstract.  Bitcoin has a high latency for verifying transactions, by design.  Av

Bitcoin Verification Latency The Achilles Heel for Time Sensitive Transactions Ken Griffith & Ian Grigg Dinero Ltd Abstract.  Bitcoin has a high latency for verifying transactions, by design.  Av

DocID: 1lQ3H - View Document