First Page | Document Content | |
---|---|---|
Date: 2017-04-03 15:58:18Cryptocurrencies Computing Bitcoin Internet Free software Alternative currencies Blockchains Internet security BGP hijacking Mining pool Ghash.io Denial-of-service attack | Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv ZoharAdd to Reading ListSource URL: www.ieee-security.orgDownload Document from Source WebsiteFile Size: 1,15 MBShare Document on Facebook |
TUESDAY, DECEMBER 6, 2016 War On Alternative Currencies Heating Up By Dashiell C. Shapiro and Robert W. Wood TDocID: 1uwXY - View Document | |
Reclaiming the Credit Commons Towards a Butterfly Society By Thomas H. Greco, Jr. By now, local currencies and alternative exchange systems have become familiar themes inDocID: 1t69k - View Document | |
COLUM. SCI. & TECH. L. REVVol. XVIDocID: 1rueh - View Document | |
This article was downloaded by: [On: 07 April 2013, At: 10:40 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: Registered office: Mortimer House, 37-41 Mortimer SDocID: 1rtRn - View Document | |
swiss economics swiss economics The Effect of Payment Reversibility on E-commerce and Postal QualityDocID: 1rsIF - View Document |