Menu
Home
Log in / Register
 
Home arrow Business & Finance arrow Bitcoin and Blockchain Security
Source

References

[1] S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2009.

[2] Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. IACR Cryptology ePrint Archive, 2015:578, 2015.

[3] What is spv mining, and how did it (inadvertently) cause the fork after bip66 was activated? available from https://bitcoin.stackexchange.com/questions/38437/what- is-spv-mining-and-how-did-it-inadvertently-cause-the-fork-after- bip66-wa.

[4] Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, and Damian Gruber. On the Privacy Provisions of Bloom filters in Lightweight Bitcoin Clients. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, pages 326-335, 2014.

[5] Mike Hearn. Connection bloom filtering, 2012. available from https://github.com/

bitcoin/bips/blob/master/bip-0037.mediawiki.

[6] Burton H Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.

[7] Ken Christensen, Allen Roginsky, and Miguel Jimeno. A new analysis of the false positive rate of a bloom filter. Information Processing Letters, 110(21):944-949, 2010.

[8] TOR project. available from https://www.torproject.org/.

[9] S Joshua Swamidass and Pierre Baldi. Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of Chemical Information and Modeling, 47(3):952-964, 2007.

 
Source
Found a mistake? Please highlight the word and press Shift + Enter  
< Prev   CONTENTS   Next >
 
Subjects
Accounting
Business & Finance
Communication
Computer Science
Economics
Education
Engineering
Environment
Geography
Health
History
Language & Literature
Law
Management
Marketing
Mathematics
Political science
Philosophy
Psychology
Religion
Sociology
Travel