References

[1] S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2009.

[2] Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. IACR Cryptology ePrint Archive, 2015:578, 2015.

[3] What is spv mining, and how did it (inadvertently) cause the fork after bip66 was activated? available from https://bitcoin.stackexchange.com/questions/38437/what- is-spv-mining-and-how-did-it-inadvertently-cause-the-fork-after- bip66-wa.

[4] Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, and Damian Gruber. On the Privacy Provisions of Bloom filters in Lightweight Bitcoin Clients. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, pages 326-335, 2014.

[5] Mike Hearn. Connection bloom filtering, 2012. available from https://github.com/

bitcoin/bips/blob/master/bip-0037.mediawiki.

[6] Burton H Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.

[7] Ken Christensen, Allen Roginsky, and Miguel Jimeno. A new analysis of the false positive rate of a bloom filter. Information Processing Letters, 110(21):944-949, 2010.

[8] TOR project. available from https://www.torproject.org/.

[9] S Joshua Swamidass and Pierre Baldi. Mathematical correction for fingerprint similarity measures to improve chemical retrieval. Journal of Chemical Information and Modeling, 47(3):952-964, 2007.

 
Source
< Prev   CONTENTS   Source   Next >