[1] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash sys-tem[J]. Decentralized Business Review, 2008: 21260.
[2] 王群, 李馥娟, 王振力, 等. 区块链原理及关键技术[J]. 计算机科学与探索, 2020, 14(10): 1621-1643.
WANG Q, LI F J, WANG Z L, et al. Principle and core technology of blockchain[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1621-1643.
[3] AL-SAQAF W, SEIDLER N. Blockchain technology for social impact: opportunities and challenges ahead[J]. Journal of Cyber Policy, 2017, 2(3): 338-354.
[4] MUKKAMALA R R, VATRAPU R, RAY P K, et al. Blockchain for social business: principles and applications[J]. IEEE Engineering Management Review, 2018, 46(4): 94-99.
[5] 于戈, 聂铁铮, 李晓华, 等. 区块链系统中的分布式数据管理技术-挑战与展望[J]. 计算机学报, 2021, 44(1): 28-53.
YU G, NIE T Z, LI X H, et al. Distributed data management technology in blockchain system-challenges and prospects[J]. Chinese Journal of Computers, 2021, 44(1): 28-53.
[6] ZHANG C, WU C, WANG X. Overview of blockchain consensus mechanism[C]//Proceedings of the 2020 2nd International Conference on Big Data Engineering, Shanghai, May 29-31, 2020. New York: ACM, 2020: 7-12.
[7] TUSHAR W, SAHA T K, YUEN C, et al. Peer-to-peer trading in electricity networks: an overview[J]. IEEE Transactions on Smart Grid, 2020, 11(4): 3185-3200.
[8] GENCER A E, BASU S, EYAL I, et al. Decentralization in bitcoin and ethereum networks[C]//LNCS 10957:Proceedings of the 22nd International Conference on Financial Cryptography and Data Security, Nieuwpoort, 2018. Cham: Springer, 2018: 439-457.
[9] CHANG S Y, PARK Y. Silent timestamping for blockchain mining pool security[C]//Proceedings of the 2019 International Conference on Computing, Networking and Communications, Honolulu, Feb 18-21, 2019. Piscataway: IEEE, 2019: 1-5.
[10] RAHOUTI M, XIONG K, GHANI N. Bitcoin concepts, threats, and machine-learning security solutions[J]. IEEE Access, 2018, 6: 67189-67205.
[11] KOVALCHUK L, KAIDALOV D, NASTENKO A, et al. Decreasing security threshold against double spend attack in networks with slow synchronization[J]. Computer Communications, 2020, 154: 75-81.
[12] ZAGHLOUL E, LI T, MUTKA M W, et al. Bitcoin and block-chain: security and privacy[J]. IEEE Internet of Things Journal, 2020, 7(10): 10288-10313.
[13] LEE H, SHIN M, KIM K S, et al. Recipient-oriented transaction for preventing double spending attacks in private blockchain[C]//Proceedings of the 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, Hong Kong, China, Jun 11-13, 2018. Piscataway: IEEE, 2018: 1-2.
[14] RAMEZAN G, LEUNG C S. An analysis of proof-of-work based blockchains under an adaptive double-spend attack[J]. IEEE Transactions on Industrial Informatics, 2020, 16(11): 7035-7045.
[15] ZHANG S J, LEE J H. Mitigations on sybil-based double-spend attacks in bitcoin[J]. IEEE Consumer Electronics Magazine, 2021, 10(5): 23-28.
[16] RAMEZAN G, LEUNG C, WANG Z J. A strong adaptive, strategic double-spending attack on blockchains[C]//Proce-edings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, Jul 30-Aug 3, 2018. Piscataway: IEEE, 2018: 1219-1227.
[17] 邸剑, 吝伟华. 区块链中矿池选择策略的研究与分析[J]. 计算机应用研究, 2020, 37(6): 1804-1807.
DI J, WEI W H. Research and analysis of mining pool selection strategy in blockchain[J]. Application Research of Computers, 2020, 37(6): 1804-1807.
[18] 杨天, 薛质. 区块链系统中矿池间的博弈问题及优化[J]. 通信技术, 2019, 52(5): 1189-1195.
YANG T, XUE Z. The game problem and optimization between mining pools in the blockchain system[J]. Communication Technology, 2019, 52(5): 1189-1195.
[19] 高永琳, 程晓荣. 区块链中的自私挖掘研究与分析[J]. 计算机工程与应用, 2018, 54(15): 62-66.
GAO Y L, CHENG X R. Research and analysis of selfish mining in blockchain[J]. Computer Engineering and Applications, 2018, 54(15): 62-66.
[20] 范丽, 郑红, 黄建华, 等. 基于自适应零行列式策略的区块链矿池合作演化方法[J]. 计算机应用, 2019, 39(3): 302-307.
FAN L, ZHENG H, HUANG J H, et al. Blockchain mining pool cooperative evolution method based on adaptive zero determinant strategy[J]. Journal of Computer Applications, 2019, 39(3): 302-307. |