These are the sources and citations used to research crypto 2. This bibliography was generated on Cite This For Me on

  • Journal

    Bae, J. and Lim, H.

    Random Mining Group Selection to Prevent 51% Attacks on Bitcoin

    2018 - 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)

    In-text: (Bae and Lim, 2018)

    Your Bibliography: Bae, J. and Lim, H., 2018. Random Mining Group Selection to Prevent 51% Attacks on Bitcoin. 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W),.

  • Journal

    Eyal, I. and Sirer, E. G.

    Majority is not enough

    2018 - Communications of the ACM

    In-text: (Eyal and Sirer, 2018)

    Your Bibliography: Eyal, I. and Sirer, E., 2018. Majority is not enough. Communications of the ACM, 61(7), pp.95-102.

  • Journal

    Kovalchuk, L., Kaidalov, D., Shevtsov, O., Nastenko, A., Rodinko, M. and Oliynykov, R.

    Analysis of splitting attacks on Bitcoin and GHOST consensus protocols

    2017 - 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)

    In-text: (Kovalchuk et al., 2017)

    Your Bibliography: Kovalchuk, L., Kaidalov, D., Shevtsov, O., Nastenko, A., Rodinko, M. and Oliynykov, R., 2017. Analysis of splitting attacks on Bitcoin and GHOST consensus protocols. 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS),.

  • Journal

    Mayer, H.

    ECDSA Security in Bitcoin and Ethereum: a Research Survey

    2016 - CoinFabrik

    In-text: (Mayer, 2016)

    Your Bibliography: Mayer, H., 2016. ECDSA Security in Bitcoin and Ethereum: a Research Survey. CoinFabrik, [online] Available at: <https://blog.coinfabrik.com/wp-content/uploads/2016/06/ECDSA-Security-in-Bitcoin-and-Ethereum-a-Research-Survey.pdf> [Accessed 4 November 2019].

  • Conference proceedings

    Möser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., Srivastava, S., Hogan, K., Hennessey, J., Miller, A., Narayanan, A. and Christin, N.

    An Empirical Analysis of Traceability in the Monero Blockchain

    2018 - De Gruyter Online

    In-text: (Möser et al., 2018)

    Your Bibliography: Möser, M., Soska, k., Heilman, e., Lee, k., Heffan, h., Srivastava, s., Hogan, k., Hennessey, j., Miller, a., Narayanan, a. and Christin, n., 2018. An Empirical Analysis of Traceability in the Monero Blockchain. In: Proceedings on Privacy Enhancing Technologies. De Gruyter Online, pp.1-22.

  • Journal

    Natoli, C. and Gramoli, V.

    The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium

    2017 - 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    In-text: (Natoli and Gramoli, 2017)

    Your Bibliography: Natoli, C. and Gramoli, V., 2017. The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),.

  • Journal

    Otte, P., de Vos, M. and Pouwelse, J.

    TrustChain: A Sybil-resistant scalable blockchain

    2017 - Future Generation Computer Systems

    In-text: (Otte, de Vos and Pouwelse, 2017)

    Your Bibliography: Otte, P., de Vos, M. and Pouwelse, J., 2017. TrustChain: A Sybil-resistant scalable blockchain. Future Generation Computer Systems,.

  • Journal

    Pérez-Solà, C., Ranchal-Pedrosa, A., Herrera-Joancomartí, J., Navarro-Arribas, G. and Garcia-Alfaro, J.

    LockDown: Balance Availability Attack against Lightning Network Channels

    2019 - cryptoeprint

    In-text: (Pérez-Solà et al., 2019)

    Your Bibliography: Pérez-Solà, c., Ranchal-Pedrosa, a., Herrera-Joancomartí, j., Navarro-Arribas, g. and Garcia-Alfaro, j., 2019. LockDown: Balance Availability Attack against Lightning Network Channels. cryptoeprint, [online] Available at: <https://eprint.iacr.org/2019/1149> [Accessed 3 November 2019].

  • Journal

    Qian, Z., Mao, Z. M. and Xie, Y.

    Collaborative TCP sequence number inference attack

    2012 - Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12

    In-text: (Qian, Mao and Xie, 2012)

    Your Bibliography: Qian, Z., Mao, Z. and Xie, Y., 2012. Collaborative TCP sequence number inference attack. Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12,.

  • Book

    Schreiber, F. R.

    Sybil

    1974 - Regnery - Chicago

    In-text: (Schreiber, 1974)

    Your Bibliography: Schreiber, F., 1974. Sybil. Chicago: Regnery.

  • Journal

    Tapsell, J., Akram, R. and Markantonakis, K.

    An evaluation of the security of the Bitcoin Peer-to- Peer Network

    2018

    In-text: (Tapsell, Akram and Markantonakis, 2018)

    Your Bibliography: Tapsell, j., Akram, r. and Markantonakis, k., 2018. An evaluation of the security of the Bitcoin Peer-to- Peer Network. [online] Available at: <https://arxiv.org/pdf/1805.10259.pdf> [Accessed 3 November 2019].

  • Journal

    Wang, Z., Yu, H., Zhang, Z., Piao, J. and Liu, J.

    ECDSA weak randomness in Bitcoin

    2019 - Future Generation Computer Systems

    In-text: (Wang et al., 2019)

    Your Bibliography: Wang, Z., Yu, H., Zhang, Z., Piao, J. and Liu, J., 2019. ECDSA weak randomness in Bitcoin. Future Generation Computer Systems, 102, pp.507-513.

  • Journal

    Wei, P., Yuan, Q. and Zheng, Y.

    Security of the Blockchain Against Long Delay Attack

    2018 - Lecture Notes in Computer Science

    In-text: (Wei, Yuan and Zheng, 2018)

    Your Bibliography: Wei, P., Yuan, Q. and Zheng, Y., 2018. Security of the Blockchain Against Long Delay Attack. Lecture Notes in Computer Science, pp.250-275.

  • Conference proceedings

    Wijaya, D., Liu, J., Steinfeld, R. and Liu, D.

    Monero Ring Attack: Recreating Zero Mixin Transaction Effect

    2018 - IEEE - New York

    In-text: (Wijaya, Liu, Steinfeld and Liu, 2018)

    Your Bibliography: Wijaya, d., Liu, j., Steinfeld, r. and Liu, d., 2018. Monero Ring Attack: Recreating Zero Mixin Transaction Effect. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. IEEE.

  • Journal

    Zhang, S. and Lee, J.

    Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network

    2019 - IEEE Transactions on Industrial Informatics

    In-text: (Zhang and Lee, 2019)

    Your Bibliography: Zhang, S. and Lee, J., 2019. Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network. IEEE Transactions on Industrial Informatics, 15(10), pp.5715-5722.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join