These are the sources and citations used to research crypto 2. This bibliography was generated on Cite This For Me on
In-text: (Bae and Lim, 2018)
Your Bibliography: Bae, J. and Lim, H., 2018. Random Mining Group Selection to Prevent 51% Attacks on Bitcoin. 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W),.
In-text: (Eyal and Sirer, 2018)
Your Bibliography: Eyal, I. and Sirer, E., 2018. Majority is not enough. Communications of the ACM, 61(7), pp.95-102.
In-text: (Kovalchuk et al., 2017)
Your Bibliography: Kovalchuk, L., Kaidalov, D., Shevtsov, O., Nastenko, A., Rodinko, M. and Oliynykov, R., 2017. Analysis of splitting attacks on Bitcoin and GHOST consensus protocols. 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS),.
In-text: (Mayer, 2016)
Your Bibliography: Mayer, H., 2016. ECDSA Security in Bitcoin and Ethereum: a Research Survey. CoinFabrik, [online] Available at: <https://blog.coinfabrik.com/wp-content/uploads/2016/06/ECDSA-Security-in-Bitcoin-and-Ethereum-a-Research-Survey.pdf> [Accessed 4 November 2019].
In-text: (Möser et al., 2018)
Your Bibliography: Möser, M., Soska, k., Heilman, e., Lee, k., Heffan, h., Srivastava, s., Hogan, k., Hennessey, j., Miller, a., Narayanan, a. and Christin, n., 2018. An Empirical Analysis of Traceability in the Monero Blockchain. In: Proceedings on Privacy Enhancing Technologies. De Gruyter Online, pp.1-22.
In-text: (Natoli and Gramoli, 2017)
Your Bibliography: Natoli, C. and Gramoli, V., 2017. The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),.
In-text: (Otte, de Vos and Pouwelse, 2017)
Your Bibliography: Otte, P., de Vos, M. and Pouwelse, J., 2017. TrustChain: A Sybil-resistant scalable blockchain. Future Generation Computer Systems,.
In-text: (Pérez-Solà et al., 2019)
Your Bibliography: Pérez-Solà, c., Ranchal-Pedrosa, a., Herrera-Joancomartí, j., Navarro-Arribas, g. and Garcia-Alfaro, j., 2019. LockDown: Balance Availability Attack against Lightning Network Channels. cryptoeprint, [online] Available at: <https://eprint.iacr.org/2019/1149> [Accessed 3 November 2019].
In-text: (Qian, Mao and Xie, 2012)
Your Bibliography: Qian, Z., Mao, Z. and Xie, Y., 2012. Collaborative TCP sequence number inference attack. Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12,.
In-text: (Schreiber, 1974)
Your Bibliography: Schreiber, F., 1974. Sybil. Chicago: Regnery.
In-text: (Tapsell, Akram and Markantonakis, 2018)
Your Bibliography: Tapsell, j., Akram, r. and Markantonakis, k., 2018. An evaluation of the security of the Bitcoin Peer-to- Peer Network. [online] Available at: <https://arxiv.org/pdf/1805.10259.pdf> [Accessed 3 November 2019].
In-text: (Wang et al., 2019)
Your Bibliography: Wang, Z., Yu, H., Zhang, Z., Piao, J. and Liu, J., 2019. ECDSA weak randomness in Bitcoin. Future Generation Computer Systems, 102, pp.507-513.
In-text: (Wei, Yuan and Zheng, 2018)
Your Bibliography: Wei, P., Yuan, Q. and Zheng, Y., 2018. Security of the Blockchain Against Long Delay Attack. Lecture Notes in Computer Science, pp.250-275.
In-text: (Wijaya, Liu, Steinfeld and Liu, 2018)
Your Bibliography: Wijaya, d., Liu, j., Steinfeld, r. and Liu, d., 2018. Monero Ring Attack: Recreating Zero Mixin Transaction Effect. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. IEEE.
In-text: (Zhang and Lee, 2019)
Your Bibliography: Zhang, S. and Lee, J., 2019. Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network. IEEE Transactions on Industrial Informatics, 15(10), pp.5715-5722.
10,587 students joined last month!