References
- J. R. Douceur.(2002). The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), Cambridge, MA.
- E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. (2015). Eclipse attacks on Bitcoin's peer-to-peer network. In Proceedings of the 24th Usenix Security Symposium, Washington, DC. 129-144.
- S. Nakamoto. (2008) . Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
- C. Decker and R. Wattenhofer. (2013). Information propagation in the Bitcoin network. In Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing.
- I. Eyal and E. G. Sirer. (2014). Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the 2013 Financial Cryptography and Data Security Conference.
- D. Mazieres. (2014). The Stellar consensus protocol: A federated model for internet-level consensus. https://www.stellar.org/papers/stellarconsensus-protocol.pdf
- Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich. (2017). "Algorand: Scaling byzantine agreements for cryptocurrencies," in Proeedings. 26th ACM Symp. Operating Syst. Principles, 51-68.
- M. Castro and B. Liskov. (1999). "Practical byzantine fault tolerance," in Proceeding. 3rd USENIX Symp. Operating Syst. Des. Implementation, 173-186.
- Y. Kwon, D. Kim, Y. Son, E. Vasserman, and Y. Kim, (2017). "Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '17. ACM, 195-209.
- S. Bag, S. Ruj, and K. Sakurai, (2016). "Bitcoin block withholding attack :Analysis and mitigation," IEEE Transactions on Information Forensics and Security, 99, 1-12.
- G. Karame, E. Androulaki, and S. Capkun. Double- Spending (2012). Fast Payments in Bitcoin. In Proceedings of ACM CCS 2012.
- S, Popov, The Tangle, https://iotatoken.com/IOTA_Whitepaper.pdf
- bitcoinj. Working with micropayment channels. https://bitcoinj.github.io/working-with-micropayments
- J. Chen and S. Micali. (2017). Algoland. Technical report, URL http://arxiv.org/abs/1607.01341
- S. H. Hong & S. H. Park (2017). The Research on Blockchain-based Secure IoT Authentication. The Korean Journal of The Korea Convergence Society, 8(11), 57-62.