[1] |
NAKAMOTO S. Bitcoin: a Peer-to-peer Electronic Cash System[EB/OL]. [2020-04-16]. https://bitcoin.org/bitcoin.pdf.
|
[2] |
TRELEAVEN P, BROWN R G, YANG D. Blockchain Technology in Finance[J]. Computer, 2017,50(9):15-17.
|
[3] |
ZHANG Y, WEN J. The IoT Electric Business Model: Using Blockchain Technology for the Internet of Things[J]. Peer to Peer Networking and Applications, 2017,10(4):983-994.
|
[4] |
CHRISTIDIS K, DEVETSIKIOTIS M. Blockchains and Smart Contracts for the Internet of Things[J]. IEEE Access, 2016,4:2292-2303.
|
[5] |
BAHGA A, MADISETTI V K. Blockchain Platform for Industrial Internet of Things[J]. Journal of Software Engineering and Applications, 2016,9(10):533-546.
|
[6] |
KARAFILOSKI E, MISHEV A. BlockchainSolutions for Big Data Challenges: a Literature Review [C]// Proceedings of the 2017 17th IEEE International Conference on Smart Technologies. Piscataway: IEEE, 2017: 763-768.
|
[7] |
SMITH T D. The Blockchain Litmus Test [C]//Proceedings of the 2017 IEEE International Conference on Big Data. Piscataway: IEEE, 2017: 2299-2308.
|
[8] |
STANCIU A. Blockchain Based Distributed Control System for Edge Computing [C]//Proceedings of the 2017 21st International Conference on Control Systems and Computer. Piscataway: IEEE, 2017: 667-671.
|
[9] |
LIU H, ZHANG Y, YANG T. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing[J]. IEEE Network, 2018,32(3):78-83.
|
[10] |
YUE X, WANG H, JIN D, et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control[J]. Journal of Medical Systems, 2016,40(10):218.
doi: 10.1007/s10916-016-0574-6
pmid: 27565509
|
[11] |
KARAME G O, ANDROULAKI E, CAPKUN S. Double-spending Fast Payments in Bitcoin [C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York: ACM, 2012: 906-917.
|
[12] |
EYAL I, SIRER E G. Majority is Not Enough: Bitcoin Mining is Vulnerable [C]//Lecture Notes in Computer Science: 8437. Heidelberg: Springer Verlag, 2014: 436-454.
|
[13] |
TSCHORSCH F, SCHEUERMANN B. Bitcoin and Beyond: a Technical Survey on Decentralized Digital Currencies[J]. IEEE Communications Surveys and Tutorials, 2016,18(3):2084-2123.
|
[14] |
COURTOIS N T, BAHACK L. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency[J/OL]. [2019-09-23]. https://arxiv.org/pdf/1402.1718.pdf.
|
[15] |
EYAL I. The Miner's Dilemma [C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 89-103.
|
[16] |
唐长兵, 杨珍, 郑忠龙, 等. PoW共识算法中的博弈困境分析与优化[J]. 自动化学报, 2017,43(9):1520-1531.
|
|
TANG Changbing, YANG Zhen, ZHENG Zhonglong, et al. Game Dilemma Analysis and Optimization of PoW Consensus Algorithm[J]. Acta Automatica Sinica, 2017,43(9):1520-1531.
|
[17] |
LUU L, SAHA R, PARAMESHWARAN I, et al. On Power Splitting Games in Distributed Computation: the Case of Bitcoin Pooled Mining [C]//Proceedings of the 2015 Computer Security Foundations Workshop. Washington: IEEE Computer Society, 2015: 397-411.
|
[18] |
程恒喆, 冯秀涛. 关于比特币中BWH攻击的一个注记[J]. 信息安全学报, 2018,3(3):43-49.
|
|
CHENG Hengzhe, FENG Xiutao. A Note on Block Withholding Attack on Bitcoin[J]. Journal of Cyber Security, 2018,3(3):43-49.
|
[19] |
WU D, LIU X D, YAN X B, et al. Equilibrium Analysis of Bitcoin Block Withholding Attack: a Generalized Model[J]. Reliability Engineering and System Safety, 2019,185:318-328.
|
[20] |
韩健. 比特币挖矿攻击及防御方案研究[D]. 济南: 山东大学, 2019.
|
[21] |
ROSENFELD M. Analysis of Bitcoin Pooled Mining Reward Systems[J/OL]. [2019-09-23]. https://arxiv.org/pdf/1112.4980.pdfhttps://arxiv.org/pdf/1112.4980.pdf.
|
[22] |
BAG S, RUJ S, SAKURAI K. Bitcoin Block Withholding Attack: Analysis and Mitigation[J]. IEEE Transactions on Information Forensics and Security, 2017,12(8):1967-1978.
|
[23] |
BAG S, SAKURAI K. Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools [C]//Lecture Notes in Computer Science: 9866. Heidelberg: Springer Verlag, 2016: 167-180.
|
[24] |
SCHRIJVERS O, BONNEAU J, BONEH D, et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions [C]//Lecture Notes in Computer Science: 9603. Heidelberg: Springer Verlag, 2017: 477-498.
|
[25] |
LEE S, KIM S. Countering Block Withholding Attack Efficiently [C]//Proceedings of the 2019 IEEE Conference on Computer Communications Workshops. Piscataway: IEEE, 2019: 330-335.
|
[26] |
王先甲, 刘伟兵. 有限理性下的进化博弈与合作机制[J]. 上海理工大学学报, 2011,33(6):679-686.
|
|
WANG Xianjia, LIU Weibing. Evolutionary Game and Cooperation Mechanisms Based on Bounded Rationality[J]. Journal of University of Shanghai for Science and Technology, 2011,33(6):679-686.
|
[27] |
谢识予. 有限理性条件下的进化博弈理论[J]. 上海财经大学学报, 2001,3(5):3-9.
|
|
XIE Shiyu. Evolutionary Game Theory Under Bounded Rationality[J]. Journal of Shanghai University of Finance and Economics, 2001,3(5):3-9.
|
[28] |
SMITH J M, PRICE G R. The Logic of Animal Conflict[J]. Nature, 1973,246:15-18.
|
[29] |
TAYLOR P D, JONKER L B. Evolutionary Stable Strategies and Game Dynamics[J]. Mathematical Biosciences, 1978,40(1-2):145-156.
doi: 10.1016/0025-5564(78)90077-9
|
[30] |
WANG Y, TANG C, LIN F, et al. Pool Strategies Selection in Pow-based Blockchain Networks: Game-theoretic Analysis[J]. IEEE Access, 2019,7:8427-8436.
doi: 10.1109/ACCESS.2018.2890391
|
[31] |
KIM S, HAHN S G. Mining Pool Manipulation in Blockchain Network Over Evolutionary Block Withholding Attack[J]. IEEE Access, 2019,7:144230-144244.
doi: 10.1109/Access.6287639
|
[32] |
高文军, 郭根龙, 石晓帅. 基于演化博弈的流域生态补偿与监管决策研究[J]. 环境科学与技术, 2015,38(1):183-187.
|
|
GAO Wenjun, GUO Genlong, SHI Xiaoshuai. Decisions of Basin Ecological Compensation and Supervision Based on Evolutionary Game Analysis[J]. Environmental Science & Technology, 2015,38(1):183-187.
|