共 22 条
[11]
Coindesk, 2014, BITC PRIC IND
[12]
Edelman B., 2014, CONSUMERS PAY MORE T
[14]
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014,
2014, 8438
:72-86
[15]
Karame G. O., 2012, CRYPTOLOGY EPRINT AR
[16]
Kaskaloglu Kerem, 2014, International Conference on Digital Security and Forensics (DigitalSec2014), P91
[17]
Meiklejohn S., 2013, P C INT MEAS C, P127, DOI [10.1145/2504730.2504747.10.1145, DOI 10.1145/2504730.2504747.10.1145, 10.1145/2504730.2504747, DOI 10.1145/2504730.2504747]
[18]
Towards Risk Scoring of Bitcoin Transactions
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014,
2014, 8438
:16-32
[19]
MOORE T, 2013, LECT NOTES COMPUTER, V7859
[20]
Sherif M., 1936, The psychology of social norms