From slow propagation to partition: Analyzing bitcoin over anonymous routing

N Sakib, S Wuthier, K Zhang, X Zhou… - … on Blockchain and …, 2024 - ieeexplore.ieee.org
Cryptocurrency is designed for anonymous financial transactions to avoid centralized
control, censorship, and regulations. To protect anonymity in the underlying P2P networking …

Routing Attacks on Cryptocurrency Mining Pools

M Tran, T von Arx, L Vanbever - 2024 IEEE Symposium on Security …, 2024 - computer.org
Mining pools have been the driving force for ensuring the security of multiple proof-of-work
(PoW) cryptocurrencies. Under the de facto protocol Stratum, pools allow miners to …

Blockchain Double Spending With Low Mining Power and Network Delays

C Natoli, P Ekparinya, G Jourjon… - … : Research and Practice, 2024 - dl.acm.org
Traditional blockchain systems offer a secure way of tracking the ownership of digital assets
as long as the attacker does not control a large portion of the overall computational or …

Unveiling Threats to Bitcoin: Exploring Attacks, Vulnerabilities, and Network Integrity

AA Sofi, AH Mir, Z Jabeen - Vulnerabilities, and Network Integrity - papers.ssrn.com
Bitcoin, a widely recognized cryptocurrency, embodies features such as anonymity and
decentralization. In bitcoin network transactions are propagated between peers using a …

[PDF][PDF] Blockchain Double Spending With Low Mining Power and Network Delays

G JOURJON - gramoli.github.io
Traditional blockchain systems offer a secure way of tracking the ownership of digital assets
as long as the attacker does not control a large portion of the overall computational or …

[PDF][PDF] Blockchain Security and Privacy Examined: Threats, Challenges, Applications, and Tools

A Alghuried, M Alkinoon, M Mohaisen, A Wang… - davidmohaisen.github.io
Blockchain technology has heralded a new era in digital innovation, revolutionizing our
approach to designing and building distributed applications in the digital sphere. Essentially …