![]() Cao, Tong ![]() Doctoral thesis (2022) Detailed reference viewed: 80 (16 UL)![]() Cao, Tong ![]() ![]() Scientific Conference (2021, September) Detailed reference viewed: 153 (40 UL)![]() Cao, Tong ![]() ![]() in Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie (Eds.) et al Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020 (2020, February) Detailed reference viewed: 204 (31 UL)![]() Cao, Tong ![]() ![]() ![]() Scientific Conference (2018, June 25) Many attacks presented on Bitcoin are facilitated by its real world implementation, which is rather centralized. In addition, communications between Bitcoin nodes are not encrypted, which can be explored ... [more ▼] Many attacks presented on Bitcoin are facilitated by its real world implementation, which is rather centralized. In addition, communications between Bitcoin nodes are not encrypted, which can be explored by an attacker to launch attacks. In this paper, we give a brief overview of possible routing attacks on Bitcoin. As future work, we will identify possible central points in the Bitcoin network, evaluate potential attacks on it, and propose solutions to mitigate the identified issues. [less ▲] Detailed reference viewed: 249 (19 UL) |
||