emulsify 发表于 2025-3-30 12:01:29
A Security Detection Model for Selfish Mining Attacklity exceeds half of the total ability, the attack block is more than the honest block. However, for the number of system states, there is a big difference between 51% attack and selfish mining attack. Specifically, in selfish mining attack, when the attacker’s ability exceeds 25%, the number of sta摇曳 发表于 2025-3-30 13:46:16
1865-0929130 submissions. The papers are focus on Blockchain and trustworthy systems can be applied to many fields, such as financial services, social management and supply chain management..978-981-15-2776-0978-981-15-2777-7Series ISSN 1865-0929 Series E-ISSN 1865-0937Preamble 发表于 2025-3-30 17:24:05
Verb Alternations and Extensions,ure in a ring style to achieve untraceability. The group manager in a group signature can open a problematic transaction, restore the real identity of the sender, and revoke the private key of the sender if needed, which makes the digital currency regulatable.火车车轮 发表于 2025-3-30 22:04:41
Silvia Quazza,Henk van den Heuvelis affected by the past behavior, and a reliable master node is elected more probably. Experiments show that compared with the PBFT algorithm, the CPBFT algorithm reduces the amount of data transmission on the network and increases the throughput.