雀斑 发表于 2025-3-26 22:14:34
http://reply.papertrans.cn/55/5403/540260/540260_31.pngCAPE 发表于 2025-3-27 01:43:27
s. Nevertheless, aside from Bitcoin and Ethereum, little efforts have been made to investigate other cryptocurrencies, even though the market now comprises thousands, with more than 50 exceeding one billion dollars of capitalization, and some of them sporting innovative technical solutions and goverSLING 发表于 2025-3-27 07:30:52
http://reply.papertrans.cn/55/5403/540260/540260_33.pngBarter 发表于 2025-3-27 10:47:29
eceiver via intermediaries. Yet, Lightning, the only prominent payment channel network, has two major issues when it comes to multi-hop payments. First, the sender decides on the path without being able to take local capacity restrictions into account. Second, due to the atomicity of payments, any f共同生活 发表于 2025-3-27 15:56:11
ots are needed), stealthily (e.g., no control plane detection is available), or at scale (e.g., the entire bitcoin network can be divided into two). In this paper, we focus on the . of partitioning attacks in Bitcoin, which is barely discussed in the literature. Existing studies investigate new partPastry 发表于 2025-3-27 20:26:51
newer participants. They have existed for over a century, but their historical opacity has prevented in-depth studies..This paper presents an empirical study of Forsage, a smart-contract-based pyramid scheme with unprecedented transparency. Our study focuses on the period around 2020, when Forsage wTRACE 发表于 2025-3-27 23:22:53
http://reply.papertrans.cn/55/5403/540260/540260_37.pngCoordinate 发表于 2025-3-28 04:28:08
January 2020. Similarly, smart contracts began to carry more value, making them appealing targets for attackers. As a result, they started to become victims of attacks, costing millions of dollars. In response to these attacks, both academia and industry proposed a plethora of tools to scan smart coPRE 发表于 2025-3-28 08:39:13
general framework for multiparty protocols generating shares of noise drawn from distributions capable of achieving differential privacy. Then, using this framework, we propose two kinds of protocols based on secret sharing. The first one is a constant-round protocol which enables parties to jointly有花 发表于 2025-3-28 11:08:05
ts debt, the lender hence requires upfront collateral from the borrower, plus interest fee payments. Due to the atomicity of blockchain transactions, lenders can offer ., i.e., loans that are only valid within one transaction and must be repaid by the end of that transaction. This concept has lead t