Aug 11, 2020 · In this paper, we construct three types of attacks with comprehensive evaluations, namely parasite attack (PS), double spending attack (DS), and hybrid attack ...
Tangle provides an enlightening paradigm for DAG-based structures. We build a simple but flexible simulation network for Tangle by identifying its features.
Nov 11, 2024 · In this paper, we construct three types of attacks with comprehensive evaluations, namely parasite attack (PS), double spending attack (DS), and hybrid attack ...
Tangle provides an enlightening paradigm for DAG-based structures. We build a simple but flexible simulation network for Tangle by identifying its features.
Aug 6, 2020 · In this paper, we aim to provide analyses on such risks by establishing three types of attacks through a simluation network.
This page is a summary of: Security Analysis on Tangle-Based Blockchain Through Simulation , January 2020, Springer Science + Business Media, DOI: 10.1007/978-3 ...
Aug 11, 2020 · This work builds a simple but flexible simulation network for Tangle by identifying its features and constructs three types of attack ...
Tangle provides an enlightening paradigm for DAG-based structures. We build a simple but flexible simulation network for Tangle by identifying its features.
Tangle provides an enlightening paradigm for DAG-based structures. We build a simple but flexible simulation network for Tangle by identifying its features.
Security Analysis on Tangle-Based Blockchain Through ... - dblp
dblp.dagstuhl.de › rec › conf › acisp
Bozhi Wang, Qin Wang , Shiping Chen , Yang Xiang: Security Analysis on Tangle-Based Blockchain Through Simulation. ACISP 2020: 653-663. manage site settings.