Blockchain for Distributed Systems Security 2019
DOI: 10.1002/9781119519621.ch10
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…In a while, user A can send the same transaction to user C. In this case, only those transaction is valid which gets into the blockchain first, but the asset might have been released twice. Double spending is one of the most widespread attacks on the blockchain platforms [20]. We performed a model checking for different types of double-spending attacks.…”
Section: Double Spending and Mempool Floodingmentioning
confidence: 99%
See 1 more Smart Citation
“…In a while, user A can send the same transaction to user C. In this case, only those transaction is valid which gets into the blockchain first, but the asset might have been released twice. Double spending is one of the most widespread attacks on the blockchain platforms [20]. We performed a model checking for different types of double-spending attacks.…”
Section: Double Spending and Mempool Floodingmentioning
confidence: 99%
“…An adversary can cause a delay for successful double-spending with a mempool flooding attack. Mempool flooding is a kind of DDoS attack carried out at the memory pools of the cryptocurrencies [20]. Mempool has substantial properties such as timeout for transactions and default size limit.…”
Section: Double Spending and Mempool Floodingmentioning
confidence: 99%