2021
DOI: 10.1002/int.22656
|View full text |Cite
|
Sign up to set email alerts
|

Is semi‐selfish mining available without being detected?

Abstract: Selfish mining attacks get a high prize due to the additional rewards unproportionate to their mining power (mining pools have particular advantages). Generally, this category of attacks stresses decreasing the threshold to maximize the rewards toward the view of attackers. Semi‐selfish mining falls into the family of selfish mining attacks, where the threshold value is approximately 15%. However, it gets little attention to implement these attacks in practical. In this paper, we focus on the validity of semi‐… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 79 publications
(47 citation statements)
references
References 24 publications
0
47
0
Order By: Relevance
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
See 3 more Smart Citations
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
“…To the best of our knowledge, dynamic application partitioning and task scheduling of biosensor healthcare workflow in secure mobile edge clouds has not been studied yet. Closely related studies [1,3,5,9,[21][22][23][24][25][26][27] have focused on dynamic application partitioning and minimizing the energy use of mobile devices. These studies only considered bandwidth and resource constraints.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2008, Bitcoin was proposed by Satoshi Nakamoto in "Bitcoin: A Peer-to-Peer Electronic Cash System" [14], marking the emergence of blockchain technology. As the *Correspondence: ylchen3@gzu.edu.cn 1 State Key Laboratory of Public Big Data,College of Computer Science and Technology, Guizhou University, Guiyang 550025, China 4 Blockchain Laboratory of Agricultural Vegetables, Weifang University of Science and Technology, Weifang 262700, China Full list of author information is available at the end of the article underlying technology of Bitcoin, blockchain has received extensive attention [15][16][17][18]. Blockchain is a distributed database technology that has the characteristics of decentralization [19][20][21], traceability, tamper-proof, collective maintenance, etc.…”
Section: Introductionmentioning
confidence: 99%