Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Yoko ShibuyaGo YamamotoFuhito KojimaElaine ShiShin'ichiro MatsuoAron LaszkaPublished in: Financial Cryptography (2) (2021)
Keyphrases
- text mining
- data mining
- knowledge discovery
- web mining
- data mining algorithms
- countermeasures
- data mining techniques
- itemsets
- incentive mechanism
- data sets
- malicious attacks
- security threats
- security mechanisms
- hash functions
- nash equilibrium
- mining algorithm
- b tree
- pattern mining
- sequential patterns
- frequent patterns
- digital images
- wireless sensor networks