Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire network, they gain the ability to engage in double-spending activities, posing a signific...
Saved in:
Main Authors: | Babur, Sohail Mahmood, Khan, Shafiq Ur Rehman, Yang, Jing, Chen, Yen-Lin, Ku, Chin Soon, Por, Lip Yee |
---|---|
Format: | Article |
Published: |
Institute of Electrical and Electronics Engineers
2024
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/45839/ https://doi.org/10.1109/ACCESS.2024.3407521 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Preventing Shoulder-Surfing Attacks using Digraph Substitution Rules and Pass-Image Output Feedback
by: Por, Lip Yee, et al.
Published: (2019) -
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
by: Por, Lip Yee, et al.
Published: (2024) -
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Online consecutive secure multi-party computation algorithm for preserving privacy
by: Kenari, Abdolreza Rasouli
Published: (2011)