Fabien gaglio

Comment

Author: Admin | 2025-04-28

Reiter, Michael (May 2003). "Defending against denial-of-service attacks with puzzle auctions" (PDF). IEEE Symposium on Security and Privacy '03. Archived from the original (PDF) on 2016-03-03. Retrieved 2013-04-15.^ Franklin, Matthew K.; Malkhi, Dahlia (1997). "Auditable metering with lightweight security". Financial Cryptography. Lecture Notes in Computer Science. Vol. 1318. pp. 151–160. doi:10.1007/3-540-63594-7_75. ISBN 978-3-540-63594-9. Updated version May 4, 1998.^ Juels, Ari; Brainard, John (1999). "Client puzzles: A cryptographic defense against connection depletion attacks". NDSS 99.^ Waters, Brent; Juels, Ari; Halderman, John A.; Felten, Edward W. (2004). "New client puzzle outsourcing techniques for DoS resistance" (PDF). 11th ACM Conference on Computer and Communications Security. Archived (PDF) from the original on 2021-04-21. Retrieved 2019-08-06.^ Coelho, Fabien (2007). "An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees". Cryptology ePrint Archive, Report. Archived from the original on 2016-08-26. Retrieved 2007-11-25.^ Fitzi, Matthias. "Combinatorial Optimization via Proof-of-Useful-Work" (PDF). IACR conference Crypto 2022. Archived (PDF) from the original on 9 September 2022. Retrieved 9 September 2022.^ "Cambridge Bitcoin Electricity Consumption Index (CBECI)". www.cbeci.org. Archived from the original on 2020-03-02. Retrieved 2020-02-20.^ "Cambridge Bitcoin Electricity Consumption Index". Cambridge Center For Alternative Finance. Archived from the original on 29 September 2020. Retrieved 30 September 2020.^ Michael J. Casey; Paul Vigna (16 June 2014). "Short-Term Fixes To Avert "51% Attack"". Money Beat. Wall Street Journal. Archived from the original on 15 August 2020. Retrieved 30 June 2014.^ Overview of the Bitcoin mining pools Archived 2020-04-21 at the Wayback Machine on blockchain.info^ What is an ASIC miner Archived 2018-05-22 at

Add Comment