Topics
Bitcoin P2P Network (opens in a new tab)Transaction Propagation (opens in a new tab)Peer-to-peer (opens in a new tab)Bitcoin (opens in a new tab)Transactions (opens in a new tab)Bitcoin Node (opens in a new tab)
147 Citations
- Befekadu G. GebraselaseB. HelvikYuming Jiang
- 2022
Computer Science
IEEE Transactions on Network and Service…
The analysis shows that peer selection strategies affect the transaction propagation and confirmation times of Bitcoin, and better performance may be achieved by adjusting the default nearby-based peer selection strategy.
- D. MaesaMatteo FranceschiBarbara GuidiL. Ricci
- 2018
Computer Science
2018 International Conference on High Performance…
Results show that BitKer is effective in retrieving useful information and can be easily used as a basis for more complex analysis tools.
- 2
- Sehyun ParkSeongwon ImYouhwan SeolJeongyeup Paek
- 2019
Computer Science, Economics
IEEE Access
This paper measures and analyzes how many the so-called “volunteers” are in the Bitcoin P2P network by scanning the live Bitcoin network for 37 days in 2018 and proposes a simple distance-based peer selection rule for improved connectivity and faster data propagation.
- 57
- Highly Influenced
- PDF
- James TapsellRaja Naeem AkramK. Markantonakis
- 2018
Computer Science
2018 IEEE International Conference on Internet of…
The network protocol and bitcoin core software are analysed, with three bitcoin message exchanges found to be potentially vulnerable to spoofing and use in distributed denial of service (DDoS) attacks.
- 15 [PDF]
- Federico FranzoniVanesa Daza
- 2020
Computer Science
2020 IEEE International Conference on Blockchain…
It is shown that increasing the participation of unreachable nodes can potentially improve the robustness and efficiency of the network and proposed changes to the network protocol are simple to implement and can effectively bring immediate benefits to the Bitcoin network.
- Péter JuhászJ. StégerDániel KondorG. Vattay
- 2018
Computer Science, Mathematics
PloS one
A mathematical model using a probabilistic approach to link Bitcoin addresses and transactions to the originator IP address is developed and carried out experiments by installing more than a hundred modified Bitcoin clients distributed in the network to observe as many messages as possible.
- 37 [PDF]
- Tong JinXiang ZhangYirui LiuKai Lei
- 2017
Computer Science, Engineering
2017 Ninth International Conference on Ubiquitous…
A bitcoin-like blockchain system named BlockNDN over Named Data Networking is designed and implemented and deployed on the authors' cluster as well and it provides completely decentralized systems and simplifies system architecture.
- 53
- Adem Efe GencerS. BasuIttay EyalR. V. RenesseE. G. Sirer
- 2018
Computer Science, Business
Financial Cryptography
The extent of decentralization is investigated by measuring the network resources of nodes and the interconnection among them, the protocol requirements affecting the operation of nodes, and the robustness of the two systems against attacks.
- 343 [PDF]
- Ruiguang LiJiawei ZhuDawei XuFudong WuJiaqi GaoLiehuang Zhu
- 2022
Computer Science
China Communications
BNS (Bitcoin Network Sniffer), which could find and connect nodes in the Bitcoin network, and made a measurement in detail, proposed a new approach to infer theBitcoin network topology by analyzing the Neighbor Addresses of Adjacent Nodes and their timestamps, which had an accuracy over 80%.
- 2
- Matthias GrundmannMax BaumstarkH. Hartenstein
- 2022
Computer Science
2022 IEEE International Conference on Blockchain…
A recent spam wave of IP addresses in the Bitcoin P2P network allowed us to estimate the degree distribution of reachable peers and it is shown that simply counting IP addresses overestimates the number of Reachable peers by 15 %.
- 6
- PDF
...
...
19 References
Computer Science, Engineering
- 1,097
- Micha OberS. KatzenbeisserK. Hamacher
- 2013
Computer Science, Economics
Future Internet
Dynamical effects of which some increase anonymity while others decrease it are found, and several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months.
- 276
- Highly Influential[PDF]
- Moshe BabaioffShahar DobzinskiSigal OrenAviv Zohar
- 2012
Computer Science, Economics
EC '12
This work examines a common scenario in which only participants that are aware of the information can compete for some reward, and thus informed participants have an incentive not to propagate information to others, and proposes a modification to the protocol that can eliminate this problem.
- 263 [PDF]
- Fergal ReidMartin Harrigan
- 2011
Computer Science
2011 IEEE Third Int'l Conference on Privacy…
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.
- 1,076
- Highly Influential[PDF]
- D. RonA. Shamir
- 2013
Computer Science, Economics
Financial Cryptography
This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.
- 949
- Highly Influential
- PDF
Computer Science
- 163
- Simon BarberXavier BoyenE. ShiE. Uzun
- 2012
Computer Science, Economics
Financial Cryptography
An in-depth investigation is performed to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment.
- 616
- PDF
- Ghassan O. KarameElli AndroulakiSrdjan Capkun
- 2012
Computer Science
CCS
It is shown that, unless appropriate detection techniques are integrated in the current Bitcoin implementation, double-spending attacks on fast payments succeed with overwhelming probability and can be mounted at low cost.
- 509
- PDF
- S. A. R. A H M E I K L E J O H NM. A. R. J. O R I P O M A R O L EG. R. A. N. T. J. O R D A N, K I R I L L L E V C H E N K O, D A M OG. E. O F F R EY. M. V. O E L K E R A N D S T E F A N S A V A
- 2013
Computer Science
This research includes work on anonymous communication systems, cyber-physical security, e-crime, and wireless privacy, as well as computer systems, networking, and security.
- 978
- Highly Influential
- PDF
- Elli AndroulakiGhassan O. KarameMarc RoeschlinT. SchererSrdjan Capkun
- 2013
Computer Science, Business
Financial Cryptography
This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
- 651
- Highly Influential
- PDF
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers