fromHackernoon
1 year agoThe Limits of Automated Selfish Mining Detection | HackerNoon
Our analysis is agnostic to the values of system model and attack parameters and it is flexible to their changes. Hence, it allows us to tweak the parameter values and study their impact on the optimal expected relative revenue, while preserving formal guarantees on the correctness.
Cryptocurrency