Figure5

EFAW: a new mining attack model combining FAW attacks with the Eclipse attack

Figure 5. EFAW attacks against two victim mining pools. The one in the middle is EFAW attack pool A, the left is victim mining pool B, and the right is victim mining pool C. EFAW: Eclipse Fork After Withholding; FPoW: Full Proof-of-Work; PPoW: Partial Proof-of-Work.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/