-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcognome_nome_laurea_aa.out
26 lines (26 loc) · 1.72 KB
/
cognome_nome_laurea_aa.out
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
\BOOKMARK [0][-]{chapter*.3}{Sommario}{}% 1
\BOOKMARK [0][-]{chapter.1}{Addressing the problems with distributed ledger technologies}{}% 2
\BOOKMARK [1][-]{section.1.1}{Addressing the issues of distributed ledgers}{chapter.1}% 3
\BOOKMARK [0][-]{chapter.2}{Introduction to Bitcoin}{}% 4
\BOOKMARK [1][-]{section.2.1}{An introductory example to Bitcoin usage}{chapter.2}% 5
\BOOKMARK [1][-]{section.2.2}{Transaction structure}{chapter.2}% 6
\BOOKMARK [1][-]{section.2.3}{Block structure and blockchain}{chapter.2}% 7
\BOOKMARK [1][-]{section.2.4}{Miners behaviour}{chapter.2}% 8
\BOOKMARK [1][-]{section.2.5}{Proof-of-Work and Consensus protocol}{chapter.2}% 9
\BOOKMARK [0][-]{chapter.3}{Bitcoin peer-to-peer network}{}% 10
\BOOKMARK [1][-]{section.3.1}{Connection and peer discovery}{chapter.3}% 11
\BOOKMARK [1][-]{section.3.2}{Peer database structure}{chapter.3}% 12
\BOOKMARK [1][-]{section.3.3}{Data dissemination}{chapter.3}% 13
\BOOKMARK [0][-]{chapter.4}{Bitcoin security concerns}{}% 14
\BOOKMARK [1][-]{section.4.1}{Network security}{chapter.4}% 15
\BOOKMARK [1][-]{section.4.2}{Sybil attack}{chapter.4}% 16
\BOOKMARK [1][-]{section.4.3}{Eclipse attack}{chapter.4}% 17
\BOOKMARK [1][-]{section.4.4}{Fake bootstrapping attack}{chapter.4}% 18
\BOOKMARK [0][-]{chapter.5}{Enhance the efficacy of Sybil attacks}{}% 19
\BOOKMARK [1][-]{section.5.1}{Attack details}{chapter.5}% 20
\BOOKMARK [1][-]{section.5.2}{Metrics and performance evaluation}{chapter.5}% 21
\BOOKMARK [1][-]{section.5.3}{Software and implementation}{chapter.5}% 22
\BOOKMARK [0][-]{chapter.6}{Results}{}% 23
\BOOKMARK [1][-]{section.6.1}{Alternative attack scenario}{chapter.6}% 24
\BOOKMARK [0][-]{chapter.7}{Conclusions}{}% 25
\BOOKMARK [0][-]{figure.caption.31}{Bibliography}{}% 26