Chapter
Licensed
Unlicensed
Requires Authentication
14 Direct frontal takeovers
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter I
- Preface V
- Acknowledgments VII
- Contents IX
- 1 Basic of cryptographic payments 1
- 2 Probability spaces 25
- 3 Game theory basics 46
- 4 Monopolizing pool 62
- 5 Basic double-spend game 69
- 6 Censorship attacks 90
- 7 Economics of mining 112
- 8 Selfish mining 123
- 9 Strategic mining 138
- 10 What discourages strategic mining? 169
- 11 Declining block subsidy 174
- 12 The Flattening ASIC cost curve 184
- 13 Attacks 198
- 14 Direct frontal takeovers 225
- 15 Nash bargaining 234
- 16 Coalitional game theory 251
- 17 Stock, flow, and economic considerations 273
- 18 Bitcoin as it matures 291
- Bibliography 321
- Index 325
Chapters in this book
- Frontmatter I
- Preface V
- Acknowledgments VII
- Contents IX
- 1 Basic of cryptographic payments 1
- 2 Probability spaces 25
- 3 Game theory basics 46
- 4 Monopolizing pool 62
- 5 Basic double-spend game 69
- 6 Censorship attacks 90
- 7 Economics of mining 112
- 8 Selfish mining 123
- 9 Strategic mining 138
- 10 What discourages strategic mining? 169
- 11 Declining block subsidy 174
- 12 The Flattening ASIC cost curve 184
- 13 Attacks 198
- 14 Direct frontal takeovers 225
- 15 Nash bargaining 234
- 16 Coalitional game theory 251
- 17 Stock, flow, and economic considerations 273
- 18 Bitcoin as it matures 291
- Bibliography 321
- Index 325