Research Article
[Retracted] Prevention of Business Risks of Internet Information Security Platforms Based on Blockchain Technology
Table 2
5 seconds to confirm the security of the transaction after being confirmed in the double flower subchain.
| | The hash power of bad intruders is the mutual percentage in the network (%) | The estimated cost of a successful double-spending supply confirmed in 5 seconds (μB) | | 1.0 MB block | 2.0 MB block | Probability of success (%) |
| | 0.05 | 600 | 1200 | 10 | | 0.15 | 210 | 420 | 23.2 | | 1.32 | 40 | 80 | 52.6 | | 2.52 | 30 | 60 | 76.2 | | 15 | 15 | 30 | 92.3 | | 20 | 5 | 10 | 95.6 |
|
|