Research Article

[Retracted] Prevention of Business Risks of Internet Information Security Platforms Based on Blockchain Technology

Table 2

5 seconds to confirm the security of the transaction after being confirmed in the double flower subchain.

The hash power of bad intruders is the mutual percentage in the network (%)The estimated cost of a successful double-spending supply confirmed in 5 seconds (μB)
1.0 MB block2.0 MB blockProbability of success (%)

0.05600120010
0.1521042023.2
1.32408052.6
2.52306076.2
15153092.3
2051095.6