Research Article

[Retracted] Prevention of Business Risks of Internet Information Security Platforms Based on Blockchain Technology

Table 3

10 seconds to confirm the security of the transaction after being confirmed in the double flower subchain.

The hash power of bad intruders is the mutual percentage in the network (%)The estimated cost of a successful double-spending supply confirmed in 10 seconds (μB)
2.5 MB block5.0 MB blockProbability of success (%)

0.081500300020
0.2321042033.2
1.358016066.2
2.806012079.2
18.2204095.1
24.6102098.5