Research Article
[Retracted] Prevention of Business Risks of Internet Information Security Platforms Based on Blockchain Technology
Table 3
10 seconds to confirm the security of the transaction after being confirmed in the double flower subchain.
| | 
 |  | The hash power of bad intruders is the mutual percentage in the network (%) | The estimated cost of a successful double-spending supply confirmed in 10 seconds (μB) |  | 2.5 MB block | 5.0 MB block | Probability of success (%) |  | 
 |  | 0.08 | 1500 | 3000 | 20 |  | 0.23 | 210 | 420 | 33.2 |  | 1.35 | 80 | 160 | 66.2 |  | 2.80 | 60 | 120 | 79.2 |  | 18.2 | 20 | 40 | 95.1 |  | 24.6 | 10 | 20 | 98.5 |  | 
 | 
 |