Login / Signup
Cryptocurrencies with Security Policies and Two-Factor Authentication.
Florian Breuer
Vipul Goyal
Giulio Malavolta
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
security policies
factor authentication
access control
network security
security requirements
distributed systems
smart card
access control systems
mobile terminals
authentication systems
intrusion detection
access control policies
user authentication