Decreasing security threshold against double spend attack in networks with slow synchronization.
Lyudmila KovalchukDmytro KaidalovAndrii NastenkoMariia RodinkoOleksiy ShevtsovRoman OliynykovPublished in: Comput. Commun. (2020)
Keyphrases
- cyber attacks
- security measures
- key exchange protocol
- information security
- countermeasures
- security vulnerabilities
- network security
- dos attacks
- fault injection
- enterprise network
- authentication protocol
- security issues
- security management
- denial of service attacks
- malicious attacks
- cyber security
- authentication mechanism
- computer networks
- malicious activities
- defense mechanisms
- secure communication
- access control
- ddos attacks
- computer security
- complex networks
- security threats
- encryption algorithm
- malicious users
- security policies
- social networks
- block cipher
- java card
- security properties
- trust relationships
- key management
- security mechanisms
- security requirements
- attack scenarios