Login / Signup
Scaling proof-of-authority protocol to improve performance and security.
Xiaohua Wu
Jinpeng Chang
Hongji Ling
Xueqi Feng
Published in:
Peer-to-Peer Netw. Appl. (2022)
Keyphrases
</>
cryptographic protocols
lightweight
intrusion detection
security protocols
authentication protocol
application layer
communication protocols
network management
security properties
mobile agent system
key agreement protocol
protocol specification