Bitcoin Security Under Temporary Dishonest Majority.
Georgia AvarikiotiLukas KäppeliYuyi WangRoger WattenhoferPublished in: Financial Cryptography (2019)
Keyphrases
- information security
- intrusion detection
- security issues
- security requirements
- access control
- security policies
- security systems
- computer security
- key management
- statistical databases
- network security
- security level
- security properties
- security mechanisms
- security management
- data sets
- information assurance
- security problems
- data security
- biometric systems
- original data
- operating system
- database systems
- information systems