On the Use of Proof-of-Work in Permissioned Blockchains: Security and Fairness.
Ivan MalakhovAndrea MarinSabina RossiDaria SmusevaPublished in: IEEE Access (2022)
Keyphrases
- access control
- information security
- computer security
- security requirements
- security measures
- information assurance
- security systems
- security issues
- neural network
- linear logic
- security analysis
- network security
- game theory
- intrusion detection
- data sets
- security mechanisms
- theorem proving
- data security
- security level
- security properties
- security threats
- resource allocation
- high security