Login / Signup
Sybil attacks on identity-augmented Proof-of-Stake.
Moritz Platt
Peter McBurney
Published in:
Comput. Networks (2021)
Keyphrases
</>
malicious users
countermeasures
identity management
malicious attacks
neural network
security protocols
theorem proving
watermarking algorithm
social context
cooperative
lightweight
security mechanisms
file sharing
traffic analysis