Security Attacks on Multi-Stage Proof-of-Work.
Paolo D'ArcoZahra Ebadi AnsaroudiPublished in: PerCom Workshops (2021)
Keyphrases
- multistage
- attack detection
- security threats
- security mechanisms
- attack scenarios
- security problems
- java card
- cyber attacks
- security protocols
- computer security
- security vulnerabilities
- denial of service attacks
- stochastic programming
- production system
- security measures
- countermeasures
- single stage
- security breaches
- stream cipher
- security risks
- cryptographic protocols
- chosen plaintext
- dynamic programming
- stochastic optimization
- security flaws
- lot sizing
- network security
- information security
- intrusion detection
- malicious users
- secure routing
- security requirements
- security issues
- dos attacks
- buffer overflow
- access control
- security policies
- information leakage
- biometric template
- resource constrained
- smart card
- anomaly detection
- malware detection
- assembly systems
- supply chain
- key management
- cyber security
- machine learning