Login / Signup
Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols.
Chi-Ning Chou
Yu-Jing Lin
Ren Chen
Hsiu-Yao Chang
I-Ping Tu
Shih-wei Liao
Published in:
CoRR (2018)
Keyphrases
</>
authentication protocol
e learning
theorem prover
context aware
countermeasures
theorem proving
linear logic
adaptive learning
user oriented
directed networks
attack detection
detection mechanism
communication protocols
cryptographic protocols
personalized services
secret key
user modeling
database systems