Login / Signup
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
Tuyet Duong
Lei Fan
Thomas Veale
Hong-Sheng Zhou
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
computing power
trusted third party
processing power
storage capacity
computational power
embedded systems
credit card
malicious behavior
real time
general purpose
access control
memory hierarchy
multicore processors