Towards the Identification of Security Tokens on Ethereum.
Monika Di AngeloGernot SalzerPublished in: NTMS (2021)
Keyphrases
- security policies
- access control
- intrusion detection
- network security
- automatic identification
- security threats
- line segments
- security issues
- cyber attacks
- functional requirements
- information assurance
- security problems
- security level
- security mechanisms
- data sets
- network management
- information security
- computer security
- authentication protocol
- security systems
- security requirements
- mobile devices
- security management
- security vulnerabilities
- databases