Login / Signup
On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains.
Tayebeh Rajab
Mohammad Hossein Manshaei
Mohammad Dakhilalian
Murtuza Jadliwala
Mohammad Ashiqur Rahman
Published in:
CoRR (2020)
Keyphrases
</>
malicious users
countermeasures
watermarking scheme
watermarking algorithm
attack detection
computer security
malicious nodes
case study
digital libraries
email
watermarking technique
security protocols
security risks