Login / Signup
Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin.
Shijie Zhang
Jong-Hyouk Lee
Published in:
IEEE Consumer Electron. Mag. (2021)
Keyphrases
</>
malicious users
countermeasures
malicious nodes
watermarking scheme
security threats
traffic analysis
malicious attacks
neural network
credit card
security protocols
security risks
terrorist attacks