Sign in

Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin.

Shijie ZhangJong-Hyouk Lee
Published in: IEEE Consumer Electron. Mag. (2021)
Keyphrases
  • malicious users
  • countermeasures
  • malicious nodes
  • watermarking scheme
  • security threats
  • traffic analysis
  • malicious attacks
  • neural network
  • credit card
  • security protocols
  • security risks
  • terrorist attacks