A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols.
Hafid AbdelatifSenhaji Hafid AbdelhakimSamih MustaphaPublished in: CoRR (2021)
Keyphrases
- security protocols
- malicious users
- bayesian networks
- probabilistic model
- generative model
- countermeasures
- security flaws
- cryptographic protocols
- computational complexity
- conditional probabilities
- digital libraries
- security mechanisms
- probabilistic logic
- np complete
- authentication protocol
- wireless sensor networks
- communication protocols