Login / Signup
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Yuzhou Fang
Daoyuan Wu
Xiao Yi
Shuai Wang
Yufan Chen
Mengjie Chen
Yang Liu
Lingxiao Jiang
Published in:
ISSTA (2023)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
security model
image encryption
encryption scheme
security properties
authentication protocol
mutual authentication
data mining
information systems
supply chain
image quality
encryption algorithm