Login / Signup
Coin Hopping Attack in Blockchain-Based IoT.
Saide Zhu
Wei Li
Hong Li
Ling Tian
Guangchun Luo
Zhipeng Cai
Published in:
IEEE Internet Things J. (2019)
Keyphrases
</>
management system
countermeasures
location information
spread spectrum
social networks
cloud computing
big data
credit card
encryption algorithm
malicious users
mobile computing
ciphertext
detection mechanism
abstract argumentation
data corruption
key exchange protocol