Login / Signup
Simulation of a Double Spending Attack on the Proof of Work Consensus Protocol.
Nikolay Poluyanenko
Nadia Pisarenko
Vladyslav Safonenko
Tymur Makushenko
Olha Pushko
Yevhena Zaburmekha
Kateryna Kuznetsova
Published in:
CybHyg (2019)
Keyphrases
</>
network simulator
lightweight
simulation model
authentication protocol
denial of service attacks
key exchange protocol
formal proof
neural network
mathematical model
theorem proving
simulation environment
aodv routing protocol