Login / Signup
Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph.
Kaihua Qin
Zhe Ye
Zhun Wang
Weilin Li
Liyi Zhou
Chao Zhang
Dawn Song
Arthur Gervais
Published in:
CoRR (2023)
Keyphrases
</>
security analysis
smart card
public key
high security
mutual authentication
security requirements
image encryption
security properties
security model
authentication protocol
supply chain
user authentication
encryption scheme
authentication scheme
proxy signature scheme
fine grained
blind signature scheme
databases