Analyzing the Real-World Security of the Algorand Blockchain.
Erica BlumDerek LeungJulian LossJonathan KatzTal RabinPublished in: CCS (2023)
Keyphrases
- real world
- synthetic data
- wide range
- case study
- security systems
- real life
- access control
- security policies
- security issues
- data mining
- security requirements
- functional requirements
- neural network
- data sets
- security threats
- security problems
- cyber attacks
- data encryption
- cyber security
- encryption scheme
- network security
- information security
- database systems