A Holistic Security Analysis of Monero Transactions.
Cas CremersJulian LossBenedikt WagnerPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security analysis
- security requirements
- smart card
- public key
- high security
- security model
- database
- image encryption
- user authentication
- authentication protocol
- mutual authentication
- security properties
- encryption scheme
- proxy signature scheme
- authentication scheme
- databases
- resource constrained
- information sharing
- distributed systems
- data mining