Login / Signup

On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm.

Shan WangMing YangBryan PearsonTingjian GeXinwen FuWei Zhao
Published in: CNS (2022)
Keyphrases
  • data sets
  • databases
  • genetic algorithm
  • data mining
  • multi agent
  • optimal policy
  • network security
  • security problems
  • information assurance