Login / Signup
Practical Range Proof for Cryptocurrency Monero with Provable Security.
Kang Li
Rupeng Yang
Man Ho Au
Qiuliang Xu
Published in:
ICICS (2017)
Keyphrases
</>
security issues
real world
wide range
intrusion detection
security policies
practical application
database
security threats
security level
network security
theorem proving
statistical databases
security protocols
information assurance
security requirements
information security
database systems
databases