Login / Signup
Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection.
Martin Peresíni
Ivan Homoliak
Federico Matteo Bencic
Martin Hrubý
Kamil Malinka
Published in:
CoRR (2023)
Keyphrases
</>
chosen plaintext
directed acyclic graph
database
countermeasures
security threats
data sets
cooperative
evolutionary algorithm
selection strategy
security mechanisms
security protocols