Login / Signup

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection.

Martin PeresíniIvan HomoliakFederico Matteo BencicMartin HrubýKamil Malinka
Published in: CoRR (2023)
Keyphrases
  • chosen plaintext
  • directed acyclic graph
  • database
  • countermeasures
  • security threats
  • data sets
  • cooperative
  • evolutionary algorithm
  • selection strategy
  • security mechanisms
  • security protocols