Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders.
Michael NeuderDaniel J. MorozRithvik RaoDavid C. ParkesPublished in: CoRR (2021)
Keyphrases
- low cost
- low power
- countermeasures
- real time
- information systems
- digital camera
- terrorist attacks
- watermarking scheme
- traffic analysis
- single chip
- chosen plaintext
- malicious users
- attack detection
- security protocols
- highly efficient
- data acquisition
- cooperative
- security mechanisms
- java card
- rfid tags
- security risks
- denial of service attacks
- malicious attacks
- software development