Login / Signup

Defending Against Malicious Reorgs in Tezos Proof-of-Stake.

Michael NeuderDaniel J. MorozRithvik RaoDavid C. Parkes
Published in: AFT (2020)
Keyphrases
  • linear logic
  • malicious attacks
  • data sets
  • mobile robot
  • proof theory
  • databases
  • neural network
  • decision making
  • case study
  • malicious users
  • malicious behavior
  • proof planning
  • detect malicious