Sign in

On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications.

Dimitri Van LanduytLaurens SionEmiel VandelooWouter Joosen
Published in: CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS (2019)
Keyphrases
  • confidential information
  • statistical databases
  • sensitive information
  • private information
  • real world
  • privacy issues
  • data mining
  • information systems
  • access control
  • privacy preserving
  • sensitive data
  • data protection