Login / Signup
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
Maria Apostolaki
Aviv Zohar
Laurent Vanbever
Published in:
IEEE Symposium on Security and Privacy (2017)
Keyphrases
</>
secure routing
countermeasures
routing protocol
routing algorithm
routing problem
network topology
shortest path
ad hoc networks
credit card
watermarking scheme
traffic analysis
malicious nodes
biological inspired
mobile ad hoc networks
security threats
security risks
malicious users
inter domain
routing scheme