Login / Signup
The Attack of the Clones Against Proof-of-Authority.
Parinya Ekparinya
Vincent Gramoli
Guillaume Jourjon
Published in:
NDSS (2020)
Keyphrases
</>
software systems
countermeasures
data sets
theorem prover
power analysis
natural deduction
theorem proving
malicious attacks
detection mechanism
mathematical proofs
attack detection
automated theorem proving
linear logic
link analysis
software engineering
artificial intelligence
data mining