New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks.
Ittai AbrahamGilad SternPublished in: OPODIS (2022)
Keyphrases
- lower bound
- upper bound
- open source
- branch and bound algorithm
- objective function
- countermeasures
- lower and upper bounds
- source code
- worst case
- branch and bound
- np hard
- security mechanisms
- development environments
- lower bounding
- optimal solution
- denial of service attacks
- terrorist attacks
- upper and lower bounds
- watermarking scheme
- quadratic assignment problem
- software projects
- vc dimension
- traffic analysis
- digital images
- malicious attacks
- data structure