Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities.
Ertem Nusret TasDavid TseFisher YuSreeram KannanMohammad Ali Maddah-AliPublished in: CoRR (2022)
Keyphrases
- intrusion detection
- information security
- security issues
- security systems
- network security
- security level
- trusted third party
- security management
- security problems
- statistical databases
- security threats
- security requirements
- security policies
- data security
- functional requirements
- theorem prover
- neural network
- information assurance
- security measures
- computer security
- network management
- theorem proving
- access control
- cyber security
- security properties
- key management
- mobile devices
- security vulnerabilities
- data mining