How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Chao LiBalaji PalanisamyRunhua XuLi DuanJiqiang LiuWei WangPublished in: CCS (2023)
Keyphrases
- electronic voting
- information security
- access control
- security issues
- information technology
- network security
- security policies
- statistical databases
- security level
- neural network
- information systems
- intrusion detection
- risk analysis
- voting protocols
- information assurance
- security vulnerabilities
- security problems
- computer security
- functional requirements
- data mining