SoK: On the Security of Non-Fungible Tokens.
Kai MaJintao HuangNingyu HeZhuo WangHaoyu WangPublished in: CoRR (2023)
Keyphrases
- information security
- security requirements
- security policies
- security level
- network security
- security issues
- information assurance
- security vulnerabilities
- security systems
- security protocols
- computer security
- intrusion detection
- access control
- statistical databases
- database
- functional requirements
- information systems
- data mining
- security management
- data encryption
- countermeasures
- risk assessment
- sensitive data
- encryption scheme
- security properties
- neural network
- real time