Security of the Blockchain Against Long Delay Attack.
Puwen WeiQuan YuanYuliang ZhengPublished in: ASIACRYPT (3) (2018)
Keyphrases
- security measures
- cyber attacks
- security vulnerabilities
- key exchange protocol
- fault injection
- countermeasures
- information security
- authentication mechanism
- authentication protocol
- malicious users
- denial of service attacks
- intrusion detection
- key agreement
- secret key
- key management
- intrusion detection system
- smart card
- information leakage
- malicious attacks
- encryption algorithm
- security policies
- security risks
- security threats
- security issues
- network security
- security requirements
- dos attacks
- cyber security
- security problems
- authentication scheme
- security mechanisms
- forensic analysis
- java card
- denial of service
- malicious nodes
- attack scenarios
- access control
- buffer overflow
- wireless networks
- power consumption
- computer security
- security protocols
- attack detection
- security management