Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations.
Timothy KowalskiMd Minhaz ChowdhuryShadman LatifKrishna KambhampatyPublished in: EIT (2022)
Keyphrases
- security vulnerabilities
- cryptographic algorithms
- security protocols
- security properties
- credit card
- security mechanisms
- intrusion detection
- elliptic curve cryptography
- dos attacks
- security requirements
- biometric data
- security services
- cryptographic protocols
- security systems
- information systems
- authentication protocol
- rfid tags
- unauthorized access
- smart card
- public key infrastructure