DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy.
Martin PeresíniFederico Matteo BencicKamil MalinkaIvan HomoliakPublished in: CoRR (2021)
Keyphrases
- selection strategy
- selection strategies
- authentication protocol
- directed acyclic graph
- concurrency control protocols
- selection algorithm
- genetic algorithm
- database
- commit protocols
- timing constraints
- fitness function
- concurrency control
- transaction processing
- trusted third party
- mutation operation
- transaction management
- correctness criteria
- replica selection
- neural network
- cauchy mutation
- clonal selection algorithm
- real time database systems
- security protocols
- transaction model
- distributed databases
- knn