Login / Signup
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica.
Woo Yong Lee
Keunyoung Kim
Published in:
ICTC (2023)
Keyphrases
</>
security analysis
databases
database systems
data model
data integration
fine grained