How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Chao LiBalaji PalanisamyRunhua XuLi DuanJiqiang LiuWei WangPublished in: CoRR (2023)
Keyphrases
- electronic voting
- information systems
- voting protocols
- e government
- information security
- security issues
- information technology
- security management
- security policies
- access control
- security requirements
- risk analysis
- network security
- human operators
- inter organizational
- key management
- computer security
- electronic government
- private sector
- voting schemes
- information assurance
- sensor networks