Close latency-security trade-off for the Nakamoto consensus.
Jing LiDongning GuoLing RenPublished in: AFT (2021)
Keyphrases
- trade off
- security requirements
- information security
- security policies
- intrusion detection
- network security
- security issues
- access control
- information assurance
- data security
- computer security
- statistical databases
- response time
- security mechanisms
- cyber security
- data mining
- security systems
- security threats
- prefetching
- functional requirements
- clustering algorithm
- security analysis
- data integrity
- security protocols
- security level
- security problems
- real time