Login / Signup
Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks.
Utz Nisslmueller
Klaus-Tycho Foerster
Stefan Schmid
Christian Decker
Published in:
ICISSP (2020)
Keyphrases
</>
information leakage
social networks
network structure
neural network
web services
information security
network analysis
computer networks
watermarking algorithm
network design
cryptographic protocols