Login / Signup

Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks.

Utz NisslmuellerKlaus-Tycho FoersterStefan SchmidChristian Decker
Published in: ICISSP (2020)
Keyphrases
  • information leakage
  • social networks
  • network structure
  • neural network
  • web services
  • information security
  • network analysis
  • computer networks
  • watermarking algorithm
  • network design
  • cryptographic protocols