Just Enough Security: Reducing Proof-of-Work Ecological Footprint.
Itay TsabaryAlexander SpiegelmanIttay EyalPublished in: CoRR (2019)
Keyphrases
- information security
- theorem prover
- security requirements
- intrusion detection
- theorem proving
- security policies
- statistical databases
- access control
- high security
- security issues
- security analysis
- security mechanisms
- security management
- security problems
- risk assessment
- risk analysis
- security protocols
- data security
- security systems
- information technology
- security threats
- security measures
- cloud computing
- information assurance