Bitcoin Security under Temporary Dishonest Majority.
Georgia AvarikiotiLukas KaeppeliYuyi WangRoger WattenhoferPublished in: CoRR (2019)
Keyphrases
- information security
- intrusion detection
- access control
- security issues
- security mechanisms
- network security
- statistical databases
- security level
- security management
- security policies
- key management
- trusted third party
- security protocols
- security model
- security services
- information assurance
- security threats
- security properties
- security systems
- security analysis
- network management