Login / Signup
HoRStify: Sound Security Analysis of Smart Contracts.
Sebastian Holler
Sebastian Biewer
Clara Schneidewind
Published in:
CoRR (2023)
Keyphrases
</>
security analysis
smart card
public key
security requirements
security properties
high security
encryption scheme
security model
supply chain
user authentication
image encryption
mutual authentication
encryption algorithm
authentication protocol
real time
software architecture
proxy signature scheme