Hedging Against Sore Loser Attacks in Cross-Chain Transactions.
Yingjie XueMaurice HerlihyPublished in: PODC (2021)
Keyphrases
- countermeasures
- database
- traffic analysis
- transaction management
- transaction model
- malicious users
- database transactions
- watermarking scheme
- security threats
- transactional data
- security mechanisms
- security risks
- transaction costs
- computer security
- credit card
- transaction processing
- distributed database systems
- network security
- data management
- neural network