How to achieve adaptive security for asynchronous BFT?
Haibin ZhangChao LiuSisi DuanPublished in: J. Parallel Distributed Comput. (2022)
Keyphrases
- intrusion detection
- security policies
- computer security
- information security
- dynamically adjust
- state machine
- security analysis
- network security
- access control
- security issues
- security requirements
- security mechanisms
- distributed systems
- data structure
- security problems
- data mining
- smart card
- security systems
- image processing