Login / Signup
Adaptive Double-Spending Attacks on PoW-Based Blockchains.
Jian Zheng
Huawei Huang
Zibin Zheng
Song Guo
Published in:
IEEE Trans. Dependable Secur. Comput. (2024)
Keyphrases
</>
watermarking scheme
database systems
countermeasures
data driven
real time
image sequences
multiscale
computer security
adaptive algorithms
security risks