Login / Signup

Adaptive Double-Spending Attacks on PoW-Based Blockchains.

Jian ZhengHuawei HuangZibin ZhengSong Guo
Published in: IEEE Trans. Dependable Secur. Comput. (2024)
Keyphrases
  • watermarking scheme
  • database systems
  • countermeasures
  • data driven
  • real time
  • image sequences
  • multiscale
  • computer security
  • adaptive algorithms
  • security risks