Login / Signup
Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks.
Utz Nisslmueller
Klaus-Tycho Foerster
Stefan Schmid
Christian Decker
Published in:
CoRR (2020)
Keyphrases
</>
information leakage
countermeasures
information systems
neural network
network structure
computer networks
network analysis
network design
heterogeneous networks
malicious attacks
data sets
social networks
database systems
access control
privacy preserving
security protocols