Login / Signup
Cryptocurrencies with Security Policies and Two-Factor Authentication.
Florian Breuer
Vipul Goyal
Giulio Malavolta
Published in:
EuroS&P (2021)
Keyphrases
</>
security policies
factor authentication
access control
network security
distributed systems
security requirements
mobile terminals
access control systems
smart card
access control policies
context aware
feature selection
knowledge discovery
data processing
authentication systems