Sign in

Developing secure bitcoin contracts with BitML.

Nicola AtzeiMassimo BartolettiStefano LandeNobuko YoshidaRoberto Zunino
Published in: ESEC/SIGSOFT FSE (2019)
Keyphrases
  • case study
  • trusted third party
  • data sets
  • cryptographic protocols
  • moral hazard
  • neural network
  • data mining
  • end users
  • low cost
  • security issues
  • security requirements
  • authentication scheme