Login / Signup
Mitigation of liveness attacks in DAG-based ledgers.
Darcy Camargo
Andreas Penzkofer
Sebastian Müller
William Sanders
Published in:
ICBC (2023)
Keyphrases
</>
directed acyclic graph
countermeasures
computer security
risk management
watermarking scheme
malicious attacks
malicious users
neural network
database systems
traffic analysis
terrorist attacks
random variables
watermarking algorithm
block cipher
denial of service attacks