Login / Signup

Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption.

Mustafa Ibrahim AlnajjarMehmet Sabir KirazAli H. Al-BayattiSüleyman Kardas
Published in: EURASIP J. Wirel. Commun. Netw. (2024)
Keyphrases
  • management system
  • real time
  • sufficient conditions
  • secret sharing
  • data mining
  • unauthorized access
  • wireless sensor networks
  • access control
  • security mechanisms
  • secure communication