Login / Signup
Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption.
Mustafa Ibrahim Alnajjar
Mehmet Sabir Kiraz
Ali H. Al-Bayatti
Süleyman Kardas
Published in:
EURASIP J. Wirel. Commun. Netw. (2024)
Keyphrases
</>
management system
real time
sufficient conditions
secret sharing
data mining
unauthorized access
wireless sensor networks
access control
security mechanisms
secure communication