The Exact Security of BIP32 Wallets.
Poulami DasAndreas ErwigSebastian FaustJulian LossSiavash RiahiPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- information security
- security requirements
- real time
- access control
- computer security
- network security
- statistical databases
- intrusion detection
- security policies
- information assurance
- security problems
- security issues
- security mechanisms
- risk analysis
- data security
- security level
- security management
- database
- human operators
- functional requirements
- authentication protocol
- social networks
- security vulnerabilities