Login / Signup
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.
Runkai Yang
Xiaolin Chang
Jelena V. Misic
Vojislav B. Misic
Hongyue Kang
Published in:
IEEE Trans. Netw. Serv. Manag. (2022)
Keyphrases
</>
data mining
text mining
web mining
sequential patterns
frequent itemsets
mining algorithm
authentication protocol
association rule mining
frequent patterns
resource allocation
data mining methods
qualitative and quantitative
quantitative and qualitative
key distribution