Author:
Subburaj T.,Shilpa K.,Sultana Saba,Suthendran K.,Karuppasamy M.,Arun Kumar S.,Jyothi Babu A.
Publisher
Springer Nature Singapore
Reference10 articles.
1. https://101blockchains.com/blockchain-security-issues/
2. https://www.digitalshadows.com/blog-and-research/cryptocurrency-attacks-to-be-aware-of-2021/
3. https://www.varonis.com/blog/cryptojacking/
4. Locher T, Mysicka D, Schmid S, Wattenhofer R (2010) Poisoning the Kad network. Lecture notes in computer science book series (LNCS) distributed computing and networking, vol 5935, pp 195–206
5. Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83–92
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献