Chain Security: Nodes, Algorithm, and Network (English)
- New search for: Huang, Ken
- New search for: Huang, Ken
- Further information on Huang, Ken:
-
https://orcid.org/https://orcid.org/0009-0004-6502-3673
- New search for: Budorin, Dyma
- New search for: Tan, Lisa JY
- New search for: Ma, Winston
- New search for: Zhang, Zhijun William
- New search for: Huang, Ken
In:
A Comprehensive Guide for Web3 Security
: From Technology, Economic and Legal Aspects
;
Chapter: 2
;
31-60
;
2023
- Article/Chapter (Book) / Electronic Resource
-
Title:Chain Security: Nodes, Algorithm, and Network
-
Additional title:Future of bus. & Finance
-
Contributors:Huang, Ken ( editor ) / Budorin, Dyma ( editor ) / Tan, Lisa JY ( editor ) / Ma, Winston ( editor ) / Zhang, Zhijun William ( editor ) / Huang, Ken ( author )
-
Published in:A Comprehensive Guide for Web3 Security : From Technology, Economic and Legal Aspects ; Chapter: 2 ; 31-60Future of Business and Finance ; 31-60
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2023-12-28
-
Size:30 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The C.I.A Properties of Web3 SystemHuang, Ken et al. | 2023
- 2
-
Chain Security: Nodes, Algorithm, and NetworkHuang, Ken et al. | 2023
- 3
-
Wallet SecurityParisi, Carlo / Budorin, Dyma / Khalavka, Ostap et al. | 2023
- 4
-
Smart Contract SecurityParisi, Carlo / Budorin, Dyma et al. | 2023
- 5
-
Token Economics Model Creation and SecurityTan, Lisa J. Y. et al. | 2023
- 6
-
Economic Exploits and Risk Mitigation StrategiesTan, Lisa J. Y. et al. | 2023
- 7
-
DevSecOps for Web3Huang, Ken et al. | 2023
- 8
-
Web3 Security AnalyticsParisi, Carlo / Budorin, Dmitriy et al. | 2023
- 9
-
Data AuthenticityHuang, Ken et al. | 2023
- 10
-
Security in Permissioned BlockchainZhang, William et al. | 2023
- 11
-
Regulation and Crypto on a Cliff EdgeMa, Winston et al. | 2023
- 12
-
Terrorist Financing, War Crimes, and Crypto GeopoliticsMa, Winston et al. | 2023