Attack and protection schemes on fabric isomorphic crosschain systems
Crosschain solves the problem of value transfer and asset interaction between different blockchains with different consensus mechanisms, or different infrastructures. It not only realizes the mutual communication of multiple independent blockchains, but also ensures the data consistency. However, ex...
Saved in:
| Main Authors: | Zhuo Lv, Di Wu, Wen Yang, Li Duan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2022-01-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1177/15501477211059945 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
On an Isomorphism of Compactifications of Moduli Scheme of Vector Bundles
by: N. V. Timofeeva
Published: (2015-02-01) -
Proxy re-signature scheme based on isomorphisms of polynomial
by: Hui-xian LI, et al.
Published: (2017-02-01) -
An edge sensitivity based gradient attack on graph isomorphic networks for graph classification problems
by: Srinitish Srinivasan, et al.
Published: (2025-04-01) -
Subcaterpillar Isomorphism: Subtree Isomorphism Restricted Pattern Trees To Caterpillars
by: Tomoya Miyazaki, et al.
Published: (2022-09-01) -
Isomorphisms of semigroups of transformations
by: A. Sita Rama Murti
Published: (1983-01-01)