Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
Published in: | 2023 14th International Conference on Information and Communication Technology Convergence (ICTC) |
---|---|
Main Authors: | , |
Format: | Conference Object |
Language: | unknown |
Published: |
IEEE
2023
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1109/ictc58733.2023.10392713 http://xplorestaging.ieee.org/ielx7/10391854/10391860/10392713.pdf?arnumber=10392713 |
id |
crieeecr:10.1109/ictc58733.2023.10392713 |
---|---|
record_format |
openpolar |
spelling |
crieeecr:10.1109/ictc58733.2023.10392713 2024-10-06T13:43:35+00:00 Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica Lee, Woo Yong Kim, Keunyoung 2023 http://dx.doi.org/10.1109/ictc58733.2023.10392713 http://xplorestaging.ieee.org/ielx7/10391854/10391860/10392713.pdf?arnumber=10392713 unknown IEEE https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 2023 14th International Conference on Information and Communication Technology Convergence (ICTC) page 403-405 proceedings-article 2023 crieeecr https://doi.org/10.1109/ictc58733.2023.10392713 2024-09-09T05:33:42Z Conference Object Antarc* Antarctica IEEE Publications 2023 14th International Conference on Information and Communication Technology Convergence (ICTC) 403 405 |
institution |
Open Polar |
collection |
IEEE Publications |
op_collection_id |
crieeecr |
language |
unknown |
format |
Conference Object |
author |
Lee, Woo Yong Kim, Keunyoung |
spellingShingle |
Lee, Woo Yong Kim, Keunyoung Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica |
author_facet |
Lee, Woo Yong Kim, Keunyoung |
author_sort |
Lee, Woo Yong |
title |
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica |
title_short |
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica |
title_full |
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica |
title_fullStr |
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica |
title_full_unstemmed |
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica |
title_sort |
security analysis for applying the proof-of-stake consensus algorithm to ioet network in antarctica |
publisher |
IEEE |
publishDate |
2023 |
url |
http://dx.doi.org/10.1109/ictc58733.2023.10392713 http://xplorestaging.ieee.org/ielx7/10391854/10391860/10392713.pdf?arnumber=10392713 |
genre |
Antarc* Antarctica |
genre_facet |
Antarc* Antarctica |
op_source |
2023 14th International Conference on Information and Communication Technology Convergence (ICTC) page 403-405 |
op_rights |
https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
op_doi |
https://doi.org/10.1109/ictc58733.2023.10392713 |
container_title |
2023 14th International Conference on Information and Communication Technology Convergence (ICTC) |
container_start_page |
403 |
op_container_end_page |
405 |
_version_ |
1812181825633648640 |