Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica

Bibliographic Details
Published in:2023 14th International Conference on Information and Communication Technology Convergence (ICTC)
Main Authors: Lee, Woo Yong, Kim, Keunyoung
Format: Conference Object
Language:unknown
Published: IEEE 2023
Subjects:
Online Access:http://dx.doi.org/10.1109/ictc58733.2023.10392713
http://xplorestaging.ieee.org/ielx7/10391854/10391860/10392713.pdf?arnumber=10392713
id crieeecr:10.1109/ictc58733.2023.10392713
record_format openpolar
spelling crieeecr:10.1109/ictc58733.2023.10392713 2024-10-06T13:43:35+00:00 Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica Lee, Woo Yong Kim, Keunyoung 2023 http://dx.doi.org/10.1109/ictc58733.2023.10392713 http://xplorestaging.ieee.org/ielx7/10391854/10391860/10392713.pdf?arnumber=10392713 unknown IEEE https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 2023 14th International Conference on Information and Communication Technology Convergence (ICTC) page 403-405 proceedings-article 2023 crieeecr https://doi.org/10.1109/ictc58733.2023.10392713 2024-09-09T05:33:42Z Conference Object Antarc* Antarctica IEEE Publications 2023 14th International Conference on Information and Communication Technology Convergence (ICTC) 403 405
institution Open Polar
collection IEEE Publications
op_collection_id crieeecr
language unknown
format Conference Object
author Lee, Woo Yong
Kim, Keunyoung
spellingShingle Lee, Woo Yong
Kim, Keunyoung
Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
author_facet Lee, Woo Yong
Kim, Keunyoung
author_sort Lee, Woo Yong
title Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
title_short Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
title_full Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
title_fullStr Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
title_full_unstemmed Security Analysis for Applying the Proof-of-Stake Consensus Algorithm to IoET Network in Antarctica
title_sort security analysis for applying the proof-of-stake consensus algorithm to ioet network in antarctica
publisher IEEE
publishDate 2023
url http://dx.doi.org/10.1109/ictc58733.2023.10392713
http://xplorestaging.ieee.org/ielx7/10391854/10391860/10392713.pdf?arnumber=10392713
genre Antarc*
Antarctica
genre_facet Antarc*
Antarctica
op_source 2023 14th International Conference on Information and Communication Technology Convergence (ICTC)
page 403-405
op_rights https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
op_doi https://doi.org/10.1109/ictc58733.2023.10392713
container_title 2023 14th International Conference on Information and Communication Technology Convergence (ICTC)
container_start_page 403
op_container_end_page 405
_version_ 1812181825633648640