Risk framework for bitcoin custody operation with the revault protocol
From MaRDI portal
Publication:2670809
DOI10.1007/978-3-662-63958-0_1zbMath1492.91085arXiv2102.09392OpenAlexW3203857285MaRDI QIDQ2670809
Publication date: 1 June 2022
Full work available at URL: https://arxiv.org/abs/2102.09392
Cryptography (94A60) Actuarial science and mathematical finance (91G99) Risk models (general) (91B05)
Uses Software
Cites Work
- Unnamed Item
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- But why does it work? A rational protocol design treatment of bitcoin
- The Bitcoin backbone protocol with chains of variable difficulty
- Bitcoin as a transaction ledger: a composable treatment
- MuSig2: simple two-round Schnorr multi-signatures
- A review of attack graph and attack tree visual syntax in cyber security
- The Bitcoin Backbone Protocol: Analysis and Applications
- Analysis of the Blockchain Protocol in Asynchronous Networks
- Attack-defense trees
This page was built for publication: Risk framework for bitcoin custody operation with the revault protocol