1 code implementation • 12 Dec 2019 • Xiao Liang Yu, Omar Al-Bataineh, David Lo, Abhik Roychoudhury
Our approach can be used to optimise the overall security and reliability of smart contracts against malicious attackers.
Software Engineering Cryptography and Security 68N15 D.1.2