Proceedings of the 12th European Workshop on Systems Security 2019
DOI: 10.1145/3301417.3312495
|View full text |Cite
|
Sign up to set email alerts
|

Pitfalls of open architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…In most blockchain applications users use a piece of software, called a wallet, to store their private keys securely. Public keys and associated addresses can also be stored in the wallet [23]. Keys can be stored in an off-line wallet which is the most secure type; however, it is inconvenient to use, and it is commonly used as a backup.…”
Section: Key Managementmentioning
confidence: 99%
See 3 more Smart Citations
“…In most blockchain applications users use a piece of software, called a wallet, to store their private keys securely. Public keys and associated addresses can also be stored in the wallet [23]. Keys can be stored in an off-line wallet which is the most secure type; however, it is inconvenient to use, and it is commonly used as a backup.…”
Section: Key Managementmentioning
confidence: 99%
“…[3], Privacy violation; [9], On-line wallet: Bypass credential validation [23], Compromised key [63].…”
Section: Single-keymentioning
confidence: 99%
See 2 more Smart Citations
“…The most advanced feature was the absolute "cold storage", with storage temperature very dissimilar from a coin casting procedure (Jokić, 2019;Langschaedel, 2015). Electronic fraud with "Electrum wallet" and Bitcoin were the reason to revert to a modern gold coin (Biryukov, 2019;Bui, 2019;Voleth, 2019). Of course, archaic electrum was a gold coin and this wallet falsifies Greek History.…”
Section: Electrum Naming Confusionmentioning
confidence: 99%