@dblp

The Honey Badger of BFT Protocols.

, , , , and . ACM Conference on Computer and Communications Security, page 31-42. ACM, (2016)

Links and resources

Tags