@dblp

Cross-Layer Deanonymization Methods in the Lightning Protocol.

, , , , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 187-204. Springer, (2021)

Links and resources

Tags