Key management.
Blockchains use asymmetric cryptography to ensure the authenticity and integrity of transactions stored on the distributed ledger. An attacker with access to the private key of a Blockchain account can steal cryptocurrency and interact with smart contracts on its behalf. Enroll in this course to lea...
Saved in:
Format: | Electronic Video |
---|---|
Language: | English |
Published: |
[Place of publication not identified] :
O'Reilly Media, Inc.,
[2023]
|
Edition: | [First edition]. |
Subjects: | |
Online Access: | CONNECT |