Fig. 1From: Are blockchains immune to all malicious attacks?The process of fund transfer (Adapted from (Wild et al. 2015))Back to article page