Back to Results
First PageMeta Content
Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Proof-of-work system / Public-key cryptography / Peer-to-peer / Electronic money / Cryptographic nonce / Cryptography / Computing / Cryptographic hash functions


Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller1 , Ari Juels2 , Elaine Shi1 , Bryan Parno3 and Jonathan Katz1 1 University of Maryland Cornell Tech (Jacobs)
Add to Reading List

Document Date: 2014-06-04 21:57:05


Open Document

File Size: 522,14 KB

Share Result on Facebook

City

Alexandria / /

Company

Amazon / Bitcoin / GPU / Intel / Microsoft / TeleGeography / /

Country

United States / /

Currency

cent / USD / /

Event

FDA Phase / Man-Made Disaster / /

Facility

By building / Royal Library / University of Maryland Cornell Tech / Library of Congress / store F / Ancient Library of Alexandria / mine Bitcoins / /

IndustryTerm

mining equipment / storage devices / cloud server / storage equipment / Internet transit costs / software version number / rental services / online full version / local mining / sequential mining process / storage mining / block mining / energy / local mining user / strawman protocol / local storage devices / local mining saves / electricity / energy cost / electricity cost / massive computing resources / internet accesses / candidate solution / storagee network / graphics processor / puzzle solution / mining / signature-computing processors / computing / e-cash / local storage device / challenge-response protocol / valid puzzle solution / coin-mining infrastructure / constant-use high-bandwidth applications / /

Organization

U.S. government / Congress / ASIC / University of Maryland Cornell Tech / /

Person

Peter M. Fraser / Sarah Meiklejohn / /

Position

miner / general / useful goal and thus reduce waste / single authoritative dealer / trusted dealer / winning miner / pricing representative / general terminology / dealer / /

Product

Figure / /

ProvinceOrState

British Columbia / /

Technology

virtual machine / challenge-response protocol / RAM / randomized algorithm / distributed POR protocol / peer-to-peer / Setup algorithm / private key / secret key / random access / ASIC / public key / graphics processor / signature-computing processors / ISP / SDRAM / /

URL

http /

SocialTag