<--- Back to Details
First PageDocument Content
Cryptocurrencies / Cryptography / Bitcoin / Computing / Alternative currencies / Economy / Blockchains / Transport Layer Security / Mining pool / Proof-of-stake / Cryptographic nonce / Peercoin
Date: 2018-09-18 11:06:16
Cryptocurrencies
Cryptography
Bitcoin
Computing
Alternative currencies
Economy
Blockchains
Transport Layer Security
Mining pool
Proof-of-stake
Cryptographic nonce
Peercoin

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

Add to Reading List

Source URL: benvds.com

Download Document from Source Website

File Size: 798,67 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

DocID: 1rmtA - View Document

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and  Terrance E. Boult

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

DocID: 1r7Iu - View Document

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger  Michael K. Reiter

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

DocID: 1r7EO - View Document

The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

DocID: 1r7cb - View Document