<--- Back to Details
First PageDocument Content
Computing / Emerging technologies / Information and communications technology / Information / Cryptography / Ambient intelligence / Internet of things / Cryptocurrencies / Blockchain / MQTT / Computer security / Enhanced privacy ID
Date: 2018-10-20 14:31:55
Computing
Emerging technologies
Information and communications technology
Information
Cryptography
Ambient intelligence
Internet of things
Cryptocurrencies
Blockchain
MQTT
Computer security
Enhanced privacy ID

< Project Highlights > Staking Utility

Add to Reading List

Source URL: weeve.network

Download Document from Source Website

File Size: 307,50 KB

Share Document on Facebook

Similar Documents

Regulatory Framework for Cryptocurrencies

DocID: 1xVKi - View Document

Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

DocID: 1xVI1 - View Document

Cryptocurrencies / Alternative currencies / Economy / Exonumia / Numismatics / Bitcoin / Digital currencies / Blockchains / Zerocoin protocol / Cryptocurrency tumbler / CoinJoin / CryptoNote

review articles When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all. BY DANIEL GENKIN, DIMITRIOS PAPADOPOULOS, AND CHARALAMPOS PAPAMANTHOU

DocID: 1xUXr - View Document

Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

DocID: 1xUq2 - View Document

Cryptocurrencies / Cryptography / Bitcoin / Computing / Decentralization / Economy / Alternative currencies / Proof-of-stake / Blockchain / Cryptographic hash function / Consensus / Sortition

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

DocID: 1xUbv - View Document