Back to Results
First PageMeta Content
Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Electronic commerce / Proof-of-work system / Peer-to-peer / Public-key cryptography / Electronic money / Computing / Cryptography / Cryptographic hash functions


Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller1 , Ari Juels, Elaine Shi1 , Bryan Parno2 and Jonathan Katz1 1 University of Maryland 2
Add to Reading List

Document Date: 2014-05-29 22:16:19


Open Document

File Size: 520,46 KB

Share Result on Facebook

City

Alexandria / /

Company

Amazon / Bitcoin / GPU / Intel / Microsoft / TeleGeography / /

Country

United States / /

Currency

cent / USD / /

Event

FDA Phase / Man-Made Disaster / /

Facility

By building / Royal Library / Library of Congress / store F / Ancient Library of Alexandria / University of Maryland / mine Bitcoins / /

IndustryTerm

mining equipment / storage devices / cloud server / storage equipment / Internet transit costs / software version number / rental services / online full version / local mining / sequential mining process / storage mining / block mining / energy / massive computing / local mining user / strawman protocol / local storage devices / local mining saves / electricity / energy cost / electricity cost / internet accesses / candidate solution / storagee network / graphics processor / puzzle solution / mining / signature-computing processors / computing / e-cash / local storage device / challenge-response protocol / valid puzzle solution / coin-mining infrastructure / constant-use high-bandwidth applications / /

NaturalFeature

Amazon Glacier / /

Organization

University of Maryland / U.S. government / Congress / ASIC / /

Person

Peter M. Fraser / Ari Juels / /

Position

miner / general / useful goal and thus reduce waste / single authoritative dealer / trusted dealer / winning miner / pricing representative / general terminology / dealer / /

Product

Figure / /

ProvinceOrState

Maryland / British Columbia / /

Technology

virtual machine / challenge-response protocol / RAM / randomized algorithm / distributed POR protocol / peer-to-peer / Setup algorithm / private key / Secret key / random access / html / strawman protocol / ASIC / public key / graphics processor / signature-computing processors / ISP / SDRAM / /

URL

http /

SocialTag