First Page | Document Content | |
---|---|---|
Date: 2018-10-20 14:31:57Cryptography Computing Computer security Cryptocurrencies Emerging technologies Decentralization Trusted computing Internet of things Blockchain Trusted Platform Module Trusted execution environment Smart contract | Empowering the Economy of Things Mathias Davidsen, Sebastian Gajek, Marvin Kruse and Sascha Thomsen weeve.network Abstract The Internet of Things (IoT) paradigm is filled with opportunities due to the fact that things caAdd to Reading ListSource URL: weeve.networkDownload Document from Source WebsiteFile Size: 1,42 MBShare Document on Facebook |
Regulatory Framework for CryptocurrenciesDocID: 1xVKi - View Document | |
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv ZoharDocID: 1xVI1 - View Document | |
review articles When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all. BY DANIEL GENKIN, DIMITRIOS PAPADOPOULOS, AND CHARALAMPOS PAPAMANTHOUDocID: 1xUXr - View Document | |
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv ZoharDocID: 1xUq2 - View Document | |
Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACTDocID: 1xUbv - View Document |