<--- Back to Details
First PageDocument Content
Cryptocurrencies / Blockchains / Ethereum / Alternative currencies / Cryptography / Numismatics / Economy / Computer access control / ERC-20 / Kin / Token coin / Multi-factor authentication
Date: 2017-10-29 14:06:57
Cryptocurrencies
Blockchains
Ethereum
Alternative currencies
Cryptography
Numismatics
Economy
Computer access control
ERC-20
Kin
Token coin
Multi-factor authentication

​Frequently​​ Asked​​ Questions 1​​-​​What​​is​​the​​Token​​Sale? Token​​Sale​​​is​​a​​modern​​method​​of​​crowdfunding​​that​​allows​​us​​t

Add to Reading List

Source URL: hacken.io

Download Document from Source Website

File Size: 996,62 KB

Share Document on Facebook

Similar Documents

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1voGj - View Document

Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

DocID: 1vgjd - View Document

Access Control and Key Management for Mobile Agents Volker Roth 1 and Mehrdad Jalali-Sohi 2 Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany

DocID: 1vfkA - View Document

Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

DocID: 1uYGS - View Document

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

DocID: 1uPvL - View Document