標(biāo)題: Titlebook: Blockchain and Trustworthy Systems; First International Zibin Zheng,Hong-Ning Dai,Xiangping Chen Conference proceedings 2020 Springer Natu [打印本頁(yè)] 作者: nourish 時(shí)間: 2025-3-21 19:37
書(shū)目名稱Blockchain and Trustworthy Systems影響因子(影響力)
書(shū)目名稱Blockchain and Trustworthy Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Blockchain and Trustworthy Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems被引頻次
書(shū)目名稱Blockchain and Trustworthy Systems被引頻次學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems年度引用
書(shū)目名稱Blockchain and Trustworthy Systems年度引用學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems讀者反饋
書(shū)目名稱Blockchain and Trustworthy Systems讀者反饋學(xué)科排名
作者: 陳列 時(shí)間: 2025-3-21 22:44 作者: 補(bǔ)助 時(shí)間: 2025-3-22 03:36
Conference proceedings 2020ksys 2019, held in Guangzhou, China, in December 2019..The 50 regular papersand the 19 short papers were carefully reviewed andselected from 130 submissions. The papers are focus on?Blockchain and trustworthy systems can be applied to many fields, such as financial services, social management and supply chain management..作者: Hyaluronic-Acid 時(shí)間: 2025-3-22 05:47
Verb Alternations and Extensions, senders and receivers. This paper presents a digital currency system based on the group signature scheme of Boneh et al. The system can protect users’ privacy and enable regulations. The system uses the one-time address technology of the CryptoNote to achieve unlinkability. It uses the group signat作者: 荒唐 時(shí)間: 2025-3-22 08:47 作者: 閹割 時(shí)間: 2025-3-22 14:57
Gosse Bouma,Frank van Eynde,Dan Flickingerhas reached five hundred thousand, and the entire capacity of chain is more than 500?GB. If a light node wants to verify a transaction, it has to spend nearly one week to download the data of whole chain with download rate of 1?MB/s, which seriously hinders the usage of blockchain. In order to resol作者: 和平主義者 時(shí)間: 2025-3-22 20:35 作者: flaggy 時(shí)間: 2025-3-22 22:37
Lexikalisch verteiltes Text-Parsinghich have been widely used in the scenario of blockchain. The elliptic curves with low embedding degree and large prime-order subgroup (a.k.a pairing-friendly elliptic curves) are the basic components for such schemes, where prime order elliptic curves are most frequently used in practice. In this p作者: Concrete 時(shí)間: 2025-3-23 05:23
Lexikalisch verteiltes Text-Parsinglobal clock service node is added. We use the Byzantine fault-tolerant algorithm to ensure the stability of the global clock node services. In addition, Cristian and Berkeley time synchronization algorithms are used to improve the confirmation of timestamp information, so as to achieve strong consis作者: 很是迷惑 時(shí)間: 2025-3-23 09:21
Lexikalisch verteiltes Text-Parsingace error. To solve this problem, a histogram publishing algorithm based on roulette sampling sort and greedy partition is proposed. Our algorithm combines the exponential mechanism with the roulette sampling sorting method, arranges the similar histogram bins together with a larger probability by t作者: 蘆筍 時(shí)間: 2025-3-23 12:37 作者: 刺耳 時(shí)間: 2025-3-23 14:07 作者: CANON 時(shí)間: 2025-3-23 22:01
Lexikalisch verteiltes Text-Parsing. It attracts massive nodes through the distributed network and requires the nodes to generate nonces and hash them to accumulate workload. However, most of the generated nonces and hash values are meaningless and discarded. Such massive quantity of computational power are dedicated for nothing, whi作者: CEDE 時(shí)間: 2025-3-24 01:37 作者: Kinetic 時(shí)間: 2025-3-24 04:28
Alfred Iwainsky,Wolfgang Wilhelmie storage, but also requires a vast amount of computation which is wasteful and scales poorly. The SPV (simplified payment verification) node simplifies node storage, but decentralization, the most important feature of Blockchain, is compromised. To address the issue, this paper proposes a novel enh作者: 軟膏 時(shí)間: 2025-3-24 07:45
Lexikon - Begutachtung in der Medizinecks that restrict the expansibility of the blockchain system, so optimization for storage mechanism becomes an important issue. In this paper, a modular-based compression scheme is proposed to dramatically reduce the storage volume of the account addresses on each node in the blockchain system. The作者: Melanocytes 時(shí)間: 2025-3-24 14:36
https://doi.org/10.1007/978-3-663-13203-5ness. At this time, the clean slate team at Stanford University in the United States defined a new network architecture, SDN (Software Defined Network). The introduction of this network architecture has brought about tremendous changes in the development of today’s networks. The separation of contro作者: neoplasm 時(shí)間: 2025-3-24 15:47 作者: 噱頭 時(shí)間: 2025-3-24 21:00 作者: optional 時(shí)間: 2025-3-24 23:47
https://doi.org/10.1007/978-981-15-2777-7Blockchain; Trustworthy systems; Security; Privacy; Data encryption; Smart contracts; Decentralized applic作者: notification 時(shí)間: 2025-3-25 06:13 作者: orient 時(shí)間: 2025-3-25 10:40 作者: 英寸 時(shí)間: 2025-3-25 12:20 作者: 蒼白 時(shí)間: 2025-3-25 18:55 作者: 卷發(fā) 時(shí)間: 2025-3-25 20:32 作者: GONG 時(shí)間: 2025-3-26 03:56 作者: 提煉 時(shí)間: 2025-3-26 05:30
A Global Clock Model for the Consortium Blockchainslobal clock service node is added. We use the Byzantine fault-tolerant algorithm to ensure the stability of the global clock node services. In addition, Cristian and Berkeley time synchronization algorithms are used to improve the confirmation of timestamp information, so as to achieve strong consis作者: insert 時(shí)間: 2025-3-26 11:26
Histogram Publishing Algorithm Based on Sampling Sorting and Greedy Clusteringace error. To solve this problem, a histogram publishing algorithm based on roulette sampling sort and greedy partition is proposed. Our algorithm combines the exponential mechanism with the roulette sampling sorting method, arranges the similar histogram bins together with a larger probability by t作者: 不能逃避 時(shí)間: 2025-3-26 12:48 作者: Bumble 時(shí)間: 2025-3-26 20:20
Information Encryption Mechanism Based on QR Code This paper proposes an information encryption mechanism based on QR code to solve the problem of information leakage in data communication. The error correction mechanism of the QR code allows it to record information normally even if it is partially damaged. Taking advantage of this feature, this 作者: Apraxia 時(shí)間: 2025-3-26 23:36 作者: FAR 時(shí)間: 2025-3-27 04:58 作者: 招待 時(shí)間: 2025-3-27 08:34 作者: 金桌活畫(huà)面 時(shí)間: 2025-3-27 12:17 作者: SYN 時(shí)間: 2025-3-27 17:11 作者: Nonporous 時(shí)間: 2025-3-27 21:45 作者: Parley 時(shí)間: 2025-3-28 01:30
A Security Detection Model for Selfish Mining Attacklockchain technology, its security has become a bottleneck restricting the development. In order to solve the problem, the blockchain structure characteristic can be used to build a security detection model. Taking 51% attack detection as an example, the relationship among attack state, attack inten作者: 加劇 時(shí)間: 2025-3-28 02:34
Verb Alternations and Extensions, SVP (shortest vector problem) on lattice, it can both resist the quantum computer attacks and have smaller key size, signature size and higher computational efficiency. The proposed cryptocurrency model uses the proposed LRS scheme to ensure the sender’s anonymity and the one-time stealth address t作者: 輕浮女 時(shí)間: 2025-3-28 07:03 作者: 北極人 時(shí)間: 2025-3-28 11:42 作者: 公豬 時(shí)間: 2025-3-28 18:21
Lexikalisch verteiltes Text-Parsingl of pictures, which is applied to filtering the best segmentation of a picture; (b) it consummates the consensus mechanism with an image segmentation technology to replace the workload accumulating process, allowing nodes to segment images while mining blocks. The experimental results verified that作者: Trabeculoplasty 時(shí)間: 2025-3-28 22:33
Alfred Iwainsky,Wolfgang Wilhelmicifically, in the first layer, we firstly define a leaderless consensus model to quantitatively abstract the basic parameters in the process of system consensus, then three core attributes are justified to serve as the three vertices of the discussed triangle problem, namely security, cost, and effi作者: 不可思議 時(shí)間: 2025-3-29 01:31
https://doi.org/10.1007/978-3-663-13203-5dies the technology of the latest SDN Flow table optimization at home and abroad, proposes an efficient optimization scheme of Flow table item on the betweenness centrality through the main road selection algorithm, and realizes related applications by setting up experimental topology..Experiments s作者: 綁架 時(shí)間: 2025-3-29 06:39
Lexikon Di?tetische Indikationenlity exceeds half of the total ability, the attack block is more than the honest block. However, for the number of system states, there is a big difference between 51% attack and selfish mining attack. Specifically, in selfish mining attack, when the attacker’s ability exceeds 25%, the number of sta作者: 萬(wàn)靈丹 時(shí)間: 2025-3-29 11:15 作者: 沐浴 時(shí)間: 2025-3-29 11:39
A New Structure of Blockchain to Simplify the Verificationanism. We append backlinks in some blocks, such that blocks not only look like a chain but also like a binary tree. We also introduce a challenge mechanism for against the forking attack on light nodes.作者: reject 時(shí)間: 2025-3-29 18:51
Information Encryption Mechanism Based on QR Codeorrection mechanism of the QR code with the secret sharing algorithm, the secret information can be transmitted safely. The encryption mechanism can effectively reduce the suspicion of the attacker on the secret information, and has the advantages of large storage capacity and flexible storage.作者: BLUSH 時(shí)間: 2025-3-29 21:39 作者: misanthrope 時(shí)間: 2025-3-30 00:06 作者: 違抗 時(shí)間: 2025-3-30 05:15
Optimization Strategy of OpenFlow Flow Table Storage Based on the Idea of “Betweenness Centrality”dies the technology of the latest SDN Flow table optimization at home and abroad, proposes an efficient optimization scheme of Flow table item on the betweenness centrality through the main road selection algorithm, and realizes related applications by setting up experimental topology..Experiments s作者: emulsify 時(shí)間: 2025-3-30 12:01
A Security Detection Model for Selfish Mining Attacklity exceeds half of the total ability, the attack block is more than the honest block. However, for the number of system states, there is a big difference between 51% attack and selfish mining attack. Specifically, in selfish mining attack, when the attacker’s ability exceeds 25%, the number of sta作者: 搖曳 時(shí)間: 2025-3-30 13:46
1865-0929 130 submissions. The papers are focus on?Blockchain and trustworthy systems can be applied to many fields, such as financial services, social management and supply chain management..978-981-15-2776-0978-981-15-2777-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Preamble 時(shí)間: 2025-3-30 17:24
Verb Alternations and Extensions,ure in a ring style to achieve untraceability. The group manager in a group signature can open a problematic transaction, restore the real identity of the sender, and revoke the private key of the sender if needed, which makes the digital currency regulatable.作者: 火車車輪 時(shí)間: 2025-3-30 22:04
Silvia Quazza,Henk van den Heuvelis affected by the past behavior, and a reliable master node is elected more probably. Experiments show that compared with the PBFT algorithm, the CPBFT algorithm reduces the amount of data transmission on the network and increases the throughput.