標(biāo)題: Titlebook: Data Privacy Management, Cryptocurrencies and Blockchain Technology; ESORICS 2018 Interna Joaquin Garcia-Alfaro,Jordi Herrera-Joancomartí,R [打印本頁] 作者: intensify 時間: 2025-3-21 20:04
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology影響因子(影響力)
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology影響因子(影響力)學(xué)科排名
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology網(wǎng)絡(luò)公開度
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology被引頻次
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology被引頻次學(xué)科排名
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology年度引用
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology年度引用學(xué)科排名
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology讀者反饋
書目名稱Data Privacy Management, Cryptocurrencies and Blockchain Technology讀者反饋學(xué)科排名
作者: yohimbine 時間: 2025-3-21 21:56
Blockchain-Based Fair Certified Notificationsrtified notifications. Certified notifications is one of the applications that require a fair exchange of values: a message and a non-repudiation of origin proof in exchange for a non-repudiation of reception evidence. To the best of our knowledge, this paper presents the first blockchain-based cert作者: Resistance 時間: 2025-3-22 04:18 作者: 清真寺 時間: 2025-3-22 05:01 作者: hermetic 時間: 2025-3-22 11:18 作者: adulterant 時間: 2025-3-22 15:01 作者: adulterant 時間: 2025-3-22 18:34
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryptionclosure of private data must be maintained outside a Blockchain by withholding and later publishing encryption keys, for example. We propose the Atomic Information Disclosure (AID) pattern based on threshold encryption that allows a set of key holders to govern the release of data without having acc作者: 使絕緣 時間: 2025-3-22 21:22 作者: 手段 時間: 2025-3-23 02:38 作者: blithe 時間: 2025-3-23 07:51 作者: 過度 時間: 2025-3-23 11:12 作者: 言行自由 時間: 2025-3-23 14:57
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner’s allocation over time using price data and inferred risk tolerance. The mod作者: 最高點 時間: 2025-3-23 19:41 作者: 莎草 時間: 2025-3-24 00:38
Coloured Ring Confidential Transactions We propose a novel transaction type, which enables privacy preserving trading of independent assets on a common block-chain. This is achieved by extending the ring confidential transaction with an additional commitment to a colour and a publicly verifiable proof of conservation. With our coloured c作者: probate 時間: 2025-3-24 03:13 作者: SNEER 時間: 2025-3-24 08:14 作者: Decongestant 時間: 2025-3-24 14:18 作者: kyphoplasty 時間: 2025-3-24 15:58
Economic Interventions in Communitiessm. Sealed-bid auctions are powerful trading tools due to the advantages they offer compared to their open-cry counterparts. However, the inherent transparency and lack of privacy on the Ethereum blockchain conflict with the main objective behind the sealed-bid auctions. In this paper, we tackle thi作者: accrete 時間: 2025-3-24 20:58 作者: 開玩笑 時間: 2025-3-25 00:24 作者: Accrue 時間: 2025-3-25 03:55 作者: 尋找 時間: 2025-3-25 10:55 作者: precede 時間: 2025-3-25 13:33
Medical and psychosocial interventions,nt channels from the perspective of a Payment Service Provider (PSP). Given a set of transactions, we examine the optimal graph structure and fee assignment to maximize the PSP’s profit. A customer prefers to route transactions through the PSP’s network if the cheapest path from sender to receiver i作者: Ophthalmoscope 時間: 2025-3-25 16:37 作者: Yag-Capsulotomy 時間: 2025-3-25 20:59 作者: 含糊其辭 時間: 2025-3-26 02:35
Louis G. Tornatzky,Esther O. Fergusosals for decision schemes. In this work we rigorously analyze 30 existing schemes. Our analysis demonstrates contradictions between these schemes – so clearly they cannot all be right – and also highlights what we feel is a more structural flaw of most of them, namely that they ignore alternatives 作者: 強壯 時間: 2025-3-26 04:37
Abraham M. Jeger,Robert S. Slotnicky of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy wastage is to find ways to build PoW schemes from valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe 作者: thyroid-hormone 時間: 2025-3-26 11:17
https://doi.org/10.1007/978-1-4899-3344-7 names, this attack can fool the mining pool administrator into punishing any innocent miner; when the top miners are punished, this attack can significantly slow down the overall production of the mining pool. We show that an attacker needs only a small fraction (e.g., one millionth) of the resourc作者: N斯巴達(dá)人 時間: 2025-3-26 14:03
Gerald Midgley,Alejandro E. Ochoa-Arias PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner’s allocation over time using price data and inferred risk tolerance. The mod作者: 他一致 時間: 2025-3-26 17:06
Alan Boyd,Mandy Brown,Gerald Midgleywn that the privacy of the protocol may conflict with its concurrent nature and may lead to deadlocks. In this paper we ask the natural question: can payments in routing networks be routed so as to avoid deadlocks altogether? Our results show that it is in general NP-complete to determine whether a 作者: 休閑 時間: 2025-3-26 21:16 作者: 加強防衛(wèi) 時間: 2025-3-27 03:14 作者: 官僚統(tǒng)治 時間: 2025-3-27 05:29
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263001.jpg作者: sphincter 時間: 2025-3-27 10:29
Data Privacy Management, Cryptocurrencies and Blockchain Technology978-3-030-00305-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: CONE 時間: 2025-3-27 15:05
Medical and psychosocial interventions,actions, the problem can be formulated as a linear program. For a path graph, we present a polynomial time algorithm to assign optimal fees. We also show that the star network, where the center is an additional node acting as an intermediary, is a near-optimal solution to the network design problem.作者: FIG 時間: 2025-3-27 21:34
Working methods: from theory into practice,ires, participants are unable to plagiarise and must therefore generate their own solutions which can then be aggregated and analysed to determine a final answer. We outline the importance of a game-theoretically sound incentive scheme, possible attacks, and other future work.作者: 發(fā)酵 時間: 2025-3-27 23:42 作者: 爭議的蘋果 時間: 2025-3-28 04:15 作者: 憤慨點吧 時間: 2025-3-28 08:25
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryptionires, participants are unable to plagiarise and must therefore generate their own solutions which can then be aggregated and analysed to determine a final answer. We outline the importance of a game-theoretically sound incentive scheme, possible attacks, and other future work.作者: 違反 時間: 2025-3-28 12:31 作者: Keratectomy 時間: 2025-3-28 17:03
0302-9743 BT 2018, and the 13.th.International Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23.nd.?European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. From the CBT Workshop 7 full and 8 short papers out of 39 submissions are作者: 蔓藤圖飾 時間: 2025-3-28 19:24 作者: 提名 時間: 2025-3-29 00:07 作者: 專心 時間: 2025-3-29 05:07
Valuable Puzzles for Proofs-of-Work valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe the properties needed to adapt public key cryptosystems as PoW functions suitable for decentralised cryptocurrencies and provide a candidate example.作者: patriot 時間: 2025-3-29 09:19
Carmelo Garitaonandía,Miguel Angel Casadounspent transaction output (UTXO) model, with explicitly given relations between input and output transaction states. Neither unbounded loops nor possibly infinite validation time are needed in this approach.作者: TIGER 時間: 2025-3-29 12:11 作者: 門閂 時間: 2025-3-29 19:11 作者: Thrombolysis 時間: 2025-3-29 22:49 作者: eustachian-tube 時間: 2025-3-30 00:07
https://doi.org/10.1007/978-981-13-2742-1onfidential ring signatures, new token types can be introduced and transferred by any participant using the same sized anonymity set as single-token privacy aware block-chains. Thereby, our system facilitates tracking assets on an immutable ledger without compromising the confidentiality of transactions.作者: 某人 時間: 2025-3-30 06:17 作者: 制度 時間: 2025-3-30 10:56 作者: cultivated 時間: 2025-3-30 13:04 作者: saturated-fat 時間: 2025-3-30 20:07 作者: Analogy 時間: 2025-3-31 00:23
Contour: A Practical System for Binary Transparencyployment for the Debian software repository, that Contour is the only system for binary transparency that satisfies the efficiency and coordination requirements that would make it possible to deploy today.作者: 果核 時間: 2025-3-31 01:45 作者: 聽覺 時間: 2025-3-31 05:17