找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Privacy Management, Cryptocurrencies and Blockchain Technology; ESORICS 2018 Interna Joaquin Garcia-Alfaro,Jordi Herrera-Joancomartí,R

[復(fù)制鏈接]
樓主: intensify
21#
發(fā)表于 2025-3-25 03:55:09 | 只看該作者
22#
發(fā)表于 2025-3-25 10:55:12 | 只看該作者
23#
發(fā)表于 2025-3-25 13:33:34 | 只看該作者
Medical and psychosocial interventions,nt channels from the perspective of a Payment Service Provider (PSP). Given a set of transactions, we examine the optimal graph structure and fee assignment to maximize the PSP’s profit. A customer prefers to route transactions through the PSP’s network if the cheapest path from sender to receiver i
24#
發(fā)表于 2025-3-25 16:37:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:59:41 | 只看該作者
26#
發(fā)表于 2025-3-26 02:35:05 | 只看該作者
Louis G. Tornatzky,Esther O. Fergusosals for decision schemes. In this work we rigorously analyze 30 existing schemes. Our analysis demonstrates contradictions between these schemes – so clearly they cannot all be right – and also highlights what we feel is a more structural flaw of most of them, namely that they ignore alternatives
27#
發(fā)表于 2025-3-26 04:37:02 | 只看該作者
Abraham M. Jeger,Robert S. Slotnicky of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy wastage is to find ways to build PoW schemes from valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe
28#
發(fā)表于 2025-3-26 11:17:05 | 只看該作者
https://doi.org/10.1007/978-1-4899-3344-7 names, this attack can fool the mining pool administrator into punishing any innocent miner; when the top miners are punished, this attack can significantly slow down the overall production of the mining pool. We show that an attacker needs only a small fraction (e.g., one millionth) of the resourc
29#
發(fā)表于 2025-3-26 14:03:57 | 只看該作者
Gerald Midgley,Alejandro E. Ochoa-Arias PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner’s allocation over time using price data and inferred risk tolerance. The mod
30#
發(fā)表于 2025-3-26 17:06:02 | 只看該作者
Alan Boyd,Mandy Brown,Gerald Midgleywn that the privacy of the protocol may conflict with its concurrent nature and may lead to deadlocks. In this paper we ask the natural question: can payments in routing networks be routed so as to avoid deadlocks altogether? Our results show that it is in general NP-complete to determine whether a
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-24 12:53
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
金湖县| 沾益县| 高邑县| 祁阳县| 内丘县| 德昌县| 黄浦区| 丰顺县| 琼结县| 汉阴县| 深泽县| 陆良县| 桐梓县| 盘锦市| 和林格尔县| 邳州市| 双桥区| 南丰县| 当涂县| 柳林县| 南华县| 雅安市| 西畴县| 永修县| 淮阳县| 山西省| 重庆市| 舟山市| 拜城县| 定陶县| 民丰县| 滨海县| 饶平县| 三明市| 沙坪坝区| 阳泉市| 新郑市| 蕉岭县| 渭南市| 北票市| 宝清县|