找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Privacy Management, Cryptocurrencies and Blockchain Technology; ESORICS 2018 Interna Joaquin Garcia-Alfaro,Jordi Herrera-Joancomartí,R

[復(fù)制鏈接]
樓主: intensify
21#
發(fā)表于 2025-3-25 03:55:09 | 只看該作者
22#
發(fā)表于 2025-3-25 10:55:12 | 只看該作者
23#
發(fā)表于 2025-3-25 13:33:34 | 只看該作者
Medical and psychosocial interventions,nt channels from the perspective of a Payment Service Provider (PSP). Given a set of transactions, we examine the optimal graph structure and fee assignment to maximize the PSP’s profit. A customer prefers to route transactions through the PSP’s network if the cheapest path from sender to receiver i
24#
發(fā)表于 2025-3-25 16:37:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:59:41 | 只看該作者
26#
發(fā)表于 2025-3-26 02:35:05 | 只看該作者
Louis G. Tornatzky,Esther O. Fergusosals for decision schemes. In this work we rigorously analyze 30 existing schemes. Our analysis demonstrates contradictions between these schemes – so clearly they cannot all be right – and also highlights what we feel is a more structural flaw of most of them, namely that they ignore alternatives
27#
發(fā)表于 2025-3-26 04:37:02 | 只看該作者
Abraham M. Jeger,Robert S. Slotnicky of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy wastage is to find ways to build PoW schemes from valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe
28#
發(fā)表于 2025-3-26 11:17:05 | 只看該作者
https://doi.org/10.1007/978-1-4899-3344-7 names, this attack can fool the mining pool administrator into punishing any innocent miner; when the top miners are punished, this attack can significantly slow down the overall production of the mining pool. We show that an attacker needs only a small fraction (e.g., one millionth) of the resourc
29#
發(fā)表于 2025-3-26 14:03:57 | 只看該作者
Gerald Midgley,Alejandro E. Ochoa-Arias PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner’s allocation over time using price data and inferred risk tolerance. The mod
30#
發(fā)表于 2025-3-26 17:06:02 | 只看該作者
Alan Boyd,Mandy Brown,Gerald Midgleywn that the privacy of the protocol may conflict with its concurrent nature and may lead to deadlocks. In this paper we ask the natural question: can payments in routing networks be routed so as to avoid deadlocks altogether? Our results show that it is in general NP-complete to determine whether a
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-24 12:53
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
武穴市| 牙克石市| 平果县| 平遥县| 平罗县| 邳州市| 肃北| 鹤岗市| 镇平县| 南城县| 横峰县| 嘉善县| 原平市| 普兰店市| 县级市| 淳安县| 竹山县| 含山县| 获嘉县| 锡林浩特市| 吉安市| 晋中市| 西充县| 蕲春县| 泽库县| 天门市| 普兰县| 衡阳市| 永昌县| 瑞昌市| 昆明市| 邵阳县| 阿合奇县| 阳信县| 博乐市| 东乌珠穆沁旗| 全椒县| 大埔县| 鞍山市| 泰安市| 祥云县|