找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Privacy Management, Cryptocurrencies and Blockchain Technology; ESORICS 2018 Interna Joaquin Garcia-Alfaro,Jordi Herrera-Joancomartí,R

[復制鏈接]
樓主: intensify
21#
發(fā)表于 2025-3-25 03:55:09 | 只看該作者
22#
發(fā)表于 2025-3-25 10:55:12 | 只看該作者
23#
發(fā)表于 2025-3-25 13:33:34 | 只看該作者
Medical and psychosocial interventions,nt channels from the perspective of a Payment Service Provider (PSP). Given a set of transactions, we examine the optimal graph structure and fee assignment to maximize the PSP’s profit. A customer prefers to route transactions through the PSP’s network if the cheapest path from sender to receiver i
24#
發(fā)表于 2025-3-25 16:37:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:59:41 | 只看該作者
26#
發(fā)表于 2025-3-26 02:35:05 | 只看該作者
Louis G. Tornatzky,Esther O. Fergusosals for decision schemes. In this work we rigorously analyze 30 existing schemes. Our analysis demonstrates contradictions between these schemes – so clearly they cannot all be right – and also highlights what we feel is a more structural flaw of most of them, namely that they ignore alternatives
27#
發(fā)表于 2025-3-26 04:37:02 | 只看該作者
Abraham M. Jeger,Robert S. Slotnicky of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy wastage is to find ways to build PoW schemes from valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe
28#
發(fā)表于 2025-3-26 11:17:05 | 只看該作者
https://doi.org/10.1007/978-1-4899-3344-7 names, this attack can fool the mining pool administrator into punishing any innocent miner; when the top miners are punished, this attack can significantly slow down the overall production of the mining pool. We show that an attacker needs only a small fraction (e.g., one millionth) of the resourc
29#
發(fā)表于 2025-3-26 14:03:57 | 只看該作者
Gerald Midgley,Alejandro E. Ochoa-Arias PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner’s allocation over time using price data and inferred risk tolerance. The mod
30#
發(fā)表于 2025-3-26 17:06:02 | 只看該作者
Alan Boyd,Mandy Brown,Gerald Midgleywn that the privacy of the protocol may conflict with its concurrent nature and may lead to deadlocks. In this paper we ask the natural question: can payments in routing networks be routed so as to avoid deadlocks altogether? Our results show that it is in general NP-complete to determine whether a
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-22 16:49
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
全州县| 青神县| 灵璧县| 芮城县| 东安县| 伊金霍洛旗| 罗田县| 孟州市| 甘德县| 长汀县| 岫岩| 蒲城县| 吉木萨尔县| 绥芬河市| 兴安盟| 台湾省| 西平县| 和林格尔县| 额济纳旗| 栖霞市| 乌审旗| 清镇市| 稻城县| 荥阳市| 孟连| 金溪县| 永昌县| 宿州市| 平和县| 古浪县| 徐州市| 镇坪县| 灯塔市| 枝江市| 门头沟区| 塔河县| 吴江市| 乌兰浩特市| 三原县| 阿拉善右旗| 永德县|