找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Privacy Management, Cryptocurrencies and Blockchain Technology; ESORICS 2018 Interna Joaquin Garcia-Alfaro,Jordi Herrera-Joancomartí,R

[復(fù)制鏈接]
樓主: intensify
21#
發(fā)表于 2025-3-25 03:55:09 | 只看該作者
22#
發(fā)表于 2025-3-25 10:55:12 | 只看該作者
23#
發(fā)表于 2025-3-25 13:33:34 | 只看該作者
Medical and psychosocial interventions,nt channels from the perspective of a Payment Service Provider (PSP). Given a set of transactions, we examine the optimal graph structure and fee assignment to maximize the PSP’s profit. A customer prefers to route transactions through the PSP’s network if the cheapest path from sender to receiver i
24#
發(fā)表于 2025-3-25 16:37:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:59:41 | 只看該作者
26#
發(fā)表于 2025-3-26 02:35:05 | 只看該作者
Louis G. Tornatzky,Esther O. Fergusosals for decision schemes. In this work we rigorously analyze 30 existing schemes. Our analysis demonstrates contradictions between these schemes – so clearly they cannot all be right – and also highlights what we feel is a more structural flaw of most of them, namely that they ignore alternatives
27#
發(fā)表于 2025-3-26 04:37:02 | 只看該作者
Abraham M. Jeger,Robert S. Slotnicky of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy wastage is to find ways to build PoW schemes from valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe
28#
發(fā)表于 2025-3-26 11:17:05 | 只看該作者
https://doi.org/10.1007/978-1-4899-3344-7 names, this attack can fool the mining pool administrator into punishing any innocent miner; when the top miners are punished, this attack can significantly slow down the overall production of the mining pool. We show that an attacker needs only a small fraction (e.g., one millionth) of the resourc
29#
發(fā)表于 2025-3-26 14:03:57 | 只看該作者
Gerald Midgley,Alejandro E. Ochoa-Arias PoW blockchains often share hashing algorithms, miners face a complex choice in deciding how to allocate their hash power among chains. We present an economic model that leverages Modern Portfolio Theory to predict a miner’s allocation over time using price data and inferred risk tolerance. The mod
30#
發(fā)表于 2025-3-26 17:06:02 | 只看該作者
Alan Boyd,Mandy Brown,Gerald Midgleywn that the privacy of the protocol may conflict with its concurrent nature and may lead to deadlocks. In this paper we ask the natural question: can payments in routing networks be routed so as to avoid deadlocks altogether? Our results show that it is in general NP-complete to determine whether a
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-24 12:53
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
华容县| 莆田市| 富裕县| 胶州市| 嵊泗县| 衡东县| 金华市| 图木舒克市| 准格尔旗| 柳林县| 秦安县| 舞阳县| 南京市| 永寿县| 栾川县| 通山县| 朔州市| 崇仁县| 阳春市| 隆昌县| 阳曲县| 泉州市| 怀集县| 石景山区| 广水市| 临沭县| 丰原市| 循化| 清原| 海城市| 洞头县| 安西县| 海原县| 康保县| 宁夏| 平定县| 绥芬河市| 沿河| 大足县| 崇信县| 潍坊市|