VRF-Based Mining Simple Non-outsourceable Cryptocurrency Mining (Englisch)
- Neue Suche nach: Han, Runchao
- Neue Suche nach: Lin, Haoyu
- Neue Suche nach: Yu, Jiangshan
- Neue Suche nach: Han, Runchao
- Neue Suche nach: Lin, Haoyu
- Neue Suche nach: Yu, Jiangshan
In:
Data privacy management, cryptocurrencies and blockchain technology
; 287-304
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:VRF-Based Mining Simple Non-outsourceable Cryptocurrency Mining
-
Beteiligte:
-
Kongress:DPM ; 15. ; 2020 ; Online
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Fairness-Aware Privacy-Preserving Record LinkageVatsalan, Dinusha / Yu, Joyce / Henecka, Wilko / Thorne, Brian et al. | 2020
- 19
-
Differentially Private Profiling of Anonymized Customer Purchase RecordsKikuchi, Hiroaki et al. | 2020
- 35
-
P-Signature-Based Blocking to Improve the Scalability of Privacy-Preserving Record LinkageVatsalan, Dinusha / Yu, Joyce / Thorne, Brian / Henecka, Wilko et al. | 2020
- 55
-
Utility Promises of Self-Organising Maps in Privacy Preserving Data MiningMohammed, Kabiru / Ayesh, Aladdin / Boiten, Eerke et al. | 2020
- 73
-
Multi-criteria Optimization Using l-diversity and t-closeness for k-anonymizationMauger, Clémence / Mahec, Gaël Le / Dequen, Gilles et al. | 2020
- 89
-
ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-WorkSabry, Moe / Samavi, Reza / Stebila, Douglas et al. | 2020
- 111
-
Joint Obfuscation for Privacy Protection in Location-Based Social NetworksBostanipour, Behnaz / Theodorakopoulos, George et al. | 2020
- 128
-
Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure FrameworkKammüller, Florian / Lutz, Bianca et al. | 2020
- 145
-
Extracting Speech from Motion-Sensitive SensorsAzzakhnini, Safaa / Staudemeyer, Ralf C. et al. | 2020
- 161
-
PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsDiaz-Ferreyra, Nicolas E. / Tessier, Patrick / Pedroza, Gabriel / Heisel, Maritta et al. | 2020
- 178
-
Towards Multiple Pattern Type Privacy Protection in Complex Event Processing Through Event Obfuscation StrategiesPalanisamy, Saravana Murthy et al. | 2020
- 195
-
GPS-Based Behavioral Authentication Utilizing Distance CoherenceThao, Tran Phuong / Yamaguchi, Rie Shigetomi et al. | 2020
- 219
-
Short Paper: Integrating the Data Protection Impact Assessment into the Software Development LifecycleIrvine, Christopher / Balasubramaniam, Dharini / Henderson, Tristan et al. | 2020
- 229
-
Citizens as Data Donors: Maximizing Participation Through Privacy Assurance and Behavioral ChangeGharib, Mohamad et al. | 2020
- 240
-
Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a VirusDemirag, Didem / Ayday, Erman et al. | 2020
- 250
-
Privacy Policy Classification with XLNet (Short Paper)Mustapha, Majd / Krasnashchok, Katsiaryna / Bassit, Anas Al / Skhiri, Sabri et al. | 2020
- 258
-
Every Query Counts: Analyzing the Privacy Loss of Exploratory Data AnalysesVoigt, Saskia Nunez von / Pauli, Mira / Reichert, Johanna / Tschorsch, Florian et al. | 2020
- 269
-
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction AggregationZamyatin, Alexei / Avarikioti, Zeta / Perez, Daniel / Knottenbelt, William J. et al. | 2020
- 287
-
VRF-Based Mining Simple Non-outsourceable Cryptocurrency MiningHan, Runchao / Lin, Haoyu / Yu, Jiangshan et al. | 2020
- 305
-
On the Selection of the LN Client Implementation ParametersOleas-Chávez, Luis E. / Pérez-Sola, Cristina / Herrera-Joacomarti, Jordi et al. | 2020
- 319
-
Privacy Preserving Netting Protocol for Inter-bank PaymentsGalal, Hisham S. / Youssef, Amr M. et al. | 2020
- 337
-
Triptych: Logarithmic-Sized Linkable Ring Signatures with ApplicationsNoether, Sarang / Goodell, Brandon et al. | 2020
- 355
-
Moderated Redactable Blockchains: A Definitional Framework with an Efficient ConstructDousti, Mohammad Sadeq / Küpqü, Alptekin et al. | 2020
- 374
-
Radium: Improving Dynamic PoW TargetingBissias, George et al. | 2020
- 390
-
Proof of No-Work: How to Incentivize Individuals to Stay at HomeBartholic, Michael / Su, Jianan / Ushida, Ryosuke / Ikeno, Yusuke / Gu, Zhengrong / Matsuo, Shin 'ichiro et al. | 2020
- 409
-
Fundamental Properties of the Layer Below a Payment Channel NetworkGrundmann, Matthias / Hartenstein, Hannes et al. | 2020
- 421
-
Zerojoin: Combining Zerocoin and CoinJoinChepurnoy, Alexander / Saxena, Amitabh et al. | 2020
- 437
-
Who Let the DOGS Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed OpeningDehez-Clementi, Marina / Deneuville, Jean-Christophe / Lacan, Jérôme / Asghar, Hassan / Kaafar, Dali et al. | 2020
- 447
-
Tracking Mixed BitcoinsTironsakkul, Tin / Maarek, Manuel / Eross, Andrea / Just, Mike et al. | 2020