Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.
Data encryption (Computer science). --- Computer security. --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Cryptology. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer System Implementation. --- Architecture, Computer --- Special purpose computers --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Protection --- Security measures --- Data encryption (Computer science) --- Computer networks. --- Computers, Special purpose. --- Computer architecture.
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.
Computer architecture. Operating systems --- Computer. Automation --- informatica --- hardware --- computerbeveiliging --- computernetwerken --- architectuur (informatica)
Choose an application
Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age. How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more
Money. Monetary policy --- Bitcoin. --- Electronic funds transfers. --- Cryptography. --- Money. --- Bitcoin --- Monnaie électronique --- Cryptographie --- Monnaie --- Electronic funds transfers --- Cryptography --- Cryptocurrencies --- Money --- Monnaie électronique. --- Cryptographie. --- Monnaie. --- Monnaie électronique.
Choose an application
Computer architecture. Operating systems --- Computer. Automation --- informatica --- hardware --- computerbeveiliging --- computernetwerken --- architectuur (informatica)
Choose an application
This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security Protocols, held in Cambridge, UK, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What's Happening on the Other Channel?".
Computer science. --- Data encryption (Computer science) --- Computer Communication Networks. --- Data protection. --- Systems and Data Security. --- Data Encryption. --- Computer Science, general. --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computer Science. --- Computer networks --- Computer security --- Access control --- Cryptology. --- Science --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security Protocols, held in Cambridge, UK, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What's Happening on the Other Channel?".
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
Langue Pounoue ; punu ; yipunu : Bantou - langue parlée par les Pounous ou Yakas, qui habitent les régions de la Nyanga et de la Ngounié au Gabon, les districts de Divénié et de Mosendjo, au Moyen Congo
Punu language --- Grammar --- Dictionaries [French ] --- Bayaka (African people)
Choose an application
Choose an application
This monograph proposes the design of algorithms and a system to achieve high performance, the absence of forks, and a very low energy cost, a per transaction cost that is a factor of a billion or more less than bitcoin.
Choose an application
Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age. How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more.--
Bitcoin. --- Electronic funds transfers. --- Cryptography. --- Cryptocurrencies. --- Money.
Listing 1 - 10 of 11 | << page >> |
Sort by
|