X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science - cryptography and security (6) 6
bergbau (4) 4
computer science (4) 4
cryptocurrency (4) 4
algorithms (3) 3
bitcoin (3) 3
blockchain (3) 3
calculating (3) 3
computer communication networks (3) 3
computer science, theory & methods (3) 3
computing (3) 3
counting (3) 3
physics (3) 3
transaktion (3) 3
bergmann (2) 2
blockchains (2) 2
centralization (2) 2
computer hardware (2) 2
computer networks (2) 2
computer science - distributed, parallel, and cluster computing (2) 2
computer science, hardware & architecture (2) 2
computer science, software engineering (2) 2
computer systems organization and communication networks (2) 2
data mining (2) 2
distributed processing (2) 2
electric digital data processing (2) 2
electrical engineering (2) 2
game theory (2) 2
kryptowährung (2) 2
mining gap (2) 2
networks (2) 2
proof of work (2) 2
protocols (2) 2
registers (2) 2
sensors (2) 2
servers (2) 2
software engineering/programming and operating systems (2) 2
theory of computation (2) 2
topology (2) 2
aggregation (1) 1
akkordarbeit (1) 1
algorism (1) 1
algorithm analysis and problem complexity (1) 1
analysis (1) 1
automata (1) 1
automatic data processing (1) 1
automatic information processing (1) 1
balancing (1) 1
bank technology (1) 1
bar code (1) 1
bar codes (1) 1
betriebskosten (1) 1
bitcoin next generation (1) 1
bitcoin-mining (1) 1
cache (1) 1
cloud storage (1) 1
clustering (1) 1
clusters (1) 1
codes, bar (1) 1
coins (1) 1
communication systems, computer (1) 1
companies (1) 1
complexity theory (1) 1
computer communication systems (1) 1
computer crashes (1) 1
computer data processing (1) 1
computer network protocols (1) 1
computer security (1) 1
computer software (1) 1
computer-leistung (1) 1
congresses (1) 1
consensus protocol (1) 1
consistency (1) 1
corda (1) 1
criteria (1) 1
crypto-currencies (1) 1
cryptocurrencies (1) 1
cryptology (1) 1
currencies (1) 1
dao (1) 1
data centers (1) 1
data encryption (1) 1
data networks, computer (1) 1
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (1) 1
data processing, automatic (1) 1
data processing, computer (1) 1
data processing, electronic (1) 1
data security (1) 1
data structures (1) 1
data structures (computer scienc (1) 1
data structures and information theory (1) 1
data structures, cryptology and information theory (1) 1
databases (1) 1
datensicherheit (1) 1
datenverschlüsselung (1) 1
decentralized autonomous organization (1) 1
dezentralisation (1) 1
digital (1) 1
digital currencies (1) 1
distributed classification (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2015 IEEE Symposium on Security and Privacy, ISSN 1081-6011, 05/2015, Volume 2015-, pp. 89 - 103
An open distributed system can be secured by requiring participants to present proof of work and rewarding them for participation. The Bit coin digital... 
cryptocurrency | Protocols | Online banking | Exponential distribution | Games | proof of work | Nash equilibrium | pools | Registers | mining | Data mining | bitcoin | Revenues | Balancing | Coins | Proving | Digital | Pools | Currencies
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8437, pp. 436 - 454
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9604, pp. 106 - 125
Conference Proceeding
Proceedings of the 2018 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 01/2018, pp. 713 - 728
Blockchain-based cryptocurrencies secure a decentralized consensus protocol by incentives. The protocol participants, called miners, generate (mine) a series... 
cryptocurrency | mining gap | blockchains | centralization | game theory | Centralization | Game Theory | Blockchains | Cryptocurrency | Mining Gap | Computer Science - Cryptography and Security
Conference Proceeding
Distributed Computing, ISSN 0178-2770, 10/2014, Volume 27, Issue 5, pp. 313 - 328
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9604, pp. 126 - 141
Conference Proceeding
Distributed Computing, ISSN 0178-2770, 12/2011, Volume 24, Issue 5, pp. 207 - 222
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10323, pp. 182 - 190
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7111, pp. 72 - 85
Conference Proceeding
2015 IEEE 35th International Conference on Distributed Computing Systems, ISSN 1063-6927, 06/2015, Volume 2015-, pp. 686 - 695
Read-only caches are widely used in cloud infrastructures to reduce access latency and load on backend databases. Operators view coherent caches as impractical... 
cache | Social network services | Distributed databases | Prototypes | Companies | Throughput | Servers | transactions | Distributed processing | Databases | Policies | Effectiveness | Consistency | Infrastructure | Computer networks | Workload | Computer Science - Distributed, Parallel, and Cluster Computing
Conference Proceeding
Proceedings of the 11th ACM International Systems and Storage Conference, 06/2018, pp. 132 - 132
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 8205, pp. 507 - 521
Conference Proceeding
11/2014
An open distributed system can be secured by requiring participants to present proof of work and rewarding them for participation. The Bitcoin digital currency... 
Journal Article
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), ISSN 1530-0889, 06/2012, pp. 1 - 12
A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access... 
Emulation | Semantics | Automata | Robustness | Computer crashes | Registers | Complexity theory
Conference Proceeding
11/2019
Proof-of-work (PoW) mechanisms secure about 80% of the $250B cryptocurrency market. PoW requires system participants to expend computational resources, and... 
Journal Article
ACM SIGACT News, ISSN 0163-5700, 09/2013, Volume 44, Issue 3, p. 78
Journal Article
07/2019
Cryptocurrencies, which promise to become a global means of money transactions, are typically implemented with blockchain protocols. Blockchains utilize a... 
Computer Science - Distributed, Parallel, and Cluster Computing
Journal Article
11/2013
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that... 
Computer Science - Cryptography and Security
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.