Bitcoin

Results: 1512



#Item
971Peer-to-peer computing / Client–server model / Server / Computation / Software / Computing / Bitcoin

VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-12 14:05:59
972Social engineering / Trojan horses / Computer network security / Spamming / Ransomware / Bitcoin / PGPCoder / Archiveus / Scareware / Malware / System software / Software

whitepaper: Your Money or Your Life Files Your Money or Your Life Files A Short History Of Ransomware "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream.” -Brian K

Add to Reading List

Source URL: ww1.prweb.com

Language: English - Date: 2014-10-02 09:37:20
973

Bitcoin User Demographics Melbourne Geek Night
 March 2014 Presented by

Add to Reading List

Source URL: www.melbournegeeks.com

- Date: 2014-03-25 23:14:50
    974Legal terms / Personal finance / Escrow / Real property law / Bitcoin / PayPal / Market / Online shopping / Electronic commerce / Economics / Business

    OneMarket: A Peer-to-Peer Internet Marketplace TheDagger [removed] www.cloakcoin.com

    Add to Reading List

    Source URL: www.cloakcoin.com

    Language: English - Date: 2014-11-14 14:52:10
    975Crime / Money laundering / Financial Action Task Force on Money Laundering / Economics / Terrorism financing / Organized crime / Bitcoin / Asia/Pacific Group on Money Laundering / FATF blacklist / Financial regulation / Tax evasion / Business

    CRIMINAL LAW CONFERENCE 2014 KEYNOTE ADDRESS BY THE HONOURABLE ATTORNEY-GENERAL STEVEN CHONG SC 17 JANUARY[removed]I.

    Add to Reading List

    Source URL: www.agc.gov.sg

    Language: English - Date: 2014-01-16 23:39:00
    976Internet / Underground culture / Human rights / Bitcoin / Peer-to-peer computing / Tor / Silk Road / Cypherpunk / Privacy / Internet privacy / Software / Computing

    WHAT DOES THE DARK NET MEAN FOR THE FUTURE OF INTELLIGENCE WORK? The 2014 Annual Vincent Briscoe Security Lecture Imperial College, London Jamie Bartlett, Demos

    Add to Reading List

    Source URL: demos.co.uk

    Language: English - Date: 2014-10-30 12:36:13
    977Bitcoin / Peer-to-peer computing / Routing / Email forwarding / Bridging / Wireless mesh network / Peer-to-peer / Computing / Network architecture / Computer architecture

    Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles Magnus Skjegstad, Anil Madhavapeddy, Jon Crowcroft Computer Laboratory University of Cambridge

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2014-12-15 21:32:47
    978Bitcoin / Peer-to-peer computing / Money / Cryptography / Financial cryptography / Silk Road / Proof-of-work system / Nakamoto / PayPal / Electronic commerce / Business / Payment systems

    1 Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk Tyler Moore1 and Nicolas Christin2 1

    Add to Reading List

    Source URL: lyle.smu.edu

    Language: English - Date: 2013-06-27 10:42:23
    979Finance / Financial services / Hedge fund / Economics / Financial economics / Bitcoin / Peer-to-peer computing

    BitGo Inc. December 2014 Binary Financial BitGo Customer Success Case Study

    Add to Reading List

    Source URL: d2bx26666ysa1s.cloudfront.net

    Language: English - Date: 2014-12-30 14:11:45
    980Bitcoin / Socialist Unity Party of Germany / Communism / Computing / Politics / Eastern Bloc / Motion in limine / Motion

    Microsoft Word - 14-cr-68 MILs Opinion v.37 (OZ)

    Add to Reading List

    Source URL: s3.amazonaws.com

    Language: English - Date: 2015-01-07 17:55:26
    UPDATE