<--- Back to Details
First PageDocument Content
Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Hashing / Proof-of-work system / Public-key cryptography / Peer-to-peer / Electronic money / Cryptography / Computing / Cryptographic hash functions
Date: 2014-06-04 21:55:42
Software
Bitcoin
Peer-to-peer computing
Financial cryptography
Hashing
Proof-of-work system
Public-key cryptography
Peer-to-peer
Electronic money
Cryptography
Computing
Cryptographic hash functions

Add to Reading List

Source URL: cs.umd.edu

Download Document from Source Website

File Size: 594,05 KB

Share Document on Facebook

Similar Documents

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network Christian Decker,∗ Roger Wattenhofer† ∗ ETH

DocID: 1tLPI - View Document

13-th IEEE International Conference on Peer-to-Peer Computing Have a Snack, Pay with Bitcoins Tobias Bamert∗ , Christian Decker∗ , Lennart Elsen∗ , Roger Wattenhofer† , Samuel Welten∗ ∗ ETH

DocID: 1tF2D - View Document

Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks Matthew Edwards and Awais Rashid Security Lancaster School of Computing and Communications InfoLab21

DocID: 1sG0l - View Document

Pools Engagement in European Research (PEER) Guidelines SICSA is able to provide support for researchers in Informatics and Computing Sciences at SICSA institutions to boost participation in European projects. We support

DocID: 1sxKF - View Document

To appear in the 21th ACM Symposium on Principles of Distributed Computing (PODCSquirrel: A decentralized peer-to-peer web cache ∗ Antony Rowstron

DocID: 1s3YV - View Document