Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cryptocurrency Wallets“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cryptocurrency Wallets" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cryptocurrency Wallets"
Jokić, Stevo, Aleksandar Cvetković, Saša Adamović, Nenad Ristić und Petar Spalević. „Comparative analysis of cryptocurrency wallets vs traditional wallets“. Ekonomika 65, Nr. 3 (2019): 65–75. http://dx.doi.org/10.5937/ekonomika1903065j.
Der volle Inhalt der QuelleShaik, Cheman. „Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets“. International Journal on Cryptography and Information Security 10, Nr. 4 (30.12.2020): 11–20. http://dx.doi.org/10.5121/ijcis.2020.10402.
Der volle Inhalt der QuelleZhang, Xitong, He Zhu und Jiayu Zhou. „Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms (Student Abstract)“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 10 (03.04.2020): 13985–86. http://dx.doi.org/10.1609/aaai.v34i10.7265.
Der volle Inhalt der QuelleHe, Daojing, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min und Nadra Guizani. „Security Analysis of Cryptocurrency Wallets in Android-Based Applications“. IEEE Network 34, Nr. 6 (November 2020): 114–19. http://dx.doi.org/10.1109/mnet.011.2000025.
Der volle Inhalt der QuelleZhang, Xitong, He Zhu und Jiayu Zhou. „Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 01 (03.04.2020): 1194–201. http://dx.doi.org/10.1609/aaai.v34i01.5472.
Der volle Inhalt der QuelleThomas, Tyler, Mathew Piscitelli, Ilya Shavrov und Ibrahim Baggili. „Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework“. Forensic Science International: Digital Investigation 33 (Juli 2020): 301002. http://dx.doi.org/10.1016/j.fsidi.2020.301002.
Der volle Inhalt der QuelleFraij, Jihad, Ashraf Aldabbas und Nemer Aburumman. „BLOCKCHAIN AS AN E-VOTING TOOL“. International Journal of Advanced Research 8, Nr. 12 (31.12.2020): 858–66. http://dx.doi.org/10.21474/ijar01/12225.
Der volle Inhalt der QuelleСтойка, Маріана. „CRYPTOCURRENCY – DEFİNİTİON, FUNCTİONS, ADVANTAGES AND RİSKS“. Підприємництво і торгівля, Nr. 30 (01.07.2021): 5–10. http://dx.doi.org/10.36477/2522-1256-2021-30-01.
Der volle Inhalt der QuellePérez-Solà, C., S. Delgado-Segura, G. Navarro-Arribas und J. Herrera-Joancomartí. „Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies“. Royal Society Open Science 6, Nr. 1 (Januar 2019): 180817. http://dx.doi.org/10.1098/rsos.180817.
Der volle Inhalt der QuelleEfimova, L. G. „The mechanism of credit transfers via the Blockchain“. International Accounting 23, Nr. 5 (15.05.2020): 567–84. http://dx.doi.org/10.24891/ia.23.5.567.
Der volle Inhalt der QuelleDissertationen zum Thema "Cryptocurrency Wallets"
Schmid, Philipp, und Sabine Houy. „Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44798.
Der volle Inhalt der QuelleLindqvist, Gunnar. „Nyckelhantering för bitcoin : En studie om hur användare hanterar privata nycklar och hur säkerheten kan förbättras“. Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18817.
Der volle Inhalt der QuelleBitcoin has emerged as the most recognizable cryptocurrency since its inception in 2009 and, at the time of writing has a market capitalization of 165 billion dollars. This together with the financial freedom that Bitcoin offers means that the number of users is constantly increasing. Like all new technology, it takes time for the technology to be fully developed and adapted to the wider mass. As a result, security can suffer which can result in financial losses. This research effort explores what measures and strategies can be used to increase safety through a literature study. The effort also investigates with the help of a survey conducted at a Bitcoin forum on how users of Bitcoin manage their private keys. The work shows that there are measures that contribute to increased security such as encryption and multi-signature but that much depends on what the users themselves choose for the type of best strategy for their area of use. The survey shows that the majority of users make security-conscious decisions about how to use Bitcoin but that aproportion uses less desirable approaches.
Rasool, Muhammad Ahsan, und Shafiq Hafiz Muhammad. „Blockchain Technology : a new domain for Cyber Forensics“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.
Der volle Inhalt der QuelleDRDÁK, František. „Rozbor a návrh aplikace pro digitální měnu Bitcoin“. Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-188109.
Der volle Inhalt der QuelleBücher zum Thema "Cryptocurrency Wallets"
Markwood, Vivienne. Cryptocurrency Paper Wallet: Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.
Den vollen Inhalt der Quelle findenMarkwood, Vivienne. Cryptocurrency Keys Logbook: Paper Wallet Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.
Den vollen Inhalt der Quelle findenNorman, Alan T. Mastering Bitcoin for Starters: Bitcoin and Cryptocurrency Technologies, Mining, Investing and Trading - Bitcoin Book 1, Blockchain, Wallet, Business. CreateSpace Independent Publishing Platform, 2017.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cryptocurrency Wallets"
Kiktenko, E. O., M. A. Kudinov und A. K. Fedorov. „Detecting Brute-Force Attacks on Cryptocurrency Wallets“. In Business Information Systems Workshops, 232–42. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36691-9_20.
Der volle Inhalt der QuelleMoniruzzaman, Md, Farida Chowdhury und Md Sadek Ferdous. „Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets“. In Cyber Security and Computer Science, 631–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52856-0_50.
Der volle Inhalt der QuelleChaum, David, Mario Larangeira, Mario Yaksetig und William Carter. „$$\text{ W-OTS}^{+}$$ Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets“. In Applied Cryptography and Network Security, 195–219. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78372-3_8.
Der volle Inhalt der QuelleFaridi, Adeela, und Farheen Siddiqui. „Improving SPV-Based Cryptocurrency Wallet“. In Cybernetics, Cognition and Machine Learning Applications, 127–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_14.
Der volle Inhalt der QuelleAntipova, Tatiana, und Irina Emelyanova. „Cryptocurrency in Digital Wallet: Pros and Cons“. In Advances in Intelligent Systems and Computing, 313–22. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02351-5_36.
Der volle Inhalt der QuelleLeguesse, Yonas, Mark Vella, Christian Colombo und Julio Hernandez-Castro. „Reducing the Forensic Footprint with Android Accessibility Attacks“. In Security and Trust Management, 22–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_2.
Der volle Inhalt der QuelleAl Shibli, Murad. „Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC)“. In Encyclopedia of Criminal Activities and the Deep Web, 1089–111. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch075.
Der volle Inhalt der QuelleChowdhury, Niaz. „Cryptocurrency Wallet“. In Inside Blockchain, Bitcoin, and Cryptocurrencies, 233–47. Auerbach Publications, 2019. http://dx.doi.org/10.1201/9780429325533-14.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cryptocurrency Wallets"
Rezaeighaleh, Hossein, und Cliff C. Zou. „New Secure Approach to Backup Cryptocurrency Wallets“. In GLOBECOM 2019 - 2019 IEEE Global Communications Conference. IEEE, 2019. http://dx.doi.org/10.1109/globecom38437.2019.9014007.
Der volle Inhalt der QuelleLi, Cong, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan und Yao Cheng. „Android-based Cryptocurrency Wallets: Attacks and Countermeasures“. In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00010.
Der volle Inhalt der QuelleKhadzhi, Andrey S., Sergey V. Zareshin und Oleg V. Tarakanov. „A Method for Analyzing the Activity of Cold Wallets and Identifying Abandoned Cryptocurrency Wallets“. In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2020. http://dx.doi.org/10.1109/eiconrus49466.2020.9039145.
Der volle Inhalt der QuelleGuri, Mordechai. „BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets“. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00227.
Der volle Inhalt der QuelleUrien, Pascal. „Crypto Terminal: A New Open Device For Securing Blockchain Wallets“. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169410.
Der volle Inhalt der QuelleHardjono, Thomas. „Future Directions for Regulated Private Wallets and VASP Trust Infrastructures“. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2021. http://dx.doi.org/10.1109/icbc51069.2021.9461141.
Der volle Inhalt der QuelleVoskobojnikov, Artemij, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth und Konstantin (Kosta) Beznosov. „The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets“. In CHI '21: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3411764.3445407.
Der volle Inhalt der QuelleSuratkar, Saurabh, Mahesh Shirole und Sunil Bhirud. „Cryptocurrency Wallet: A Review“. In 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE, 2020. http://dx.doi.org/10.1109/icccsp49186.2020.9315193.
Der volle Inhalt der QuelleRezaeighaleh, Hossein, und Cliff C. Zou. „Multilayered Defense-in-Depth Architecture for Cryptocurrency Wallet“. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc51575.2020.9345013.
Der volle Inhalt der Quelledi Angelo, Monika, und Gernot Slazer. „Wallet Contracts on Ethereum“. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169467.
Der volle Inhalt der Quelle