Auswahl der wissenschaftlichen Literatur zum Thema „Cryptocurrency Wallets“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cryptocurrency Wallets" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Cryptocurrency Wallets"

1

Jokić, Stevo, Aleksandar Cvetković, Saša Adamović, Nenad Ristić und Petar Spalević. „Comparative analysis of cryptocurrency wallets vs traditional wallets“. Ekonomika 65, Nr. 3 (2019): 65–75. http://dx.doi.org/10.5937/ekonomika1903065j.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Shaik, Cheman. „Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets“. International Journal on Cryptography and Information Security 10, Nr. 4 (30.12.2020): 11–20. http://dx.doi.org/10.5121/ijcis.2020.10402.

Der volle Inhalt der Quelle
Annotation:
In this paper I have discussed a new method of enabling a cryptocurrency wallet user to define his own unforgettable seed phrase. An algorithm named SEEPT (Seed Phrase Transformation) is provided and illustrated with a real user defined seed phrase as input and a BIP39 standard seed phrase generated as output through cryptographic transformations. Discussed in detail is how an unforgettable seed phrase can be generatedfrom a set of names or words that are specific to a user’s personal life. Explained in detail as to how a wallet user can reconstruct his seed phrase on demand without depending on any storage, thereby relieving him from the burden of memorizing it frequently or storing it digitally on a computer hardware or physically on a paper or metal media.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zhang, Xitong, He Zhu und Jiayu Zhou. „Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms (Student Abstract)“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 10 (03.04.2020): 13985–86. http://dx.doi.org/10.1609/aaai.v34i10.7265.

Der volle Inhalt der Quelle
Annotation:
With the proliferation of blockchain projects and applications, cryptocurrency exchanges, which provides exchange services among different types of cryptocurrencies, become pivotal platforms that allow customers to trade digital assets on different blockchains. Because of the anonymity and trustlessness nature of cryptocurrency, one major challenge of crypto-exchanges is asset safety, and all-time amount hacked from crypto-exchanges until 2018 is over $1.5 billion even with carefully maintained secure trading systems. The most critical vulnerability of crypto-exchanges is from the so-called hot wallet, which is used to store a certain portion of the total asset online of an exchange and programmatically sign transactions when a withdraw happens. It is important to develop network security mechanisms. However, the fact is that there is no guarantee that the system can defend all attacks. Thus, accurately controlling the available assets in the hot wallets becomes the key to minimize the risk of running an exchange. In this paper, we propose Shoreline, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

He, Daojing, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min und Nadra Guizani. „Security Analysis of Cryptocurrency Wallets in Android-Based Applications“. IEEE Network 34, Nr. 6 (November 2020): 114–19. http://dx.doi.org/10.1109/mnet.011.2000025.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zhang, Xitong, He Zhu und Jiayu Zhou. „Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 01 (03.04.2020): 1194–201. http://dx.doi.org/10.1609/aaai.v34i01.5472.

Der volle Inhalt der Quelle
Annotation:
With the proliferation of blockchain projects and applications, cryptocurrency exchanges, which provides exchange services among different types of cryptocurrencies, become pivotal platforms that allow customers to trade digital assets on different blockchains. Because of the anonymity and trustlessness nature of cryptocurrency, one major challenge of crypto-exchanges is asset safety, and all-time amount hacked from crypto-exchanges until 2018 is over $1.5 billion even with carefully maintained secure trading systems. The most critical vulnerability of crypto-exchanges is from the so-called hot wallet, which is used to store a certain portion of the total asset of an exchange and programmatically sign transactions when a withdraw happens. Whenever hackers managed to gain control over the computing infrastructure of the exchange, they usually immediately obtain all the assets in the hot wallet. It is important to develop network security mechanisms. However, the fact is that there is no guarantee that the system can defend all attacks. Thus, accurately controlling the available assets in the hot wallets becomes the key to minimize the risk of running an exchange. However, determining such optimal threshold remains a challenging task because of the complicated dynamics inside exchanges. In this paper, we propose Shoreline, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks. We conduct extensive empirical studies on the real trading data from a trading platform and demonstrate the effectiveness of the proposed approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Thomas, Tyler, Mathew Piscitelli, Ilya Shavrov und Ibrahim Baggili. „Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework“. Forensic Science International: Digital Investigation 33 (Juli 2020): 301002. http://dx.doi.org/10.1016/j.fsidi.2020.301002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Fraij, Jihad, Ashraf Aldabbas und Nemer Aburumman. „BLOCKCHAIN AS AN E-VOTING TOOL“. International Journal of Advanced Research 8, Nr. 12 (31.12.2020): 858–66. http://dx.doi.org/10.21474/ijar01/12225.

Der volle Inhalt der Quelle
Annotation:
Blockchain as a distributed system that confirms security and reliability have started a new era of a solid and consensus system.Blockchains focus on cryptocurrency is encouraging many other processes to follow the same reliable approach of security.Almost all procedures and operations are now invited to be electronically performed in the digital Ethereum network that has been presented. Moreover, this study proposed the use of an Ethereum network on a blockchain platform in the study when it was moved to a blockchain network to confirm transparency.An E-voting system sample has been tested by using an Ethereum network smart contracts inwhich solidity language and wallets were used. In the voting test, the Ethereum blockchain will be able to collect records in which voters can use their Ethereum wallets or android devices to submit their votes in a consensus node.The researchers studied the voting system taking Jordan as a case study.This study recommended the adaptation of e-voting to support transparency and voters trust to reduce corruption and unreliability in the voting processes. Moreover, the use of this system will allow a voter to vote from home in the time of the pandemic.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Стойка, Маріана. „CRYPTOCURRENCY – DEFİNİTİON, FUNCTİONS, ADVANTAGES AND RİSKS“. Підприємництво і торгівля, Nr. 30 (01.07.2021): 5–10. http://dx.doi.org/10.36477/2522-1256-2021-30-01.

Der volle Inhalt der Quelle
Annotation:
The emergence of “virtual currencies” is extremely recent, with a history of only 13 years. Being an ultra-new economic tool, it arouses interest and effervescent reactions, especially in terms of definition, but also about the cumulative effects it has begun to produce in the economic world. The subject also becomes controversial due to the fact that, being an economic instrument of absolute novelty, it is reflected in the legislation of very few countries in the world. One of the definitions determines as virtual currency – the digital representation of the value that is not issued or guaranteed by a central bank or a public authority, which is not necessarily linked to a legal currency and which does not have the legal status of the currency, but which can be accepted by natural or legal persons as a means of exchange and which may be transferred, stored and traded by electronic means. The evaluation of cryptocurrency publications has shown that most of them are related to attempts to establish legislative agricultural work for the operation of virtual currencies. The functions of the cryptocurrencies that we have defined are: the exchange and payment function, the hoarding function, the investment function and the attraction of funds necessary for the activity. Thus, we established that virtual currencies, as well as fiduciary ones, have the role of: means of payment, means of accumulation, means of capitalization and investments. Likewise, through this research we managed to highlight the main features and peculiarities of cryptocurrencies. Among the basic characteristics of cryptocurrencies we highlight: the high degree of security, maximum speed of transactions, full freedom from financial organizations, irreversibility of operations, full anonymity of transactions, open source, they can be ”mined”. Another approach was to determine the advantages and disadvantages and risks of using cryptocurrencies. The main advantages of using cryptocurrencies are related to its functions an caracteristics, such as: it represents a real alternative to classic banking services, market freedom, privacy of transactions, high speed of trnasactions, alternative payment methos, increasing the customer base etc. On the other hand there are some disatvantages. They are related mosly with the following risks: legal uncertainty, market volatility, low degree of acceptance, unsecured crypto wallets, risks related to use for illegal or criminal purposes, money laundering risks. Taking in consideration the global trend of the digitization of the society, the share and importance of fiat currencies will tend to decrease for the benefit of virtual currencies. Cryptocurrencies are becoming a real alternative to physical currencies, but its main disadvantage is that the public autorities are missing controlling it yet. Even so, in the nearest future the money could become digital figures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Pérez-Solà, C., S. Delgado-Segura, G. Navarro-Arribas und J. Herrera-Joancomartí. „Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies“. Royal Society Open Science 6, Nr. 1 (Januar 2019): 180817. http://dx.doi.org/10.1098/rsos.180817.

Der volle Inhalt der Quelle
Annotation:
Unspent Transaction Outputs (UTXOs) are the internal mechanism used in many cryptocurrencies to represent coins. Such representation has some clear benefits, but also entails some complexities that, if not properly handled, may leave the system in an inefficient state. Specifically, inefficiencies arise when wallets (the software responsible for transferring coins between parties) do not manage UTXOs properly when performing payments. In this paper, we study three cryptocurrencies: Bitcoin, Bitcoin Cash and Litecoin, by analysing the state of their UTXO sets, that is, the status of their sets of spendable coins. These three cryptocurrencies are the top-3 UTXO-based cryptocurrencies by market capitalization. Our analysis shows that the usage of each cryptocurrency presents some differences, and led to different results. Furthermore, it also points out that the management of the transactions has not always been performed efficiently and therefore, the current state of the UTXO sets is far from ideal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Efimova, L. G. „The mechanism of credit transfers via the Blockchain“. International Accounting 23, Nr. 5 (15.05.2020): 567–84. http://dx.doi.org/10.24891/ia.23.5.567.

Der volle Inhalt der Quelle
Annotation:
Subject. Money transfers via Blockchain-based banking and payment systems employ a procedure combining the traditional mechanism of gross settlements and P2P network, which is also run with the Blockchain. Therefore, the relationship between payment peers is mixed too. Objectives. The study aims to set up a legal mechanism of credit transfers which synergistically combines two payment procedures, i.e. traditional gross settlements via the national banking system and P2P payments based on the Blockchain. Methods. The study relies upon systemic-structural, dialectical, logic methods, induction, deduction, legal forecast, legal modeling and comparative method (legal comparison). Results. I examine how advantages of Blockchain-based payment systems and banking payment systems can be combined. This will streamline and smooth settlements, allowing to use the fiat currency in the beginning and at the end of credit transfers. The article highlights four phases of a mixed money transfer, i.e. the preliminary creation of a Blockchain-based node, accession to the protocol, opening of cryptocurrency accounts and e-wallets; the commencement of a money transfer under traditional rules of payment laws; interbanking settlements via the Blockchain and crediting of money under ordinary rules of the payment laws. Conclusions and Relevance. When credit transfers migrate from conventional bank accounts to the Blockchain, the fiat currency converts into the cryptocurrency and vice versa. I analyzed types of social relations emerging through the above phases and sources of legal regulations. The findings can be used in the theory of civil and banking laws, law making processes for the preparation of regulatory documents on cashless payments, and IT regulations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Cryptocurrency Wallets"

1

Schmid, Philipp, und Sabine Houy. „Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44798.

Der volle Inhalt der Quelle
Annotation:
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting in the growing adoption of so-called cryptocurrency wallet applications, as these simplify carrying out transactions. These wallets are available in a myriad of different forms and specifications. For example, there are hardware and software wallets. The latter can be divided into mobile, web, and desktop wallets. All of them offer attackers various ways to exploit vulnerabilities and steal money from victims. It is hard to keep track of this multitude of options and thus choose the right cryptocurrency wallet. For this reason, in this thesis, we collect the findings from previous literature to provide an overview of the various attack surfaces, possible countermeasures, and further research. Our systematic study has shown that there is still a considerable variety of attack vectors, which we have divided into six subcategories, (i) Memory and Storage, (ii) Operating Systems, (iii) Software Layer, (iv) Network Layer, (v) Blockchain Protocol, and (vi) Others. Some of the identified vulnerabilities have currently no solutions at all or hardly applicable countermeasures. However, some are easy to fix and simple to implement. One of the essential measures is to raise awareness of the identified weaknesses and the associated mitigations, if any, among the involved stakeholders, including users, developers, and exchanges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Lindqvist, Gunnar. „Nyckelhantering för bitcoin : En studie om hur användare hanterar privata nycklar och hur säkerheten kan förbättras“. Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18817.

Der volle Inhalt der Quelle
Annotation:
Bitcoin har framträtt som den mest igenkännbara kryptovalutan sedan igångsättningen 2009 och har vid skrivande tillfälle ett börsvärde på 1,6 biljoner svenska kronor. Detta ihop med den ekonomiska friheten som Bitcoin erbjuder gör att användarantalet ständigt ökar. Likt all ny teknik så tar det tid innan teknologin är fullt utvecklad och anpassad för den bredda massan. I följd av detta kan säkerheten lida vilket kan resultera till ekonomiska förluster. Denna forskningsinsats undersöker vad för åtgärder och strategier som kan användas för att öka säkerheten via en litteraturstudie. Insatsen undersöker även med hjälp av en enkätundersökning ställd till ett Bitcoin-forum om hur användare av Bitcoin hanterar sina privata nycklar. Arbetet visar att det finns åtgärder som bidrar till ökad säkerhet såsom kryptering och multisignatur men att det hänger mycket på vad användarna själva väljer för typ av bäst strategi för deras användningsområde. Enkätundersökning redovisar att majoriteten av användarna gör säkerhetsmedvetna beslut för hur de använder Bitcoin men att en andel nyttjar mindre önskade tillvägagångssätt.
Bitcoin has emerged as the most recognizable cryptocurrency since its inception in 2009 and, at the time of writing has a market capitalization of 165 billion dollars. This together with the financial freedom that Bitcoin offers means that the number of users is constantly increasing. Like all new technology, it takes time for the technology to be fully developed and adapted to the wider mass. As a result, security can suffer which can result in financial losses. This research effort explores what measures and strategies can be used to increase safety through a literature study. The effort also investigates with the help of a survey conducted at a Bitcoin forum on how users of Bitcoin manage their private keys. The work shows that there are measures that contribute to increased security such as encryption and multi-signature but that much depends on what the users themselves choose for the type of best strategy for their area of use. The survey shows that the majority of users make security-conscious decisions about how to use Bitcoin but that aproportion uses less desirable approaches.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Rasool, Muhammad Ahsan, und Shafiq Hafiz Muhammad. „Blockchain Technology : a new domain for Cyber Forensics“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.

Der volle Inhalt der Quelle
Annotation:
Traditional database with no prior security measures is becoming challenging in the era of data technology. Database storage on a central location with single point of failure and vulnerable to cyber attacks is getting exposed to big risk of being hacked with the evolution of powerful machines and modern hacking techniques. Since its commencement, the BlockChain technology has shown a promising performance for application buildup in diversed fields of life from cryptocurrency to smart contracts and decentralized applications. Although multiple studies on privacy, data confidentiality and security issues of BlockChain are performed but a systematic examination is still needs attention. In this thesis work we conduct a systematic study about the vulnerabilities of BlockChain system and review the security enhancement solutions that may point to a good future direction for further research into the area of BlockChain technology and its applications. Smart contracts are self-executable objects hosted on the 2nd generation blockchain like Ethereum, carry billions of SEK worth of cryptocoins and cannot be updated once deployed. Smart contracts are generally considered secure objects but the systematic analysis of technology and source code exposes a new class of vulnerabilities which are more likely an ethical aspect of programming than the software coding errors. Besides the literature review we empower our results with a static code analysis especially with the perspective of cyber forensics.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

DRDÁK, František. „Rozbor a návrh aplikace pro digitální měnu Bitcoin“. Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-188109.

Der volle Inhalt der Quelle
Annotation:
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Cryptocurrency Wallets"

1

Markwood, Vivienne. Cryptocurrency Paper Wallet: Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Markwood, Vivienne. Cryptocurrency Keys Logbook: Paper Wallet Key Backup Notebook for Cryptocurrency 12 /24 Keys, Small, Easy to Hide Password Logbook. Independently Published, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Norman, Alan T. Mastering Bitcoin for Starters: Bitcoin and Cryptocurrency Technologies, Mining, Investing and Trading - Bitcoin Book 1, Blockchain, Wallet, Business. CreateSpace Independent Publishing Platform, 2017.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Cryptocurrency Wallets"

1

Kiktenko, E. O., M. A. Kudinov und A. K. Fedorov. „Detecting Brute-Force Attacks on Cryptocurrency Wallets“. In Business Information Systems Workshops, 232–42. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36691-9_20.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Moniruzzaman, Md, Farida Chowdhury und Md Sadek Ferdous. „Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets“. In Cyber Security and Computer Science, 631–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52856-0_50.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Chaum, David, Mario Larangeira, Mario Yaksetig und William Carter. „$$\text{ W-OTS}^{+}$$ Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets“. In Applied Cryptography and Network Security, 195–219. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78372-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Faridi, Adeela, und Farheen Siddiqui. „Improving SPV-Based Cryptocurrency Wallet“. In Cybernetics, Cognition and Machine Learning Applications, 127–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Antipova, Tatiana, und Irina Emelyanova. „Cryptocurrency in Digital Wallet: Pros and Cons“. In Advances in Intelligent Systems and Computing, 313–22. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02351-5_36.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Leguesse, Yonas, Mark Vella, Christian Colombo und Julio Hernandez-Castro. „Reducing the Forensic Footprint with Android Accessibility Attacks“. In Security and Trust Management, 22–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_2.

Der volle Inhalt der Quelle
Annotation:
Abstract Android accessibility features include a robust set of tools allowing developers to create apps for assisting people with disabilities. Unfortunately, this useful set of tools can also be abused and turned into an attack vector, providing malware with the ability to interact and read content from third-party apps. In this work, we are the first to study the impact that the stealthy exploitation of Android accessibility services can have on significantly reducing the forensic footprint of malware attacks, thus hindering both live and post-incident forensic investigations. We show that through Living off the Land (LotL) tactics, or by offering a malware-only substitute for attacks typically requiring more elaborate schemes, accessibility-based malware can be rendered virtually undetectable. In the LotL approach, we demonstrate accessibility-enabled SMS and command and control (C2) capabilities. As for the latter, we show a complete cryptocurrency wallet theft, whereby the accessibility trojan can hijack the entire withdrawal process of a widely used app, including two-factor authentication (2FA). In both cases, we demonstrate how the attacks result in significantly diminished forensic evidence when compared to similar attacks not employing accessibility tools, even to the extent of maintaining device take-over without requiring malware persistence.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Al Shibli, Murad. „Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC)“. In Encyclopedia of Criminal Activities and the Deep Web, 1089–111. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch075.

Der volle Inhalt der Quelle
Annotation:
This article presents an integrated secured framework of blockchain and bitcoin cryptology with the artificial intelligence of neural networks and machine learning. Recently blockchain has received special attention and been used as a new platform for digital information and to store encrypted data and process secure digital transactions. Furthermore, data on blockchain and bitcoin platforms are assumed to be highly encrypted and secured. Although blockchain and bitcoin databases are encrypted using private keys, many cryptocurrency bitcoin wallets have been reported hacked, which has resulted in losing millions of dollars. The artificial intelligent neural networks (AINN) algorithms possess the capability features of processing and operating encrypted data and will lead to minimal risk as a part of the blockchain to protect personal data and information as third wall defense against hacking. Simulation results and analysis demonstrates the effectiveness of this technique for protecting personal data and financial information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chowdhury, Niaz. „Cryptocurrency Wallet“. In Inside Blockchain, Bitcoin, and Cryptocurrencies, 233–47. Auerbach Publications, 2019. http://dx.doi.org/10.1201/9780429325533-14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Cryptocurrency Wallets"

1

Rezaeighaleh, Hossein, und Cliff C. Zou. „New Secure Approach to Backup Cryptocurrency Wallets“. In GLOBECOM 2019 - 2019 IEEE Global Communications Conference. IEEE, 2019. http://dx.doi.org/10.1109/globecom38437.2019.9014007.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Li, Cong, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan und Yao Cheng. „Android-based Cryptocurrency Wallets: Attacks and Countermeasures“. In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Khadzhi, Andrey S., Sergey V. Zareshin und Oleg V. Tarakanov. „A Method for Analyzing the Activity of Cold Wallets and Identifying Abandoned Cryptocurrency Wallets“. In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2020. http://dx.doi.org/10.1109/eiconrus49466.2020.9039145.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Guri, Mordechai. „BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets“. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00227.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Urien, Pascal. „Crypto Terminal: A New Open Device For Securing Blockchain Wallets“. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169410.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hardjono, Thomas. „Future Directions for Regulated Private Wallets and VASP Trust Infrastructures“. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2021. http://dx.doi.org/10.1109/icbc51069.2021.9461141.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Voskobojnikov, Artemij, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth und Konstantin (Kosta) Beznosov. „The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets“. In CHI '21: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3411764.3445407.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Suratkar, Saurabh, Mahesh Shirole und Sunil Bhirud. „Cryptocurrency Wallet: A Review“. In 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE, 2020. http://dx.doi.org/10.1109/icccsp49186.2020.9315193.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Rezaeighaleh, Hossein, und Cliff C. Zou. „Multilayered Defense-in-Depth Architecture for Cryptocurrency Wallet“. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc51575.2020.9345013.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

di Angelo, Monika, und Gernot Slazer. „Wallet Contracts on Ethereum“. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169467.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie