Academic literature on the topic 'Bitcore Node'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bitcore Node.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Bitcore Node"

1

Zhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation." International Journal of Mathematical, Engineering and Management Sciences 6, no. 2 (April 1, 2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.

Full text
Abstract:
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of these applications, it is pivotal to model and evaluate dependability of the block chain-based systems, contributing to their reliable and robust operation. This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. Built upon the block chain technology, the Bitcoin is a peer-to-peer cryptocurrency system enabling an individual user to trade freely without the involvement of banks or any other types of intermediate agents. However, a node in the Bitcoin is vulnerable to the Eclipse attack, which aims to monopolize the information flow of the victim node. A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process. The SMP model is then evaluated to determine the steady-state dependability of the Bitcoin node. Numerical examples are provided to demonstrate the influence of the time to restart the Bitcoin software and time to detect and delete the malicious message on the Bitcoin node dependability.
APA, Harvard, Vancouver, ISO, and other styles
2

Pazmiño, Juan Eduardo, and Carlo Kleber da Silva Rodrigues. "Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time." SIJ Transactions on Computer Networks & Communication Engineering 03, no. 01 (February 5, 2015): 01–05. http://dx.doi.org/10.9756/sijcnce/v3i1/03020020101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Haija, Qasem Abu, and Abdulaziz A. Alsulami. "High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks." Electronics 10, no. 17 (August 31, 2021): 2113. http://dx.doi.org/10.3390/electronics10172113.

Full text
Abstract:
The Bitcoin cryptocurrency is a worldwide prevalent virtualized digital currency conceptualized in 2008 as a distributed transactions system. Bitcoin transactions make use of peer-to-peer network nodes without a third-party intermediary, and the transactions can be verified by the node. Although Bitcoin networks have exhibited high efficiency in the financial transaction systems, their payment transactions are vulnerable to several ransomware attacks. For that reason, investigators have been working on developing ransomware payment identification techniques for bitcoin transactions’ networks to prevent such harmful cyberattacks. In this paper, we propose a high performance Bitcoin transaction predictive system that investigates the Bitcoin payment transactions to learn data patterns that can recognize and classify ransomware payments for heterogeneous bitcoin networks. Specifically, our system makes use of two supervised machine learning methods to learn the distinguishing patterns in Bitcoin payment transactions, namely, shallow neural networks (SNN) and optimizable decision trees (ODT). To validate the effectiveness of our solution approach, we evaluate our machine learning based predictive models on a recent Bitcoin transactions dataset in terms of classification accuracy as a key performance indicator and other key evaluation metrics such as the confusion matrix, positive predictive value, true positive rate, and the corresponding prediction errors. As a result, our superlative experimental result was registered to the model-based decision trees scoring 99.9% and 99.4% classification detection (two-class classifier) and accuracy (multiclass classifier), respectively. Hence, the obtained model accuracy results are superior as they surpassed many state-of-the-art models developed to identify ransomware payments in bitcoin transactions.
APA, Harvard, Vancouver, ISO, and other styles
4

Schreiber, Zvi. "k-Root-n: An Efficient Algorithm for Avoiding Short Term Double-Spending Alongside Distributed Ledger Technologies such as Blockchain." Information 11, no. 2 (February 7, 2020): 90. http://dx.doi.org/10.3390/info11020090.

Full text
Abstract:
Blockchains such as the bitcoin blockchain depend on reaching a global consensus on the distributed ledger; therefore, they suffer from well-known scalability problems. This paper proposes an algorithm that avoids double-spending in the short term with just O(√n) messages instead of O(n); each node receiving money off-chain performs the due diligence of consulting k√n random nodes to check if any of them is aware of double-spending. Two nodes receiving double-spent money will in this way consult at least one common node with very high probability, because of the ‘birthday paradox’, and any common honest node consulted will detect the fraud. Since the velocity of money in the real world has coins circulating through at most a few wallets per day, the size of the due diligence communication is small in the short term. This ‘k-root-n’ algorithm is suitable for an environment with synchronous or asynchronous (but with fairly low latency) communication and with Byzantine faults. The presented k-root-n algorithm should be practical to avoid double-spending with arbitrarily high probability, while feasibly coping with the throughput of all world commerce. It is resistant to Sybil attacks even beyond 50% of nodes. In the long term, the k-root-n algorithm is less efficient. Therefore, it should preferably be used as a complement, and not a replacement, to a global distributed ledger technology.
APA, Harvard, Vancouver, ISO, and other styles
5

Ge, Lin, and Tao Jiang. "A Privacy Protection Method of Lightweight Nodes in Blockchain." Security and Communication Networks 2021 (July 15, 2021): 1–17. http://dx.doi.org/10.1155/2021/2067137.

Full text
Abstract:
Aiming at the privacy protection of lightweight nodes based on Bloom filters in blockchain, this paper proposes a new privacy protection method. Considering the superimposition effect of query information, node and Bloom filter are regarded as the two parties of the game. A privacy protection mechanism based on the mixed strategy Nash equilibrium is proposed to judge the information query. On this basis, a Bloom filter privacy protection algorithm is proposed when the probability of information query and privacy, not being leaked, is less than the node privacy protection. It is based on variable factor disturbance, adjusting the number of bits’ set to 1 in the Bloom filter to improve the privacy protection performance in different scenarios. The experiment uses Bitcoin transaction data from 2009 to 2019 as the test data to verify the effectiveness, reliability, and superiority of the method.
APA, Harvard, Vancouver, ISO, and other styles
6

Motlagh, Saeideh G., Jelena Misic, and Vojislav B. Misic. "Impact of Node Churn in the Bitcoin Network." IEEE Transactions on Network Science and Engineering 7, no. 3 (July 1, 2020): 2104–13. http://dx.doi.org/10.1109/tnse.2020.2974739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Jiangdong, and Wei Cao. "Bitcoin mining, the way to process transaction information or the way to make money?" INSIST 4, no. 1 (April 1, 2019): 191. http://dx.doi.org/10.23960/ins.v4i1.191.

Full text
Abstract:
Bitcoin is a crypto currency introduced by Satoshi Nakamoto in 2008. It has the features of decentralization cross-border and fixed total amount and has become one of the most widely used crypto-currencies. Bitcoin, as a new digital currency system, innovatively makes the use of cryptographic elements and consensus mechanisms and builds up a secure decentralized system. The Blockchain, as the core of Bitcoin, uses peer-to-peer network communications and backs up transaction data in every node of the system, thus creating a huge distributed public book. It is essentially a decentralized distributed ledger database, and the decentralization means that the transaction is broadcast to the entire network, where everyone is involved in book keeping. In order to make every participant in the Blockchain willing to participate in the bookkeeping, the reward mechanism of the Bitcoin system is mining. This article first introduces the concept of Blockchain technology, then expounds the principle and the operation mechanism of the Bitcoin and the Bitcoin mining principle, introduces an example of Bitcoin mining in-depth study and analysis, finally, summarize and prospect the development of the Bitcoin mining.
APA, Harvard, Vancouver, ISO, and other styles
8

Zize, Zhang. "Analysis on Criminal Governance of Bitcoin-related Corruption Cases." Economics, Law and Policy 4, no. 1 (May 28, 2021): p37. http://dx.doi.org/10.22158/elp.v4n1p37.

Full text
Abstract:
Bitcoin is extremely easy to be used in corruption cases due to its pseudonym, easy circulation, easy cross-border and other characteristics. As a decentralized electronic account book, the circulation of regulatory funds is jointly confirmed by each node in the bitcoin network, which can ensure the authenticity of the criminal evidence and is not easy to be lost or damaged. It provides great convenience for evidence collection in bitcoin corruption cases. However, there are also shackles in criminal governance, such as how to prove the subjective intent of the bribe takers, the impact of fluctuations in market value on the identification of the case and, most importantly, how to effectively recover stolen goods across borders. Therefore, the difficulty of bitcoin-related cases does not lie in the “anonymity” that some scholars believe, but lies in the determination of subjective intent, the determination of the amount of the crime and the international judicial assistance in recovering the stolen money.
APA, Harvard, Vancouver, ISO, and other styles
9

Oggier, Frédérique, Silivanxay Phetsouvanh, and Anwitaman Datta. "A split-and-transfer flow based entropic centrality." PeerJ Computer Science 5 (September 16, 2019): e220. http://dx.doi.org/10.7717/peerj-cs.220.

Full text
Abstract:
The notion of entropic centrality measures how central a node is in terms of how uncertain the destination of a flow starting at this node is: the more uncertain the destination, the more well connected and thus central the node is deemed. This implicitly assumes that the flow is indivisible, and at every node, the flow is transferred from one edge to another. The contribution of this paper is to propose a split-and-transfer flow model for entropic centrality, where at every node, the flow can actually be arbitrarily split across choices of neighbours. We show how to map this to an equivalent transfer entropic centrality set-up for the ease of computation, and carry out three case studies (an airport network, a cross-shareholding network and a Bitcoin transactions subnetwork) to illustrate the interpretation and insights linked to this new notion of centrality.
APA, Harvard, Vancouver, ISO, and other styles
10

Le, Duc V., Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate. "A Tale of Two Trees: One Writes, and Other Reads." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 519–36. http://dx.doi.org/10.2478/popets-2020-0039.

Full text
Abstract:
AbstractThe Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind. Although the simplified payment verification (SPV) clients can address this storage issue, a Bitcoin SPV client has to rely on other Bitcoin nodes to obtain its transaction history and the current approaches offer no privacy guarantees to the SPV clients.This work presents T3, a trusted hardware-secured Bitcoin full client that supports efficient oblivious search/update for Bitcoin SPV clients without sacrificing the privacy of the clients. In this design, we leverage the trusted execution and attestation capabilities of a trusted execution environment (TEE) and the ability to hide access patterns of oblivious random access machine (ORAM) to protect SPV clients’ requests from potentially malicious nodes. The key novelty of T3 lies in the optimizations introduced to conventional ORAM, tailored for expected SPV client usages. In particular, by making a natural assumption about the access patterns of SPV clients, we are able to propose a two-tree ORAM construction that overcomes the concurrency limitation associated with traditional ORAMs. We have implemented and tested our system using the current Bitcoin Unspent Transaction Output (UTXO) Set. Our experiment shows that T3 is feasible to be deployed in practice while providing strong privacy and security guarantees to Bitcoin SPV clients.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Bitcore Node"

1

Gallovič, Ľubomír. "Knihovna pro abstrakci práce s blockchainy kryptoměn." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403150.

Full text
Abstract:
This thesis deals with cryptocurrencies and the underlying principles they are based on. It describes the blockchain technology and explores various cryptocurrencies that utilize it with the focus on their similarities and differences. The next part analyzes InsightAPI, the existing tool for real-time Bitcoin blockchain exploration. It then describes the proposed solution for the Ethereum blockchain explorer, highlights the implementation details, and shows results of its testing. The created tool allows the user to quickly gather information about desired blocks, users, and transactions of the Ethereum blockchain.
APA, Harvard, Vancouver, ISO, and other styles
2

DRDÁK, František. "Rozbor a návrh aplikace pro digitální měnu Bitcoin." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-188109.

Full text
Abstract:
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Bitcore Node"

1

Brakmić, Harris. Bitcoin and Lightning Network on Raspberry Pi: Running Nodes on Pi3, Pi4 and Pi Zero. Apress, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Bitcore Node"

1

Gao, Junying, Bo Li, and Zhihuai Li. "Blockchain Storage Analysis and Optimization of Bitcoin Miner Node." In Lecture Notes in Electrical Engineering, 922–32. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6508-9_112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Yu, Runan Tan, Xiangyi Kong, Qingfeng Tan, and Xiangtao Liu. "Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn." In Lecture Notes in Computer Science, 385–95. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24268-8_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mastan, Indra Deep, and Souradyuti Paul. "A New Approach to Deanonymization of Unreachable Bitcoin Nodes." In Cryptology and Network Security, 277–98. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02641-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bag, Samiran, and Kouichi Sakurai. "Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools." In Lecture Notes in Computer Science, 167–80. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45871-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Imamura, Mitsuyoshi, and Kazumasa Omote. "Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor." In Information Security Applications, 117–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nishibe, Makoto. "Money as “The Self-Fulfillment of an Idea”: The Difference Between a Bank of Japan Note and Bitcoin." In The Enigma of Money, 37–58. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1819-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alves, Davi. "The Impact of Denial-of-Service Attack for Bitcoin Miners, Lisk Forgers, and a Mitigation Strategy for Lisk Forgers." In Cybersecurity Threats with New Perspectives [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97062.

Full text
Abstract:
Bandwidth depletion Denial-of-Service (DoS) attack can impact the propagation of a mined block in the Bitcoin blockchain network. On Bitcoin Proof-of-Work (PoW) consensus several machines try to resolve an expensive cryptographic puzzle faster than anyone else and succeed to mine a valid block. Despite a DoS attack impedes one machine to propagate its mined block allowing it to become valid for most peers, there will be several other peers to resolve the puzzle in time, hence the blockchain will continue to grow. However, from the perspective of the owner of the attacked machine, this can be critical because it will not receive a mining reward. This chapter covers such an attack in the Lisk blockchain that utilizes the Delegated Proof of Stake (DPoS) consensus mechanism. A mitigation strategy was created based on two tools that I have created allowing a delegate account to be configured in more than one node, allowing to forge a block even when one of its nodes is under DoS attack. Also, the transaction flood DoS attack is explored, and a mitigation strategy was created for a specific sidechain in the Lisk ecosystem. The mitigation strategy identifies spam transactions and rejects them to be included on the Lisk nodes transaction pool, hence they will not be propagated into the blockchain. Towards the end, I evaluated scenarios and mitigation strategies created for each attack demonstrating solutions for several scenarios.
APA, Harvard, Vancouver, ISO, and other styles
8

Parkin, Jack. "Grounding Cryptocurrencies." In Money Code Space, 119–60. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197515075.003.0007.

Full text
Abstract:
Chapter 6 documents a more specific and exploratory follow the thing research technique to uncover the digital-material architecture of Bitcoin. Treating the Bitcoin code as both a text and material, a single bitcoin is followed through the decentralised protocol “from” Australia “to” the United States. By tracing the spatial relationships between miscellaneous paraphernalia that facilitate the transaction, from proprietary software to Bitcoin mining rigs, the chapter navigates the material culture of the Bitcoin blockchain. This involves opening up source code for inspection to uncover the functional performativity of the network. The spatial lens used reveals several material infrastructures such as undersea cables, data centres, pools of Bitcoin mines, active nodes, and third-party wallet software, that assemble to form operational modes of centralisation.
APA, Harvard, Vancouver, ISO, and other styles
9

Elbaghdadi, Abdelaziz, Soufiane Mezroui, and Ahmed El Oualkadi. "K-Nearest Neighbors Algorithm (KNN)." In Advances in Business Information Systems and Analytics, 161–78. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5781-5.ch008.

Full text
Abstract:
The cryptocurrency is the first implementation of blockchain technology. This technology provides a set of tracks and innovation in scientific research, such as use of data either to detect anomalies either to predict price in the Bitcoin and the Ethereum. Furthermore, the blockchain technology provide a set of technique to automate the business process. This chapter presents a review of some research works related to cryptocurrency. A model with a KNN algorithm is proposed to detect illicit transaction. The proposed model uses both the elliptic dataset and KNN algorithm to detect illicit transaction. Furthermore, the elliptic dataset contains 203,769 nodes and 234,355 edges; it allows to classify the data into three classes: illicit, licit, or unknown. Each node has associated 166 features. The first 94 features represent local information about the transaction. The remaining 72 features are called aggregated features. The accuracy exceeded 90% with k=2 and k=4, the recall reaches 56% with k=3, and the precision reaches 78% with k=4.
APA, Harvard, Vancouver, ISO, and other styles
10

Manoj, M. K., and Somayaji Siva Rama Krishnan. "Decentralizing Privacy Using Blockchain to Protect Private Data and Challanges With IPFS." In Transforming Businesses With Bitcoin Mining and Blockchain Applications, 207–20. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0186-3.ch012.

Full text
Abstract:
Blockchain technology is a distributed framework for sharing data that is validated through cryptographic functions. The nodes of the network come to a consensus regarding addition of data to the blockchain. Every blockchain operation requires a processing fee. This fee makes storing of large data on the blockchain infeasible. An indirect alternative for this challenge could be use of IPFS, which is a decentralized peer-peer network that facilitates storage of file. This is accomplished by storing the hash of the IPFS as data on the blockchain.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Bitcore Node"

1

Essaid, Meryam, Hyeon Woo Kim, Woo Guil Park, Ki Young Lee, Se Jin Park, and Hong Taek Ju. "Network Usage of Bitcoin Full Node." In 2018 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2018. http://dx.doi.org/10.1109/ictc.2018.8539723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abe, Ryosuke, Shigeya Suzuki, and Jun Murai. "Mitigating Bitcoin Node Storage Size By DHT." In AINTEC '18: ASIAN INTERNET ENGINEERING CONFERENCE. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3289166.3289169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Xiaojiao, Sianjheng Lin, and Nenghai Yu. "Bitcoin Blockchain Compression Algorithm for Blank Node Synchronization." In 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2019. http://dx.doi.org/10.1109/wcsp.2019.8928104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xiaomeng, Jiang, Zhang Fan, Lin Shenwen, Yang Jinglin, and He Ketai. "Data Analysis of Bitcoin Blockchain Network Nodes." In 2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2020. http://dx.doi.org/10.1109/iciea48937.2020.9248092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Motlagh, Saeideh G., Jelena Misic, and Vojislav B. Misic. "Impact of Node Churn in the Bitcoin Network with Compact Blocks." In GLOBECOM 2020 - 2020 IEEE Global Communications Conference. IEEE, 2020. http://dx.doi.org/10.1109/globecom42002.2020.9347971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Franzoni, Federico, and Vanesa Daza. "Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cordeiro, Ramon, Leonardo Barbosa da Costa, and Antônio Jorge Gomes Abelém. "Solução de Nodos de Baixo Armazenamento para o Futuro da Internet." In X Workshop de Pesquisa Experimental da Internet do Futuro. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wpeif.2019.7695.

Full text
Abstract:
In blockchain, full nodes (FNs) store all existing transactions and are responsible for validating new blocks. The amount of data stored by FNs has been increasing significantly in popular blockchains, such as that of Bitcoin. The excessive amount of data from blockchains increases the storage and processing overhead in FNs, which may cause a reduction in the number of devices that validate and store blockchain data. Also, it may put the decentralization principle of blockchain in risk. This paper proposes a less expensive data storage mechanism for blockchain FNs. The proposed mechanism aims to reduce the storage and processing overhead in FNs, and to guarantee the decentralization characteristic of the network.
APA, Harvard, Vancouver, ISO, and other styles
8

Turner, Adam, Stephen Mccombie, and Allon Uhlmann. "Follow the money: Revealing risky nodes in a Ransomware-Bitcoin network." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2021. http://dx.doi.org/10.24251/hicss.2021.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sallal, Muntadher, Gareth Owenson, and Mo Adda. "Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network." In 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2020. http://dx.doi.org/10.1109/iscc50000.2020.9219564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sallal, Muntadher, Gareth Owenson, and Mo Adda. "Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network." In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2020. http://dx.doi.org/10.1109/icbc48266.2020.9169393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography