Literatura académica sobre el tema "Permissionless Blockchain"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Permissionless Blockchain".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Permissionless Blockchain"
Zhang, Xiaohui, Mingying Xue y Xianghua Miao. "A Consensus Algorithm Based on Risk Assessment Model for Permissioned Blockchain". Wireless Communications and Mobile Computing 2022 (26 de agosto de 2022): 1–21. http://dx.doi.org/10.1155/2022/8698009.
Texto completoCerezo Sánchez, David. "Pravuil: Global Consensus for a United World". FinTech 1, n.º 4 (31 de octubre de 2022): 325–44. http://dx.doi.org/10.3390/fintech1040025.
Texto completoAgarwal, Rachit, Tanmay Thapliyal y Sandeep Shukla. "Analyzing Malicious Activities and Detecting Adversarial Behavior in Cryptocurrency based Permissionless Blockchains: An Ethereum Usecase". Distributed Ledger Technologies: Research and Practice 1, n.º 2 (10 de diciembre de 2022): 1–21. http://dx.doi.org/10.1145/3549527.
Texto completoHeo, Hwanjo y Seungwon Shin. "Understanding Block and Transaction Logs of Permissionless Blockchain Networks". Security and Communication Networks 2021 (3 de agosto de 2021): 1–18. http://dx.doi.org/10.1155/2021/9549602.
Texto completoHelliar, Christine V., Louise Crawford, Laura Rocca, Claudio Teodori y Monica Veneziani. "Permissionless and permissioned blockchain diffusion". International Journal of Information Management 54 (octubre de 2020): 102136. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102136.
Texto completoSeira, Amber, Jeffrey Allen, Cy Watsky y Richard Alley. "Governance of Permissionless Blockchain Networks". FEDS Notes, n.º 2024-02-09 (febrero de 2024): None. http://dx.doi.org/10.17016/2380-7172.3443.
Texto completoBezuidenhout, Riaan, Wynand Nel y Jacques Maritz. "Defining Decentralisation in Permissionless Blockchain Systems". African Journal of Information and Communication (AJIC), n.º 29 (3 de julio de 2022): 1–24. http://dx.doi.org/10.23962/ajic.i29.14247.
Texto completoGrodzicka, Hanna, Michal Kedziora y Lech Madeyski. "Cloud Solutions for Private Permissionless Blockchain Deployment". Computing and Informatics 40, n.º 4 (2021): 880–96. http://dx.doi.org/10.31577/cai_2021_4_880.
Texto completoMATTILA, VILMA, PRATEEK DWIVEDI, PRATIK GAURI y MD AHBAB. "HOMOMORPHIC ENCRYPTION IN 5IRE BLOCKCHAIN". International Journal of Social Sciences and Management Review 05, n.º 02 (2022): 264–76. http://dx.doi.org/10.37602/ijssmr.2022.5219.
Texto completoLuo, Bin y Changlin Yang. "AeRChain: An Anonymous and Efficient Redactable Blockchain Scheme Based on Proof-of-Work". Entropy 25, n.º 2 (1 de febrero de 2023): 270. http://dx.doi.org/10.3390/e25020270.
Texto completoTesis sobre el tema "Permissionless Blockchain"
Harz, Dominik. "Trust and verifiable computation for smart contracts in permissionless blockchains". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209430.
Texto completoBlockchains adresserar tillit genom kryptografi och konsensus. Bitcoin är den första digitala valutan utan betrodda agenter. Ethereum utökar denna teknik genom att möjliggöra agenter i blockchain, via smart contracts. En systemisk förtroende modell för smart contracts i blockchains saknas emellertid. Denna avhandling beskriver ekosystemet för smarta kontrakt som ett öppet multi-agent system. En förtroendemodell introducerar social kontroll genom inlåning och granskningsagenter. Tillitrelaterade attribut kvantifieras i 2,561 smart contracts från GitHub. De använder ett medelvärde av tre variabler och funktioner med en av tio som har en säkerhetsre-laterad fråga. Dessutom blockchains begränsa beräkningsuppgifter. Att lösa dessa begränsningar samtidigt som du behåller förtroendet kräver kontrollerbar beräkning. En algoritm för verifierbar beräkning utvecklas och implementeras i Solidity. Den använder en arbiter som tillämpar algoritmen, computation services som tillhandahåller och verifierar lösningar och en judge som bedömer lösningar. Experiment utförs med 1000 iterationer för en till sex verifierare med en snyggare sannolikhet för 30%, 50% och 70%. Algoritmen visar linjär komplexitet för heltalsmultiplicering. Verifieringen beror på fuskans tidigare sannolikhet och antal verifierare. I experimenten är sex verifierare tillräckliga för att detektera alla cheaters för de tre tidigare sannolikheterna.
Khacef, Kahina. "Trade-off betweew security and scalability in blockchain systems". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS516.
Texto completoThe development of Blockchain has enabled the emergence of high technology in the sensitive and active sectors by allowing the reliability of information via consensus, the immutability of records, and transaction transparency. This thesis presents the design, implementation, and evaluation of techniques to scale the blockchain. The first part of this thesis consists of building a decentralized, secure peer-to-peer messaging protocol using a PKI-based blockchain, which can be an email, a website, or some other form of message. Managing users’ identities by the Blockchain eliminates the single point of failure of traditional PKIs. By using smart contracts to validate, store and revoke the certificate on a public blockchain. Security and scalability are considered two significant challenges in blockchains’ rapid and smooth deployment in businesses, enterprises, and organizations. The ability to scale up a blockchain lies mainly in improving the underlying technology rather than deploying new hardware. The second contribution of the thesis proposes SecuSca, an approach that makes a trade-off between security and scalability when designing blockchain-based systems. It designs an efficient replication model, which creates dynamic sharding wherein blocks are stored in various nodes. To maintain the required level of security, the proposed approach shows that blockchain replication over the Peer_to_Peer network is minimized as the blockchain’s length evolves. Furthermore, a sharding protocol over the network is proposed to get access to the blockchain data based on historical transactions. The protocol reduces old blocks’ replication; these blocks can be discarded from specific nodes and stored by others. The nodes willing to store the coming blocks and their data are chosen randomly. The block header of each block is kept to achieve consensus. Next, we optimize the latest approach by choosing the entering nodes following the nodes’ capacities instead of randomly
Kendric, Hood A. "Improving Cryptocurrency Blockchain Security and Availability Adaptive Security and Partitioning". Kent State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1595038779436782.
Texto completoNeudecker, Till [Verfasser] y H. [Akademischer Betreuer] Hartenstein. "Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains / Till Neudecker ; Betreuer: H. Hartenstein". Karlsruhe : KIT-Bibliothek, 2019. http://d-nb.info/1174992239/34.
Texto completoLibros sobre el tema "Permissionless Blockchain"
Allende, Marcos. LACChain Framework for Permissioned Public Blockchain Networks: From Blockchain Technology to Blockchain Networks. Editado por Alejandro Pardo y Marcelo Da Silva. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003747.
Texto completoEinfluss der Blockchain-Technologie auf Geschäftsmodelle: Entwicklung eines Vorgehensmodells am Beispiel von intermediären Akteuren. Göttingen, Deutschland: Cuvillier Verlag, 2021.
Buscar texto completoCapítulos de libros sobre el tema "Permissionless Blockchain"
Gans, Joshua. "Permissioned Versus Permissionless". En The Economics of Blockchain Consensus, 51–67. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33083-4_4.
Texto completoBezuidenhout, Riaan, Wynand Nel y Jacques Maritz. "Transient Random Number Seeds in Permissionless Blockchain Systems". En The Transdisciplinary Reach of Design Science Research, 85–96. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06516-3_7.
Texto completoAguru, Aswani Devi, Suresh Babu Erukala y Ilaiah Kavati. "Smart Contract Based Next-Generation Public Key Infrastructure (PKI) Using Permissionless Blockchain". En Hybrid Intelligent Systems, 625–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96305-7_58.
Texto completoMessias, Johnnatan, Vabuk Pahari, Balakrishnan Chandrasekaran, Krishna P. Gummadi y Patrick Loiseau. "Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in Blockchains". En Financial Cryptography and Data Security, 221–40. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47751-5_13.
Texto completoGrodzicka, Hanna, Michal Kedziora y Lech Madeyski. "Security and Scalability in Private Permissionless Blockchain: Problems and Solutions Leading to Creating Consent-as-a-Service (CaaS) Deployment". En Advances in Computational Collective Intelligence, 278–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88113-9_22.
Texto completoLu, Yuan, Qiang Tang y Guiling Wang. "Generic Superlight Client for Permissionless Blockchains". En Computer Security – ESORICS 2020, 713–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59013-0_35.
Texto completoAgrawal, Divyakant, Amr El Abbadi, Mohammad Javad Amiri, Sujaya Maiyya y Victor Zakhary. "Blockchains and Databases: Opportunities and Challenges for the Permissioned and the Permissionless". En Advances in Databases and Information Systems, 3–7. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54832-2_1.
Texto completoBeris, Themis y Manolis Koubarakis. "Modeling and Preserving Greek Government Decisions Using Semantic Web Technologies and Permissionless Blockchains". En The Semantic Web, 81–96. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93417-4_6.
Texto completoGarilli, Chiara. "Blockchain and Smart Contracts". En Handbook of Research on Applying Emerging Technologies Across Multiple Disciplines, 159–75. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8476-7.ch009.
Texto completoWalch, Angela. "Deconstructing “Decentralization”". En Cryptoassets, 39–68. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190077310.003.0003.
Texto completoActas de conferencias sobre el tema "Permissionless Blockchain"
Giacobino, Andrea, David Grierson, Har Preet Singh, Patrick McHale y Simon Maggs. "Cosmos Cash: Public Permissionless approach towards SSI and Use Cases". En 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00071.
Texto completoThai, Quang Tung, Jong-Chul Yim y Sun-Me Kim. "A scalable semi-permissionless blockchain framework". En 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939962.
Texto completoDeuber, Dominic, Bernardo Magri y Sri Aravinda Krishnan Thyagarajan. "Redactable Blockchain in the Permissionless Setting". En 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00039.
Texto completoHao, Nan. "Ticket Market Design Based on Permissionless Blockchain". En 2018 IEEE 2nd International Conference on Circuits, System and Simulation (ICCSS). IEEE, 2018. http://dx.doi.org/10.1109/cirsyssim.2018.8525886.
Texto completoMoriyama, Koichi y Akira Otsuka. "Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors". En 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00012.
Texto completoErsoy, Oguzhan, Zhijie Ren, Zekeriya Erkin y Reginald L. Lagendijk. "Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms". En 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2018. http://dx.doi.org/10.1109/cvcbt.2018.00008.
Texto completoFalazi, Ghareeb, Michael Hahn, Uwe Breitenbucher, Frank Leymann y Vladimir Yussupov. "Process-Based Composition of Permissioned and Permissionless Blockchain Smart Contracts". En 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2019. http://dx.doi.org/10.1109/edoc.2019.00019.
Texto completoXu, Jie, Yingying Cheng, Cong Wang y Xiaohua Jia. "Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain". En 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00065.
Texto completoXu, Jie, Yingying Cheng, Cong Wang y Xiaohua Jia. "Occam: A Secure and Adaptive Scaling Scheme for Permissionless Blockchain". En 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00065.
Texto completoNi, Zhengwei, Wenbo Wang, Dong In Kim, Ping Wang y Dusit Niyato. "Evolutionary Game for Consensus Provision in Permissionless Blockchain Networks with Shards". En ICC 2019 - 2019 IEEE International Conference on Communications (ICC). IEEE, 2019. http://dx.doi.org/10.1109/icc.2019.8761130.
Texto completoInformes sobre el tema "Permissionless Blockchain"
Gans, Joshua y Hanna Halaburda. "Zero Cost'' Majority Attacks on Permissionless Blockchains. Cambridge, MA: National Bureau of Economic Research, julio de 2023. http://dx.doi.org/10.3386/w31473.
Texto completo